Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security Bulletin: Magecart Skimming Campaign

Magecart is a long-running digital skimming threat attributed to multiple financially motivated cybercriminal groups specializing in the theft of payment card data from e-commerce websites. First identified in 2015, Magecart attacks have continuously evolved, leveraging compromised third-party services, supply chain vulnerabilities, and increasingly sophisticated obfuscation tactics to inject malicious JavaScript skimmers into checkout pages.

Phishing Kits Are Growing More Sophisticated; Focused on Bypassing MFA

Researchers at Cisco Talos warn that major phishing kits continue to incorporate features that allow them to bypass multi-factor authentication (MFA). Commodity phishing kits like Tycoon 2FA and Evilproxy achieve this by using reverse proxies to intercept traffic from the authentication process during a phishing attack.

Introducing Social Media and Data Leakage to Outpost24's EASM platform

Digital Risk Protection (DRP) lets organizations proactively identify and mitigate external threats that emerge from their digital footprints. This can span public sources as well as deep and dark web channels. DRP is a key element of Outpost24’s external attack surface management (EASM) platform, so we’re pleased to announce two new integrations have been added: Social Media and Data Leakage. These new DRP modules will help cybersecurity teams to.

The Cost of Manual Remediation Processes in a Regulated World

Security teams don’t need more alerts, they need fewer bottlenecks. In most organizations, remediation still runs on manual effort: ticket chasing, asset tagging, SLA tracking, endless email threads. It’s slow, fragmented, and risky for each organization. According to Seemplicity’s 2025 Remediation Operations Report, 91% of organizations face remediation delays, with the top two most common causes being collaboration and communication challenges (31%) and manual processes (19%).

Exploited! SysAid On-Prem XML External Entity Vulnerability (CVE-2025-2775)

SysAid has patched a critical XML External Entity (XXE) flaw that lets unauthenticated attackers turn a routine /mdm check-in request into full administrator compromise—and, when chained with a newly disclosed command-injection bug, into remote code execution (RCE). The vulnerability, tracked as CVE-2025-2775, affects all SysAid On-Prem deployments up to 23.3.40 and is now fixed in 24.4.60.

Top Attack Surface Management (ASM) Software Solutions to Watch in 2025

Organizations are increasingly recognizing that threats can emerge from various external-facing assets, including web applications, cloud infrastructure, APIs, and even shadow IT. This necessitates a robust Attack Surface Management (ASM) strategy, supported by specialized software solutions.

Precision in Machine Identity: Securing the NHIs That Matter

Imagine walking into your next board meeting and saying, “We need to secure all the non-humans.” You can probably picture the reactions: furrowed brows, confused glances—not exactly a solid foundation for fostering an effective identity and access management (IAM) strategy. But lately, there’s been a lot of discussion about all-encompassing terms like non-human identity (NHI).

If you can't patch perfectly, patch programmatically

In every quarterly security report we’ve ever released, we consistently find that threat actors primarily exploit old vulnerabilities, often fixed months, if not years, prior. The prevalence of zero-day exploits pales in comparison to these well-known, outdated vulnerabilities. This reality underscores our repeated advice: regularly and swiftly patch your software to yield significant returns on your security work investment.