Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

3 VNet Use Cases to Simplify Internal Access (Without VPNs)

VPNs have their time and place. But at Teleport, we don’t think accessing internal engineering resources is one of them. VPNs create friction, slow down development workflows, and often become security bottlenecks. That's where VNet comes in. Teleport VNet was designed to give engineers a secure way to access internal applications without VPNs or port forwarding.

CitrixBleed 2: When Memory Leaks Become Session Hijacks

The cybersecurity community is facing yet another critical infrastructure vulnerability that threatens enterprise networks worldwide. CVE-2025-5777, dubbed "CitrixBleed 2" by security researcher Kevin Beaumont, represents a dangerous out-of-bounds memory read vulnerability in Citrix NetScaler ADC and Gateway devices. This new flaw bears an unsettling resemblance to the original CitrixBleed (CVE-2023-4966), which was widely exploited by ransomware groups and nation-state actors in 2023.

Ransomware in First Half of 2025: An Ecosystem in Flux

The first half of 2025 has been a period of disruption and realignment within the ransomware ecosystem. Following years of dominance by a few key players, the landscape has fragmented into a chaotic and highly competitive market defined by new leaders, divergent attack strategies, and a laser focus on high-pressure targets. In total, more than 3,000 ransomware incidents were recorded in the first six months of the year. The overall threat has not diminished; it has become more unpredictable.

Cato CTRL Threat Research: Analyzing LAMEHUG - First Known LLM-Powered Malware with Links to APT28 (Fancy Bear)

On July 17, 2025, Ukraine’s Computer Emergency Response Team (CERT-UA) publicly reported LAMEHUG, which is being documented as the first known malware that integrates large language model (LLM) capabilities directly into its attack methodology.

CVE-2025-53770: SharePoint Zero-Day Under Active Exploitation

CVE-2025-53770 is a live, high-severity threat that is already being exploited across global networks. This critical vulnerability in Microsoft SharePoint Server allows unauthenticated attackers to execute arbitrary code remotely, effectively handing them the keys to your infrastructure. As of July 2025, over 85 SharePoint servers have reportedly been breached. And if your organization uses SharePoint 2016, 2019, or Subscription Edition on-premises, you could be next.

Attack Surface to Action: The Power of Censys ASM + Seemplicity

Security teams juggle a multitude of tools to keep their organizations safe. One platform scans for exposed assets, another tracks vulnerabilities, and yet another manages remediation tasks – and the list goes on. Organizations use an average of 38 different security products, leading to fragmented processes and a lot of “noise” in the form of findings. It’s no surprise that 85% of security professionals say all this noise makes it challenging to reduce risk quickly.

Helping businesses earn and prove trust: Announcing Vanta's $150 million Series D

Vanta has raised a $150M Series D and is now valued at $4.15 billion. ‍ Financing mile markers are exciting validation of what we’re building and also serve as a rare moment to reflect on the company and hone in more sharply on our mission. ‍ Vanta’s mission is to help businesses earn and prove trust. ‍ We believe trust is the critical ingredient to growth.

Inside the MOVEit Breach: How Cl0p and Nam3L3ss Expose Organizations to Ongoing Cyber Threats

In 2023, a critical vulnerability in MOVEit Transfer software (CVE-2023-34362) was weaponized by the Cl0p ransomware group, leading to a substantial leak of sensitive employee data from major global corporations. The flaw in MOVEit allowed attackers to bypass authentication and access secure files, resulting in a far-reaching data breach that impacted various sectors including finance, healthcare, government, and retail.

Biometric Access and Beyond High-Tech Innovations Safeguarding Your Belongings

Technology is transforming the way we secure our property at the individual level, particularly in storage. Biometric access utilizes distinguishing physical attributes such as face or fingerprint identification in order to limit entry and prevent unauthorized individuals from accessing property. Such technologies are more convenient and more secure than the conventional keys or code. With the latest developments, stores are adopting intelligent systems that maximize both safety and user convenience in order to protect belongings.