Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

No PoCs? No problem. How to hunt for F5 exploitation even when details are sparse

Endpoint detection and response (EDR) tools, and the analysts using them, have become incredibly effective. They have become so good, in fact, that we're now seeing a clear shift in adversary behavior: attackers are being pushed off the endpoint and onto places where EDR cannot run. This isn't just a theory. As I was writing a separate blog about a recent Cisco exploit which spurred an immediate CISA emergency directive, news dropped about another major network edge vendor, F5.

LDAP Nightmare - Windows LDAP Denial of Service Vulnerability

In this technical webinar, SafeBreach security experts explore recent LDAP vulnerabilities, focusing on CVE-2024-49113 — a critical flaw capable of crashing unpatched Windows Servers. The team breaks down: This session emphasizes the importance of proactive patching, continuous validation, and understanding the underlying mechanics of directory services to strengthen enterprise resilience.

Microsoft Releases Emergency Patch for Exploited Critical Remote Code Execution Vulnerability (CVE-2025-59287)

On October 23, 2025, Microsoft released an out-of-band security update for a critical vulnerability tracked as CVE-2025-59287. The flaw stems from the deserialization of untrusted data in Windows Server Update Services (WSUS), which allows remote, unauthenticated threat actors to achieve remote code execution by sending a crafted event. According to Microsoft, only Windows servers with the WSUS Server Role enabled are affected. This feature is not enabled by default.

AI Sidebar Spoofing Attack: SquareX Uncovers Malicious Extensions that Impersonate AI Browser Sidebars

SquareX released critical research exposing a new class of attack targeting AI browsers. The AI Sidebar Spoofing attack leverages malicious browser extensions to impersonate trusted AI sidebar interfaces, which is used to trick users into executing dangerous commands that can lead to credential theft, device hijacking, and password exfiltration.

ED 26-01 | Mitigating F5 Device Vulnerabilities with Network Digital Twin Technology

Learn how Forward Enterprise enables federal agencies to rapidly respond to CISA Emergency Directive 26-01 through comprehensive network visibility, automated inventory, and continuous compliance verification.

Why We Built Evo - From My Heart

I’ve spent my career building and defending. I’ve seen the beauty of innovation and the brutality of cyber warfare. I’ve sat shoulder-to-shoulder with security engineers and platform teams in the trenches at 3AM responding to state-backed attacks where context and speed meant survival. In those moments, one truth becomes painfully clear: With AI, that gap just became a chasm. Agentic AI didn’t bend the rules of software — it rewrote them. Code now evolves in real time.