Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Responding to ToolShell: A Microsoft SharePoint zero-day vulnerability

A newly discovered exploit, “ToolShell,” is fueling a wave of targeted attacks against on-premises Microsoft SharePoint servers. The zero-day exploit chains two vulnerabilities—CVE-2025-53770, a remote code execution (RCE) vulnerability and CVE-2025-53771, a spoofing vulnerability that allows attackers to bypass authentication. When combined, this critical zero-day vulnerability gives attackers persistent unauthenticated remote access to on-premises SharePoint servers.

Modern application control, done right with least privilege

When attackers gain access to a single endpoint—like a developer’s workstation or an HR system—it’s often game over. With some skill and patience, that foothold can escalate into full-blown disruption: stolen data, operational downtime, and brand damage. For years, technologies like application control have served as the frontline defense against this. But in a world rife with rapid change and evolving threats, traditional approaches are showing their age.

Drupal Two factor Authentication (2FA) - Google Authenticator

Having a Second Factor Authentication while logging into any service we use, has become a norm these days. You also get a reward for activating or enabling MFA in some cases - which is something extra I guess. If you'd like to add this extra layer of security to your Drupal site, you're in the right place. In this video, we’ll walk you through how to configure Google Authenticator as the Two-Factor Authentication (2FA) method for End Users as well as Admins in your Drupal site.

Why Security Teams Must Rethink Incident Response for Identity Attacks

Blocking a CEO's account to stop an anomaly? It might stop your business too. When implementing Identity Threat Detection and Response (ITDR), security teams must balance robust protection and business continuity. In this clip, our expert explains why blindly blocking access can cause more damage and how identity-proofing methods, like 2FA and push notifications, offer a smarter approach. Rethink your strategy to keep security seamless.