Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2025-42890: Hard-Coded Credentials in SAP SQL Anywhere Monitor (Non-GUI)

On November 11, 2025, SAP published a security advisory as part of their November security patches, addressing a maximum severity vulnerability identified as CVE-2025-42890 in SQL Anywhere Monitor (Non-GUI) version 17.0. The vulnerability involves hard-coded credentials, which exposes system resources to unauthorized users and allows threat actors to execute arbitrary code without authentication.

The Agentic OODA Loop: How AI and Humans Learn to Defend Together

Last week at the AI Security Summit, something profound happened. The first cohort of AI Security Engineers in the world earned their certification — a milestone that symbolized not just new skills, but a new mindset. For decades, security has been about control. Rules, gates, and policies that define what’s safe and what’s not. But the age of Agentic AI — systems that perceive, reason, act, and learn — is forcing us to evolve beyond static defenses.

Intel Chat: TruffleNet exploit, React Native vulnerability, SesameOp OpenAI & SkyCloak [265]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Falcon Exposure Management Network Vulnerability Assessment: Demo Drill Down

CrowdStrike Falcon Exposure Management simplifies network security with its Network Vulnerability Assessment, offering a modern way to secure network infrastructure without complex legacy tools. Learn how the system utilizes your existing Falcon sensors to provide unmatched continuous visibility-instantly correlating new threats against your assets—and leverage authenticated scanning for deeper, more complete vulnerability inspection.

The Role of AI Security Agents in Modern Exposure Management

AI security agents are reshaping how organizations manage exposure. This blog explores where they deliver the most impact — from smarter prioritization to faster ownership mapping and assisted remediation — and how this shift moves security teams from automation to autonomy.

Three New High-Severity Vulnerabilities in runc: What You Need to Know

Within 24 hours, three new high-severity vulnerabilities were disclosed in runc, the low-level runtime that underpins most container platforms, including Docker, containerd, Kubernetes, and nearly every major cloud provider’s managed Kubernetes service. These vulnerabilities (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881) allow a malicious container image to break out of the container boundary and affect the host machine directly.

Scaling Exposure Management: Program Maturity and Continuous Optimization

Building an exposure management program is just the beginning of a long journey. True success comes from scaling that program through continuous optimization, measurable progress, and organizational alignment. As enterprises expand their digital footprint, exposure management must evolve from reactive vulnerability remediation to a proactive, data-driven discipline that continuously strengthens resilience.

Clarity in Exposure Management

Vulnerability reports shouldn’t read like riddles. Seemplicity’s Clarity AI Agent transforms dense, technical scanner output into clear, contextual language everyone can understand — bridging the gap between security, IT, and engineering. Discover how Clarity makes every finding readable, actionable, and ready for remediation.

APT-C-60 Exploits Zero-Day Vulnerabilities: Inside the SpyGlace Loader, COM Hijacking, and C2 Infrastructure

The cyber espionage landscape continues to evolve in sophistication and stealth—and among the more notable actors is APT-C-60. In recent months, this adversary has significantly escalated its tactics by leveraging zero-day vulnerabilities and orchestrating multi-stage campaigns to deploy the SpyGlace back-door.