Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What CVE-2025-32433 Is and Why It Matters ?

A new critical vulnerability—CVE-2025-32433, also known as the Erlang SSH Chainbreaker—allows attackers to execute commands without authentication. This video breaks down what the flaw is, how the exploit works, why it’s dangerous, and which systems are at risk. In Part 1, you’ll learn: Severity: CVSS 10.0 — Exploited in the wild Risk: Full host compromise, data theft, operational disruption.

Passkeys, FIDO and Easier Security for Users

Security teams weigh strong controls against the need to keep people working productively, often holding on to rigid ways of doing things even when better options exist. A real world example from the automotive industry shows passkeys and FIDO based passwordless authentication personalising in car systems while keeping digital identity and access control secure.

Attack Surface Management vs. Exposure Management: What Wins?

When Attack Surface Management (ASM) stops at discovery, teams drown in alerts, CVE lists, and noise. What’s exposed isn’t the same as what’s actively being weaponized—and without prioritization or built-in remediation, risk piles up fast. Exposure Management (EM) closes that gap. It merges threat intelligence, vulnerability context, and safe-by-design remediation into one continuous loop. Instead of “scan → report → wait,” EM delivers.

Modernizing Vendor Risk for the AI Era

See how Riverside County transformed vendor risk from a manual, time-consuming process into a streamlined, data-driven operation that speeds decision-making, reduces risk, and enables innovation. Also hear about their approach to managing emerging AI risks, with practical, actionable lessons other security teams can apply. Interested in finding out more about UpGuard?

The MemcycoFM Show: Ep 20 - Preemptive Defense Against SEO Poisoning and Account Takeovers

In the recently published blog from @Memcyco titled 'Preemptive Defense Against SEO Poisoning and Account Takeovers', we discussed how SEO poisoning and fake search ads have become a mainstream delivery method for impersonation‑driven credential theft. As such, defending against SEO poisoning attacks is now critical – not just for maintaining SEO hygiene and strong digital marketing metrics, but – as a core component for ATO protection and maintaining compliance resilience.

Episode 5: Budgeting for Security: Financial Planning for Cyber Compliance

Our bonus episode tackles the vital topic of budgetary planning for cybersecurity compliance within educational institutions. We'll shed light on effective strategies for early communication of cybersecurity requirements within the school, engaging key stakeholders such as bursars, finance teams, and administrators.