Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

PoC Exploit Available for Critical Information Disclosure Vulnerabilities in Ivanti EPM

On February 19, 2025, Horizon3.ai published proof-of-concept (PoC) exploit code and technical details for critical Ivanti Endpoint Manager (EPM) vulnerabilities disclosed in January. The vulnerabilities are tracked as CVE-2024-10811, CVE-2024-13161, CVE-2024-13160, and CVE-2024-13159, allowing a remote unauthenticated attacker to leak sensitive information via a path traversal. They share the same underlying issue, which results from an unauthenticated endpoint failing to validate input.

The evolution of quality at Vanta

Vanta’s story began like many other startups—moving fast to discover product-market fit and lay the groundwork for a sustainable business. Speed was key as we focused on delivering value to customers and rapidly iterating to meet market needs. This approach propelled us into a phase of healthy growth, marked by milestones we proudly celebrate (read more about our recent achievements here).

Cybersecurity for Electricity Distribution [2025 Update]

Electricity transmission and distribution are popular topics at the moment, especially as they pertain to utilities infrastructure security. These essential pillars of modern society are undergoing rapid digital transformation, with increased connectivity and technological sophistication harboring large-scale cybersecurity challenges.

WatchGuard Recognized in CRN's Prestigious 2025 Security 100 List

Once again, WatchGuard has been named to CRN’s 2025 Security 100 list in the Network Security category. This prestigious recognition honors the top security vendors in the IT channel. The 2025 CRN Security 100 highlights channel-friendly cybersecurity vendors across a number of market segments, ranging from the largest and best-known players to some of the small-but-promising startups.

Achieving PCI DSS 4.0.1 Compliance for Companies (SAQ A-EP): A Comprehensive Guide for Feroot PCI PaymentGuard AI

Payment security for SAQ A-EP merchants has never been more critical. As e-commerce continues to evolve, merchants who control elements of their payment pages face increasing security challenges and compliance requirements.

3 Examples of Tokenization Initiatives Reshaping Financial Markets

Tokenization, or the process by which assets are converted into tokens that can be moved, stored, or recorded on a blockchain, enables a transparent, well-governed financial system. It empowers interested participants to utilize financial services and access capital markets with ease and efficiency. We’re currently seeing active examples of tokenization projects across multiple asset classes, such as commodities, debt securities, equity securities, and real estate.

Decrypting WalletConnect Messages: A Guide for Developers

Decentralised Finance (DeFi) is redefining the utility of financial services by opening up access to lending, trading, and yield generating without relying on traditional intermediaries. To execute on DeFi strategies, seamless wallet connectivity is essential. To make this possible, Fireblocks has integrated with WalletConnect. In this blog, we’ll outline how the team has approached investigating issues related to WalletConnect sessions.