Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The researcher's desk: FortiWeb Authentication Bypass (CVE-2025-64446)

Welcome to The researcher’s desk – a content series where the Detectify security research team conducts a technical autopsy on vulnerabilities that are particularly interesting, complex, or persistent. For this issue, we look at CVE-2025-64446, a critical authentication bypass that has been actively exploited in the wild, targeting Fortinet’s Web Application Firewall (WAF) product, FortiWeb.

The best security questionnaire automation software for 2025

Security questionnaires are now a standard part of doing business. Whether you’re closing enterprise deals or expanding into regulated markets, every buyer expects proof of your security posture—often in the form of long, repetitive questionnaires. The challenge isn’t finding the answers; it’s answering fast and consistently across formats, languages, and requirements. ‍ That’s where security questionnaire automation software comes in.

Email Bombing Followed by Teams IT Impersonation Attacks Continue

BlueVoyant’s Threat Fusion Cell and SOC have been tracking a significant and persistent social engineering campaign that cleverly exploits trusted communication channels to gain initial access to target networks. Since at least mid-October 2025, BlueVoyant has observed a consistent playbook where threat actors employ inbox sabotage as a pretext for highly convincing IT support impersonation over Microsoft Teams.

To protect Canada's financial system, new anti-fraud measures must evolve faster than their foes

The Government of Canada’s launch of an Anti-Fraud Strategy and Financial Crimes Agency acknowledges a reality that banks, fintechs and payment processors already know: the scale, sophistication and speed of digital fraud are outpacing traditional defences. These are vital national commitments, to be sure, but they also underscore the need for companies, institutions and governments to evolve faster than the attacks they face. Fraud has become one of the defining challenges of our time.

Wallets for Digital Assets: The Infrastructure Investment You Can't Afford to Delay

Over the next decade, wallet infrastructure will be a defining factor in onchain finance. Institutions that invest in robust wallet capabilities in the next 18–24 months will shape how value is moved, held, managed, and issued. This shift isn’t driven by hype. It’s grounded in a real transformation of how financial markets function. From banking to payments to capital markets, leading institutions are doing more than building products.

7 Signs Your Child Is Ready for Online Coding Lessons

Kids today are growing up in a fast-paced digital world. From smart toys to classroom apps, technology surrounds them. And behind every app, game, and robot lies the same foundation - coding. Coding is more than just typing on a keyboard. It's about problem solving, logical thinking, and critical thinking, all essential skills that help kids understand how things work. But as a parent, how do you know when your child is ready to learn coding?

Create Webinar Landing Pages That Boost Sign-Ups

A good webinar landing page matters; it's the dedicated web page that converts visitors into webinar attendees. Discover what makes an effective webinar landing or webinar registration page and how tools like StealthSeminar and a solid landing page builder help you create webinar landing pages that drive more sign-ups.

From Planning to Execution: All the Elements and Behind-the-Scenes of a Live Event

Organising a live event entails a lot of work. It requires more than what the audience sees on screen and on stage. Behind it, sharp visuals, crystal-clear audio, a strong internet connection, and a perfectly rehearsed performance run the show. From pre-production to problem solving, live event production is all about creativity, teamwork, and technical skills. Here's what goes on behind the curtain when you want to create live events.

Why a VPN Helps You Stay Safe Online

A VPN is one of those tools that sounds very technical at first, but it is actually very simple once you understand it. It works like a safe tunnel for your internet. When you turn it on, all your online activity goes through this tunnel so no one can peek inside. Many people use a VPN to stay safe, to stay private or to watch content that is not normally available in their area. Some people like using a high-speed VPN so their internet stays fast while they stay protected. A VPN simply gives you peace of mind every time you go online.