Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2025-20393: Threat Campaign Targeting Cisco Secure Email Gateway, Cisco Secure Email and Web Manager

On December 17, 2025, Cisco published an advisory detailing a new threat campaign identified on December 10, affecting the Cisco AsyncOS software used on Cisco Secure Email Gateway and Cisco Secure Email and Web Manager. The campaign is exploiting an unpatched zero-day vulnerability, which only affects deployments with the Spam Quarantine feature enabled. It allows threat actors to execute arbitrary commands with root privileges on affected devices. This feature is not enabled by default.

Detecting CVE-2025-20393 exploitation: catching UAT-9686 on Cisco appliances

CVE-2025-20393 is a CVSS 10.0 Remote Code Execution (RCE) flaw in Cisco Secure Email Gateways currently being actively exploited by China-nexus groups. A recent advisory from Cisco Talos details how an actor dubbed “UAT-9686” is leveraging this vulnerability to target Cisco Secure Email Gateways (ESA) and Secure Email and Web Managers (SMA). The attack allows threat actors to execute arbitrary commands with root privileges and deploy persistence mechanisms.

Get Ready for CMMC Enforcement: Essential Steps to Secure CUI

The U.S. Department of Defense (DoD) introduced its Cybersecurity Maturity Model Certification (CMMC) program in early 2020 to strengthen cybersecurity across the Defense Industrial Base (DIB) and ensure that contractors handling Controlled Unclassified Information (CUI) meet strict cybersecurity standards defined by the National Institute of Standards and Technology (NIST).

Inside CrowdStrike's Science-Backed Approach to Building Expert SOC Agents

Security teams are at a critical inflection point. AI-enabled adversaries now operate at machine speed, automating phases of the kill chain and scaling attacks faster than human-only workflows can respond. Yet most SOCs still depend on manual triage and investigation processes that cannot keep pace.

Regulatory Compliance & Data Tokenization Standards

Organizations across finance, healthcare, retail, and especially AI-driven sectors are facing increasing pressure from global regulators. The rapid expansion of AI, the growth of cross-border data flows, and the rise of new privacy frameworks all contribute to a landscape that demands more structure and accountability. In this environment, regulatory compliance and data tokenization are becoming inseparable.

When Misconfigurations Become the Front Door: What Russia's Edge Device Campaign Signals for Modern Cyber Defense

A recent Dark Reading article highlighted a sobering shift in how nation-state threat actors are gaining access to critical infrastructure. According to reporting on a new Amazon Threat Intelligence disclosure, Russian actors affiliated with the GRU have spent years refining a campaign that increasingly bypasses traditional vulnerability exploitation altogether. Instead, they are walking straight through the front door left open by misconfigured network edge devices.