Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Multiple Unpatched Vulnerabilities in Versa Concerto Disclosed

On May 21, 2025, ProjectDiscovery published technical details for multiple vulnerabilities they discovered in Versa Concerto, including authentication bypasses, remote code execution (RCE), and container escapes. Versa Concerto is a centralized management platform used to manage Versa’s SD-WAN and SASE services. It is a Spring Boot-based application deployed via Docker containers and routed through Traefik.

CVE-2025-31324: Critical SAP Flaw Exposes Systems to Remote Attacks

Active exploit targets SAP NetWeaver via unauthenticated remote code execution. This flaw allows unauthenticated attackers to upload and execute arbitrary files, leading to complete system compromise. In this video, we break down how the vulnerability works, why it’s dangerous, and what steps you must take to secure your systems.

Reviewing Penetration Test Pricing In 2025: A Practical Guide for UK and EU Buyers

Penetration testing costs in the UK and EU can range from a few thousand pounds to well over £20,000. At a glance, many of these tests look the same. So why the price gap? In 2025, pricing models haven't changed much. Most tests are still priced per day, but the complexity of what's being tested has changed. The rise of custom internal tools (many "vibe coded" by non-IT or security teams), shadow IT, SaaS stacks, and cloud sprawl means that scoping a pen test properly takes more time and care.

Security Testing for Single-Page Applications (SPAs)

When developing a web application, dev teams can choose from two fundamental design patterns: Single-Page Applications (SPAs) or traditional Multi-Page Applications (MPAs). Deciding which one to use can depend on multiple factors, but more and more companies are developing SPAs since they can provide a smoother user experience (UX), which, in turn, might just result in better user adoption.

EASM top features: 7 capabilities your solution needs

External attack surfaces have never been more sprawling, or more vulnerable. As organizations increasingly rely on dynamic, cloud-based infrastructures, and third-party services, digital footprints are only going to carry on growing. So, it’s no surprise many are turning towards External Attack Surface Management (EASM) tools for more visibility into both known and unknown assets. But what should you be looking for in a solution?

Security Bulletin: OttoKit WordPress Plugin Vulnerability, CVE-2025-27007

CVE-2025-27007 is a critical unauthenticated privilege escalation vulnerability affecting the OttoKit WordPress plugin (formerly SureTriggers), which is used by over 100,000 websites for workflow automation and third-party integration. The vulnerability exists in the plugin’s create_wp_connection() function, which fails to properly verify user authentication when application passwords are not configured.