Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2025-24813 - Apache Tomcat Vulnerability Under Active Exploitation

On March 17th, 2025, security researchers confirmed active exploitation of Apache Tomcat’s recently disclosed vulnerability, CVE-2025-24813. Publicly disclosed on March 10th, the earliest signs of exploitation were observed on March 12th, with attackers leveraging the flaw just 30 hours after disclosure. This vulnerability enables Remote Code Execution (RCE) and information disclosure by exploiting Tomcat’s request-handling mechanism.

Detecting sensitive data and misconfigurations in AWS and GCP with Cloudflare One

Today is the final day of Security Week 2025, and after a great week of blog posts across a variety of topics, we’re excited to share the latest on Cloudflare’s data security products. This announcement takes us to Cloudflare’s SASE platform, Cloudflare One, used by enterprise security and IT teams to manage the security of their employees, applications, and third-party tools, all in one place.

Enhance data protection in Microsoft Outlook with Cloudflare One's new DLP Assist

Cloudflare Email Security customers using Microsoft Outlook can now enhance their data protection using our new DLP Assist capability. This application scans emails in real time as users compose them, identifying potential data loss prevention (DLP) violations, such as Social Security or credit card numbers. Administrators can instantly alert users of violations and take action downstream, whether by blocking or encrypting messages, to prevent sensitive information from leaking.

Choosing a trusted auditor: 5 key questions to ask your potential auditor

Choosing a trusted auditor is a critical step in your compliance journey. A thorough audit not only validates your security posture but also helps you build trust with your customers. The right auditor can provide valuable insights into your operations, identify potential risks, and suggest improvements to enhance your overall security framework. ‍ Vanta believes it's important to empower you with the knowledge you need to make informed decisions when selecting an auditor.

Disaster Recovery Services: A New Standard for Digital Asset Security

It’s common for many organizations to postpone establishing a robust Disaster Recovery Program until after their product is already in the market. While development and operational builds are critical for launching an outstanding product, disaster recovery planning often gets sidelined. However, it’s increasingly important for institutions to prioritize the safekeeping of private key materials, which are crucial for accessing and managing digital assets.

CVE-2025-23120: Critical Remote Code Execution Vulnerability in Veeam Backup & Replication

On March 19, 2025, Veeam published a security advisory for a critical severity vulnerability impacting their Backup & Replication software. The advisory did not provide technical details regarding the vulnerability, although it did mention that it could be exploited by authenticated domain users.

TikTok Analytics Website: Your Ultimate Tool for Insights

TikTok has grown rapidly in recent years. With a billion monthly users, it's essential for companies, brands, and artists looking to develop. Content creation and uploading seldom succeed on TikTok. You may design a profitable TikTok strategy by analyzing your account performance, understanding your audience, and watching your competition. But how do you choose the right tool? Find a safe, dependable, and user-friendly solution like High Social.

The Role of Proactive Monitoring in Preventing IT Vulnerabilities

We've all heard "prevention beats cure." Nowhere does this ring truer than cybersecurity. Many organisations discover this truth the hard way-after attackers have already breached their defences. Proactive monitoring isn't new, but it's increasingly crucial as threats multiply. Winter months typically see attack spikes (data shows December-February consistently tops breach statistics). With constant evolution in threat vectors, staying vigilant isn't optional-especially when reputation and customer trust hang in the balance.