Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Automate Payment Page Script Audits for PCI DSS: 6 Hours to 6 Minutes

Most teams spend more than 40 hours a week just keeping their payment page script inventories updated. And that’s meticulous work as they have to load the page, watch what scripts fire, map domains, and compare it all to the last version, just to ensure the changes are documented before the details go stale. Also check out How to Maintain PCI Compliance Across Hundreds of Payment Pages But for organizations with 50 to more than 200 payment pages, it goes even further.

CVE-2025-55182: Critical Remote Code Execution Vulnerability Found in React Server Components

On December 3, 2025, the React team released fixes for a maximum severity vulnerability in React Server Components (RSC). The vulnerability, tracked as CVE-2025-55182, stems from unsafe handling of serialized DOM elements, allowing for remote code execution in React 19 and other frameworks built on top of it, such as Next.js 15–16. The vulnerability was responsibly disclosed to React as part of a bug bounty program and is not known to be actively exploited in the wild at this time.

Database as a Service: A Complete DBaaS Implementation Strategy

A database-as-a-service (DBaaS) product eliminates the complexity of managing database infrastructure while reducing operational costs by up to 40%. Organizations can provision, configure, and scale databases instantly without hardware maintenance or software updates. MariaDB’s recent SkySQL reacquisition highlights the market shift toward flexible deployment models that support self-managed, hybrid, and fully managed environments.

Fake SAP Concur Extensions Deliver New FireClient Malware Variant

The BlueVoyant Security Operations Center (SOC) and Threat Fusion Cell (TFC) team are tracking an adversary luring users into downloading fake Concur browser extensions. The fake browser extension installer contains a FireClient Loader designed to gather host information and send to its command and control (C2) server. If execution succeeds with successful communication to the C2, the loader drops a backdoor BlueVoyant is naming FireClient Backdoor.

Wallarm Halts Remote Code Execution Exploits: Defense for Vulnerable React Server Component Workflows

On December 3, 2025, React maintainers disclosed a critical unauthenticated remote code execution (RCE) vulnerability in React Server Components (RSC), tracked as CVE-2025-55182. A working PoC was released publicly, and Wallarm immediately began observing widespread exploitation attempts across customer environments.

Keeper Named a Global Cybersecurity Leader in G2's Winter 2026 Reports

Keeper Password Manager has been recognized as a global cybersecurity leader by users on G2, the world’s largest and most trusted software marketplace. The G2 Winter 2026 Reports highlight Keeper’s strong performance and continued growth across multiple complex cybersecurity categories and regions, including KeeperPAM’s debut in the Privileged Access Management (PAM) reports.

AI agents and identity risks: How security will shift in 2026

The pace of technological change is relentless. Not long ago, our migration to the cloud and the automation of CI/CD pipelines dominated the conversation. Now, AI agents are reshaping how we think about automation, productivity, and risk. As we look toward 2026, it’s clear that these intelligent, autonomous systems are not just a passing trend; they are becoming foundational to how businesses operate.

The hidden offboarding step draining your budget

There’s a good chance something important is missing from your IT team’s offboarding checklist, and it may be causing a steady drip of unnecessary, wasted spend. The source of this leak? No, it’s not the unreturned laptops; it’s the licenses for SaaS apps that employees use every day.