Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2025-20393: Threat Campaign Targeting Cisco Secure Email Gateway, Cisco Secure Email and Web Manager

On December 17, 2025, Cisco published an advisory detailing a new threat campaign identified on December 10, affecting the Cisco AsyncOS software used on Cisco Secure Email Gateway and Cisco Secure Email and Web Manager. The campaign is exploiting an unpatched zero-day vulnerability, which only affects deployments with the Spam Quarantine feature enabled. It allows threat actors to execute arbitrary commands with root privileges on affected devices. This feature is not enabled by default.

Detecting CVE-2025-20393 exploitation: catching UAT-9686 on Cisco appliances

CVE-2025-20393 is a CVSS 10.0 Remote Code Execution (RCE) flaw in Cisco Secure Email Gateways currently being actively exploited by China-nexus groups. A recent advisory from Cisco Talos details how an actor dubbed “UAT-9686” is leveraging this vulnerability to target Cisco Secure Email Gateways (ESA) and Secure Email and Web Managers (SMA). The attack allows threat actors to execute arbitrary commands with root privileges and deploy persistence mechanisms.

Get Ready for CMMC Enforcement: Essential Steps to Secure CUI

The U.S. Department of Defense (DoD) introduced its Cybersecurity Maturity Model Certification (CMMC) program in early 2020 to strengthen cybersecurity across the Defense Industrial Base (DIB) and ensure that contractors handling Controlled Unclassified Information (CUI) meet strict cybersecurity standards defined by the National Institute of Standards and Technology (NIST).

Inside CrowdStrike's Science-Backed Approach to Building Expert SOC Agents

Security teams are at a critical inflection point. AI-enabled adversaries now operate at machine speed, automating phases of the kill chain and scaling attacks faster than human-only workflows can respond. Yet most SOCs still depend on manual triage and investigation processes that cannot keep pace.

Regulatory Compliance & Data Tokenization Standards

Organizations across finance, healthcare, retail, and especially AI-driven sectors are facing increasing pressure from global regulators. The rapid expansion of AI, the growth of cross-border data flows, and the rise of new privacy frameworks all contribute to a landscape that demands more structure and accountability. In this environment, regulatory compliance and data tokenization are becoming inseparable.

When Misconfigurations Become the Front Door: What Russia's Edge Device Campaign Signals for Modern Cyber Defense

A recent Dark Reading article highlighted a sobering shift in how nation-state threat actors are gaining access to critical infrastructure. According to reporting on a new Amazon Threat Intelligence disclosure, Russian actors affiliated with the GRU have spent years refining a campaign that increasingly bypasses traditional vulnerability exploitation altogether. Instead, they are walking straight through the front door left open by misconfigured network edge devices.

When Customer Data Quietly Walks Out the Door: Lessons from the Coupang Breach

Large data breaches rarely begin with dramatic system failures. More often, they start with sustained, unauthorized access to sensitive data that goes undetected for months. The recent breach at Coupang, South Korea’s largest e-commerce platform, illustrates this pattern clearly. Nearly 34 million customer records were likely exposed over an extended period before detection.

2025 Security Trends That Defined the SOC and What 2026 Will Demand

2025 exposed a shift that had been forming for years. Security operations were not slowed by limited visibility or weak tooling. They were slowed because the effort required to interpret growing volumes of data increased faster than staffing, budgets, or governance frameworks could support. Alert queues expanded, dashboards multiplied, cloud bills shaped retention choices, and AI arrived before most organizations had clear policies to supervise it. It was not a talent problem.

Internxt Achieves SOC 2 Compliance

Internxt is proud to announce that we have successfully achieved SOC 2 compliance, emphasising our continued dedication to security and privacy. By achieving this milestone, SOC 2 certifies that Internxt meets the needs of users regarding the controls of Internxt relevant to security, availability, and processing integrity of users’ data and the confidentiality of this information.

Bringing secure, just-in-time secrets to Cursor with 1Password

Developers are moving faster than ever with AI. Cursor is redefining how software gets built, and 1Password is redefining how teams secure access to SaaS and AI. Today, we are announcing a new integration that brings these two worlds together in a way that keeps development speed high and credential risk near zero.