Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2025-9242: Critical Unauthenticated Out-of-Bounds Write Vulnerability in WatchGuard Firebox

On September 17, 2025, WatchGuard released fixes for a critical out-of-bounds write vulnerability (CVE-2025-9242) in the iked process of WatchGuard Fireware OS, which powers their Firebox firewall appliances. This flaw allows a remote unauthenticated threat actor to execute arbitrary code and affects both the mobile user VPN with IKEv2 and the branch office VPN with IKEv2 when configured with a dynamic gateway peer.

SonicWall Warns Customers of Data Exposure Incident Affecting MySonicWall Configuration Backup Files

On September 17, 2025, SonicWall released a knowledge base article detailing the exposure of firewall configuration backup files stored in certain MySonicWall accounts. SonicWall states that after identifying the incident they began an investigation containing the incident, terminating the ‘unauthorized access point’, and working with law enforcement and select cybersecurity agencies globally.

Your Margins Are Under Attack. Here's How to Fight Back.

MSSPs don’t succeed because of the vendors they choose or the SIEM they prefer. They succeed when their operating model scales profitably. Yet most industry content feels like sales brochures, comparing one tool to another. The truth is, successful providers use many combinations of vendors. What separates winners from losers isn’t which tools they pick, it’s the foundation they build on.

Why Should You Use Fidelis Halo to Secure Containers in Hybrid Cloud and DevOps Pipelines?

Containerized applications have become the backbone of modern digital services. They allow you to package applications and dependencies into portable units that can run anywhere—on-premises, in private clouds, or across public cloud platforms. But with this agility comes risk. Containers, like any other software, are prone to vulnerabilities.

Beyond Perimeters: How Modern Endpoint DLP Addresses Today's Data Exfiltration Reality

The traditional network perimeter is dead. Your sensitive data now travels paths that legacy DLP solutions can't see—from Salesforce to Google Drive, across laptops, into personal Dropbox accounts, and through AI chatbots. No single traditional DLP catches all of this. We're at a turning point where shadow AI and rapid data movements expose blind spots that legacy solutions simply can't address. The reality?

The Psychological Toll of Working in Cybersecurity - When You Can't Unsee What You've Seen

Are you prepared for the psychological toll that comes with handling disturbing content in the cybersecurity world? Welcome to Razorwire, where today we’re exploring the realities behind a career in cyber — from technical warfare to the often-overlooked human cost. In this episode, I’m joined by therapist and consultant Eve Parmiter to examine the real psychological impact of repeated exposure to distressing material that many of us face during incident investigations, content moderation and threat research.