Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security Alert: CVE-2025-64446 Fortinet FortiWeb Actively Exploited

A critical zero-day, CVE-2025-64446, path-traversal vulnerability in Fortinet FortiWeb, the company’s Web Application Firewall (WAF), is being actively exploited in the wild to create unauthorized administrator accounts on exposed systems. This flaw allows unauthenticated attackers to gain complete administrator access to affected devices.

The hidden cost of manual capacity management

For most IT operations teams, capacity management is a balancing act. Too much capacity and costs spiral; too little and users feel the impact before you do. On paper, scaling should be simple. In reality, it’s anything but. Most teams still scale manually – waiting for alerts, logging into consoles, adjusting resources, and hoping they’re not overdoing it. It’s a pattern that feels safe because it’s familiar, but it’s quietly expensive.

The researcher's desk: CVE-2025-59287

Welcome to The researcher’s desk – a content series where the Detectify security research team conducts a technical autopsy on vulnerabilities that are particularly interesting, complex, or persistent. The goal here is not to report the latest research (for which you can refer to the Detectify release log); it is to take a closer look at certain vulnerabilities, regardless of their disclosure date, that still offer critical lessons.

Art and Science: Cyber and Physical Security Convergence Deficiencies in the Louvre Heist

In eight short minutes on October 25, 2025, a group of thieves captured the world’s attention and imagination, perpetuating a daring heist in broad daylight and escaping with approximately €88 million worth of prized artwork from the planet’s most visited museum: The Louvre. Within the security community, the first successful robbery from the iconic Parisian landmark since 1998 was a bombshell story.

Microsoft Issues Emergency Patch for Windows Server Update Services RCE Vulnerability CVE-2025-59287

LevelBlue Labs is tracking a severe vulnerability in Windows Server Update Services (WSUS), CVE-2025-59287, that allows attackers to remotely execute code without authentication and is being exploited by threat actors to compromise vulnerable Windows Server users.

New Android Malware Platform Targets Bank Accounts

Researchers at Zimperium are tracking a new malware-as-a-service platform designed to target Android phones with banking Trojans. The platform, dubbed “Fantasy Hub,” allows unskilled threat actors to launch sophisticated malware campaigns that trick victims into granting access to their bank accounts.

Azure DevOps Pipelines 101: A Beginner's Guide to CI/CD

In software engineering, the deployment process is not just about running a script and hoping it sticks. A big part of it is automation, not as a luxury, but a necessity. And that’s where Azure Pipelines steps in. The software provides a robust CI/CD engine embedded in the Azure DevOps ecosystem. Developers and DevOps engineers working with version control systems, containers, or even legacy monoliths can leverage Azure Pipelines.

Operationalizing Digital Asset Custody Compliance for Banks

For the first time in history, banks and financial institutions are adopting digital assets as an integral part of their internal operations and product offerings. As they do so, they face new threat vectors, unfamiliar custody models, and growing pressure to identify and align with emerging supervisory standards, which may or may not serve as complete safe havens from risk.

How IT Security Consultants Help Scale-ups Prevent Data Breaches

There's something peculiar about scale-ups: they grow fast enough to attract attention but rarely fast enough to build proper defenses. Ransomware showed up in 44% of breaches last year, and human error caused 95% of them. The pattern repeats itself: companies hit Series A funding, suddenly they're handling enterprise client data, and security becomes an afterthought until something breaks.

WAN AI vs Other AI Video Generators: Which Is Best?

In the world of artificial intelligence (AI) technology, video generators have become increasingly popular for creating stunning visual content. One of the most talked-about AI art generators is WAN AI, which promises to revolutionize the way we create and share videos. But how does WAN AI stack up against other AI video generators on the market? Let's take a closer look at the features, capabilities, and benefits of WAN AI compared to its competitors.