Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SessionReaper (CVE-2025-54236): Impact, Detection, and Mitigation

SessionReaper (CVE-2025-54236), an unauthenticated vulnerability in the Commerce REST API enables session takeover and possible RCE. If you run Adobe Commerce or Magento Open Source, this critical, pre-auth vulnerabilities can let attackers hijack customer accounts, manipulate orders, and in many real-world setups drop persistent PHP web shells on your servers.

Securing Omnichannel Consumers | Nishith Datta (Head of Cybersecurity - Titan)

In this episode of Guardians of the Enterprise, Nishith Datta (Head of Cybersecurity & InfoSec, Titan Group) shares his experience securing large-scale systems such as Aadhaar, the world’s largest digital identity programme, and his involvement in national cybersecurity initiatives that required protection at massive scale.

The CISO's Checklist: How to Evaluate an API Security Platform

API Security Evaluation Checklist In the first half of 2025, APIs have emerged as the primary focus for attackers. Unlike traditional broad attacks on websites, threat actors are increasingly exploiting vulnerabilities and launching DDoS attacks on APIs, which are often harder to secure and manage at scale. Key insights from the State of Application Security Report H1 2025.

The Blueprint: How MSSPs Can Build a Profitable Pentest-as-a-Service (PtaaS) Offering

The latest 2025 Verizon Data Breach Investigations Report (DBIR) reveals a striking shift: exploitation of vulnerabilities has surged to become the initial access vector in approximately 20% of breaches, a 34% increase over the prior year. In an environment where cyber threats evolve faster than patch cycles, enterprises no longer view penetration testing as a checkbox exercise.

CVE-2025-59287: Critical WSUS Vulnerability Exploited in the Wild

Microsoft disclosed CVE-2025-59287 , a critical, unauthenticated RCE in Windows Server Update Services (WSUS) that lets attackers execute SYSTEM-level code via unsafe deserialization. In this video we break down how the exploit works, which servers are at risk, and real-world attack activity observed after the PoC went public.

Streamlining MSSP Operations with a Centralized WAF Dashboard

Managed Security Service Providers (MSSPs) are tasked with securing dozens or even hundreds of client applications at once. Each client may have unique traffic patterns, custom rules, and distinct compliance needs. Managing Web Application Firewalls (WAFs) for such diverse environments can easily become chaotic if done manually or across fragmented systems. A centralized MSSP WAF dashboard changes that equation.

Managing False Positives in Multi-Client MSSP WAF Deployments

Managing Web Application Firewall (WAF) rules across multiple clients is one of the most critical yet challenging tasks for MSSPs. While WAFs are essential for blocking malicious traffic and protecting applications, overly aggressive rules can trigger false positives, blocking legitimate requests, and disrupting client operations. For MSSPs false positives can lead to operational inefficiencies, client dissatisfaction, and even revenue loss.

CVE-2025-59287: Critical WSUS Vulnerability Exploited in the Wild

In October 2025, Microsoft disclosed a critical remote code execution vulnerability (CVE-2025-59287) in Windows Server Update Services (WSUS), which enables unauthenticated attackers to gain full control over affected servers. WSUS is a central patch management tool in Windows environments, responsible for approving, distributing, and monitoring updates across corporate networks.

Stay SEBI-Compliant: Strengthen Your Security with AppTrana WAAP

Are you prepared for SEBI’s latest cybersecurity mandates? In this video, discover how AppTrana WAAP helps financial institutions effortlessly meet SEBI cybersecurity compliance requirements. From continuous vulnerability scanning and managed WAF protection to real-time threat detection and compliance reporting, AppTrana ensures your applications stay secure and compliant at all times.

RBI Compliance Made Simple with AppTrana | Secure Your Banking and Payment Apps

In H1 2025, Indusface AppSec data recorded over 742 million attacks on banking and financial websites, a 51% surge from last year. 77% exploited known vulnerabilities, bots hit 95% of sites, and DDoS attacks spiked by over 500% on APIs. To counter these threats, the RBI’s Digital Payment Security Guidelines mandate stronger defenses across web apps, APIs, and data systems.