Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

When Time-to-Exploit Goes Negative: Rethinking Defense for Irish Critical Infrastructure

When we analyzed Ireland's critical national infrastructure (CNI) through an intelligence lens, the findings were sobering. Of 222 CNI organizations examined, 98—nearly 44%—have exposed known vulnerabilities. We then analyzed whether these open doors were being actively exploited by threat actors. Ireland is home to 15,776 attack origins, and 85% of them are the very same IPs and networks in CNI organizations with those exposed known vulnerabilities.

CMMC 2.0 Certification: Your Survival Guide

Most defense contractors focus on winning contracts, delivering on time, and maintaining quality. However, the reality is that without CMMC certification, you won’t even qualify to bid. The Cybersecurity Maturity Model Certification exists for one primary reason: to protect the defense industrial base from >$600 billion annual cost of intellectual property theft (per Forbes) targeting defense information.

Cybersecurity Awareness Month: What You Can do to Go the Extra Mile

Like Halloween, October is also Cybersecurity Awareness Month, a time for organizations and individuals to sharpen their focus on data protection. With cybercrime rates soaring since 2020, this annual reminder has never been more critical. The conversation is shifting from viewing cybersecurity as just an IT problem to recognizing it as a shared business responsibility. According to the World Economic Forum, human error is a factor in a staggering 95% of all cybersecurity incidents.

The AppSec Bottleneck: Why Fixing Can't Wait

Vulnerability detection isn’t the main problem - remediation is. In today’s fast-paced development world, security teams are overwhelmed with alerts, while developers struggle to keep up with security tasks that feel disconnected from their workflow. The real risk? Vulnerabilities that sit unaddressed in a growing backlog. Join Daniel Wyrzykowski, Product Manager at Mend.io and Saoirse Hinksmon, Senior Product Marketing Manager at Mend.io as they explore.

What's Going On at Salesforce? - The 443 Podcast - Episode 347

This week on the podcast, we discuss the wave of extortion attacks targeting companies that use Salesforce. After that, we discuss Discord's breach involving their customer support application. Finally, we dive deep into the recent Oracle E-Business Suite zero-day vulnerability and how attackers chained together multiple low-severity findings into a critical issue.

How we built the Questionnaire Automation Browser Extension

Many of our customers ran into an issue where they’d receive questionnaires via third-party vendor portals and would need to import them into the Vanta app. Since these portals lacked spreadsheet export, their only option was to manually copy and paste questions into a spreadsheet before uploading it to Vanta.

CVE-2025-61884: Oracle Releases Emergency Patch for Information Disclosure Flaw

On October 11, 2025, Oracle released an emergency fix for a high-severity information disclosure vulnerability in Oracle E-Business Suite (EBS), tracked as CVE-2025-61884. The flaw exists in the Runtime UI component of Oracle Configurator and allows remote unauthenticated threat actors to access sensitive resources. Oracle has not confirmed a link between this vulnerability and the extortion emails received by some Oracle EBS customers from the Cl0p ransomware group in recent weeks.

Fidelis Security's Collaboration with Palo Alto | Unparalleled Protection, Visibility & Control

Discover how Fidelis Security and Palo Alto Networks are joining forces to deliver a powerful, integrated cybersecurity solution that redefines network visibility and protection. In this collaboration, Fidelis Network enhances Palo Alto’s Prisma Access with advanced Network Detection and Response (NDR) capabilities—empowering security teams with deep network insights, automated threat detection, and unmatched visibility across hybrid environments.