Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Driving Innovation: How Arctic Wolf Powers the BWT Alpine Formula 1 Team's Cybersecurity Excellence

Arctic Wolf and the BWT Alpine Formula One Team share a passion for speed, power, and precision. Discover how Arctic Wolf is transforming Alpine's cybersecurity by providing 24x7 protection for the entirety of their environment – trackside, at the factory, and everywhere in between.

CVE-2025-64155: FortiSIEM Remote Unauthenticated Command Injection Vulnerability

On January 13, 2025, Fortinet released fixes for a critical-severity FortiSIEM vulnerability (CVE-2025-64155) that stems from improper neutralization of special elements used in OS commands within the phMonitor service (TCP/7900). An unauthenticated, remote threat actor can exploit this vulnerability via crafted TCP requests to execute unauthorized code or commands on affected systems.

Arctic Wolf and AWS: AI-Powered SOC and Security Incident Response

Discover how Arctic Wolf partners with Amazon Web Services (AWS) to deliver cutting-edge, AI-powered Security Operations Center (SOC) capabilities and advanced security incident response solutions. This video explores how Arctic Wolf leverages AWS cloud infrastructure and artificial intelligence to provide: Learn how this powerful combination enhances your organization's security posture, reduces response times, and protects against evolving cyber threats through intelligent automation and comprehensive managed detection and response (MDR) services.

CVE-2025-25249: Remote Code Execution Vulnerability in FortiOS and FortiSwitchManager

On January 13, 2026, Fortinet released an advisory describing a high-severity remote code execution vulnerability affecting its FortiOS and FortiSwitchManager products. According to Fortinet, the vulnerability stems from a flaw in the CAPWAP Wireless Aggregate Controller Daemon and could allow an unauthenticated, remote threat actor to execute arbitrary code or commands. The vulnerability was discovered internally by Fortinet’s Product Security Team.

From Dugouts to Data Lakes: Applying Moneyball to the AI SOC

In this exclusive interview, Ari Kaplan, Chief Evangelist at Databricks and one of the real-life inspirations behind Moneyball, teams up with cybersecurity luminary Dan Schiappa, President, Technology and Services at Arctic Wolf, and AI Technical Fellow Mike Mylrea to explore how AI strategies that revolutionized professional sports are now being applied to transform modern cybersecurity.

From Dugouts to Data Lakes: Applying Moneyball to the AI SOC

In AI-powered security, advantage comes not from automation alone, but from clear insight into how decisions are made. At Arctic Wolf, home to one of the world’s largest commercial security operations centers (SOC), we process over 10 trillion security events weekly. Rather than chasing automation for its own sake, we build AI that scales human expertise – preserving judgment where it matters most. But what is the optimal combination of humans and machines for security operations?

CVE-2025-69258: Trend Micro Apex Central Remote Code Execution Vulnerability

On January 7, 2026, Trend Micro released a critical patch for Apex Central on-premises versions below Build 7190, addressing multiple vulnerabilities. The most severe of the vulnerabilities disclosed is CVE-2025-69258, a critical severity vulnerability, which allows unauthenticated threat actors to load malicious DLLs and execute arbitrary code as SYSTEM without user interaction. The advisory also includes two medium-severity denial-of-service vulnerabilities, CVE-2025-69259 and CVE-2025-69260.

CVE-2026-21858: Critical Unauthenticated File Access Vulnerability in n8n "Ni8mare"

On January 7, 2026, fixes were released for a maximum severity vulnerability (CVE-2026-21858) impacting n8n, a workflow automation application primarily used with artificial intelligence. Labeled “Ni8mare” by the researchers who discovered it, the vulnerability allows unauthenticated remote threat actors to take over locally deployed instances via publicly accessible webhook and form endpoints.

2025 Year in Review: Building the Future of Security Operations

Arctic Wolf entered 2025 with momentum and a clear focus: advancing security operations in ways that deliver measurable outcomes for organizations facing an increasingly complex threat environment. As the year comes to a close, we’re building on that momentum — strengthening our platform, expanding globally, and laying the foundation for what comes next in 2026.