<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Fortress SRM</title>
	<atom:link href="https://fortresssrm.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://fortresssrm.com/</link>
	<description>Full-Spectrum Cybersecurity Protection</description>
	<lastBuildDate>Fri, 13 Mar 2026 15:37:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://fortresssrm.com/wp-content/uploads/2021/05/cropped-FORT_Favicon-32x32.png</url>
	<title>Fortress SRM</title>
	<link>https://fortresssrm.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Threat and Security Update – March, 2026</title>
		<link>https://fortresssrm.com/threat-and-security-update-march-2026/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Fri, 13 Mar 2026 15:37:20 +0000</pubDate>
				<category><![CDATA[Threat & Security Updates]]></category>
		<guid isPermaLink="false">https://fortresssrm.com/?p=1869</guid>

					<description><![CDATA[<p>Stay Ahead of Threats with the Latest Vulnerability Updates for March Stay up to date on critical cyber risks, Microsoft’s March Patch Tuesday, and other notable third-party vulnerabilities. Timely patching ...</p>
<p>The post <a href="https://fortresssrm.com/threat-and-security-update-march-2026/">Threat and Security Update – March, 2026</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading"><br>Stay Ahead of Threats with the Latest Vulnerability Updates for March</h3>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Stay up to date on critical cyber risks, Microsoft’s March Patch Tuesday, and other notable third-party vulnerabilities. Timely patching is key to maintaining a strong security posture and protecting your business from threats. </p>



<h3 class="wp-block-heading">Quick Highlights</h3>



<ul class="wp-block-list">
<li><strong>Microsoft Patch Tuesday:</strong> <br>&#8211; <strong>83</strong> vulnerabilities disclosed <br>&#8211; <strong>3</strong> rated <strong>Critical</strong>, <strong>2</strong> are <strong>Zero-Day</strong> (both publicly disclosed, 0 exploited) </li>
</ul>



<ul class="wp-block-list">
<li><strong>High-Severity Advisories from Major Vendors:</strong> <br>&#8211; <strong>Adobe: 80</strong> vulnerabilities, affecting <strong>8 products</strong>  <br>&#8211; <strong>Cisco</strong>: <strong>3</strong> <strong>critical-severity</strong> flaws in Cisco Secure Firewall Management Center (FMC) and Cisco Catalyst SD-WAN Manager <br>&#8211; <strong>Fortinet</strong>: <strong>2 high-severity</strong> flaws in FortiManager and FortiSwitchAXFixed  <br>&#8211; <strong>Ivanti</strong>: <strong>1 high-severity</strong> flaw in Ivanti Desktop and Server Management (DSM) <br>&#8211; <strong>SAP</strong>: <strong>2 critical, 1 high</strong> vulnerabilities in SAP Quotation Management Insurance application (FS-QUO), SAP NetWeaver Enterprise Portal Administration, and SAP Supply Chain Management <br>&#8211; <strong>VEEAM: 6 critical-severity</strong> flaws, <strong>4 high-severity</strong> flaws published  </li>
</ul>



<ul class="wp-block-list">
<li><strong>Top Threats to Watch:</strong> <br>&#8211; <strong>Iran‑linked targeting of IP cameras</strong> to support physical warfare operations and battlefield intelligence across the Middle East.  <br>&#8211; <strong>Chinese‑nexus APT activity using PlugX malware</strong> and conflict‑themed lures to rapidly target organizations in Qatar and the Gulf region. <br>&#8211; <strong>Iranian MOIS and MuddyWater operations expanding espionage capabilities</strong>, including new backdoors (Dindoor, Fakeset) and Rclone‑based data exfiltration.  <br>&#8211; <strong>Advanced social engineering campaigns</strong>—Teams impersonation, Quick Assist abuse, LastPass‑themed phishing, and commercial‑grade kits like Starkiller that bypass MFA. <br>&#8211; <strong>Rise in infostealer and mobile malware innovation</strong>, including theft of AI‑agent configuration files (OpenClaw) and the GenAI‑powered Android malware PromptSpy. </li>
</ul>



<h2 class="wp-block-heading">Windows 10 Reaches End of Support</h2>



<p>As of&nbsp;<strong>October 14,&nbsp;2025</strong>, Microsoft has officially ended support for Windows 10.&nbsp;October 2025’s Patch Tuesday was the&nbsp;<strong>final security update</strong>&nbsp;for the OS—unless your organization enrolls in the&nbsp;<strong>Extended Security Updates (ESU)</strong>&nbsp;program.&nbsp;</p>



<ul class="wp-block-list">
<li><strong>What This Means for Your Organization:</strong> <br>&#8211; No more security patches or bug fixes for Windows 10 devices  <br>&#8211; Increased exposure to vulnerabilities and compliance risks  <br>&#8211; Continued support requires either: 1.) Enrolling in Microsoft&#8217;s paid ESU program, or 2.) Upgrading to Windows 11</li>
</ul>



<ul class="wp-block-list">
<li><strong>Upgrading Windows 11</strong>  <br>Unlike traditional feature upgrades, Windows 11 <strong>25H2</strong> is built on the same servicing branch and code base as Windows 11 <strong>24H2</strong>, making the transition simpler and lower risk.  <br><br>Fortress has thoroughly tested <strong>Windows 11 25H2</strong> and recommends upgrading all supported devices. To begin the upgrade process, contact our <strong>24/7/365 </strong>Security Operations Team or reach out to your client experience manager.  </li>
</ul>



<h2 class="wp-block-heading">Windows 11 End of Support</h2>



<p>As of November 2025, Microsoft has officially ended support for earlier versions of Windows 11 (listed below). </p>



<ul class="wp-block-list">
<li>Windows 11 version 21H2 (All Editions) </li>



<li>Windows 11 version 22H2 (All Editions) </li>



<li>Windows 11 version 23H2 (Home &amp; Pro) </li>
</ul>



<p>We would also like to highlight several upcoming <strong>End of Support</strong> dates for the following Windows releases: </p>



<ul class="wp-block-list">
<li>Windows 11 version 23H2 <strong>(Enterprise &amp; Education)</strong> – Support ends <strong>November 10, 2026</strong>. After this date, these editions will no longer receive security updates or fixes. </li>



<li>Windows 11 version 24H2 <strong>(Home &amp; Pro)</strong> – Support ends <strong>October 13, 2026</strong>. Devices running these editions should be upgraded before this date to remain supported and secure. </li>
</ul>



<p>Fortress recommends reviewing device inventories ahead of these deadlines to ensure systems are upgraded in advance and remain within a supported lifecycle.&nbsp;</p>



<p>* Some specialized editions of Windows 11 24H2 (e.g. Long Term Support Cycle) will continue to receive extended support through 2029. However, for all other editions we recommend upgrading to Windows 11 <strong>25H2. </strong> </p>



<h2 class="wp-block-heading">Windows Server 2016 End of Support</h2>



<p>Support for Windows Server 2016 is scheduled to end on&nbsp;<strong>January 12, 2027</strong>, which is now less than a year away. After this date, Microsoft will no longer provide security updates, bug fixes, or technical support for the platform.&nbsp;</p>



<p>Organizations still running Windows Server 2016 should begin planning upgrade or migration strategies to avoid increased security risk and compliance concerns once support ends.&nbsp;</p>



<p>Fortress recommends reviewing affected systems early to allow sufficient time for testing, upgrades, or workload migration before the end-of-support deadline.&nbsp;</p>



<h5 class="wp-block-heading">Need help planning your transition?</h5>



<p>Fortress SRM can help assess your environment, prioritize upgrades, and ensure your endpoints remain patch-compliant and secure.</p>



<h2 class="wp-block-heading">Patch Tuesday Summary</h2>



<p><strong>Microsoft March 2026 Patch Tuesday</strong> <br><strong>83</strong> vulnerabilities disclosed, including <strong>3 critical</strong> and <strong>2 zero-days</strong>. By category:</p>



<ul class="wp-block-list">
<li><strong>43</strong> Elevation of Privilege </li>



<li><strong>17</strong> Remote Code Execution </li>



<li><strong>9 </strong>Information Disclosure </li>



<li><strong>4</strong> Denial of Service </li>



<li><strong>4 </strong>Spoofing </li>



<li><strong>2 </strong>Denial of Service</li>
</ul>



<h2 class="wp-block-heading">Critical Common Vulnerabilities and Exposures (CVEs)</h2>



<h3 class="wp-block-heading">Windows Zero-Days</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Details</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-26127</strong>&nbsp;</td><td>.NET Denial of Service Vulnerability&nbsp;</td><td><strong>Important</strong>&nbsp;</td><td><strong>No, publicly disclosed</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-21262</strong>&nbsp;</td><td>SQL Server Elevation of Privilege Vulnerability&nbsp;</td><td><strong>Important</strong>&nbsp;</td><td><strong>No, publicly disclosed</strong>&nbsp;</td></tr></tbody></table></figure>



<h3 class="wp-block-heading">Other Critical CVE&#8217;s Worth Mentioning</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Details</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-26144</strong>&nbsp;</td><td>Microsoft Excel Information Disclosure Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-26110</strong>&nbsp;</td><td>Microsoft Office Remote Code Execution Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-26113</strong>&nbsp;</td><td>Microsoft Office Remote Code Execution Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://msrc.microsoft.com/update-guide/releaseNote/2026-Mar" target="_blank" rel="noreferrer noopener"><em><strong>Microsoft March 2026 Security Update Release</strong></em></a></p>



<h3 class="wp-block-heading">3rd Party Critical CVE&#8217;s Worth Mentioning</h3>



<h4 class="wp-block-heading">Adobe Products *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Affected&nbsp;Product</strong>&nbsp;</td><td><strong>Critical Issues</strong>&nbsp;</td><td><strong>Key Risks</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-21361</strong>&nbsp;<strong>CVE-2026-21284</strong>&nbsp;<strong>CVE-2026-21289</strong>&nbsp;<strong>CVE-2026-21290</strong>&nbsp;<strong>CVE-2026-21311</strong>&nbsp;<strong>CVE-2026-21309</strong>&nbsp;</td><td>Adobe Commerce&nbsp;</td><td><strong>6 Critical,&nbsp;10 Important, 3 Moderate</strong>&nbsp;</td><td><strong>Security feature bypass,</strong>&nbsp;<strong>Privilege escalation</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-21333</strong>&nbsp;<strong>CVE-2026-21362</strong>&nbsp;<strong>CVE-2026-27271</strong>&nbsp;<strong>CVE-2026-27272</strong>&nbsp;<strong>CVE-2026-27267</strong>&nbsp;</td><td>Adobe Illustrator&nbsp;</td><td><strong>5 Critical, 2 Important</strong>&nbsp;</td><td><strong>Arbitrary&nbsp;code&nbsp;execution</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-27267</strong>&nbsp;<strong>CVE-2026-27268</strong>&nbsp;<strong>CVE-2026-27270</strong>&nbsp;<strong>CVE-2026-21363</strong>&nbsp;<strong>CVE-2026-21364</strong>&nbsp;<strong>CVE-2026-21365</strong>&nbsp;<strong>CVE-2026-27214</strong>&nbsp;<strong>CVE-2026-27215</strong>&nbsp;<strong>CVE-2026-27216</strong>&nbsp;<strong>CVE-2026-27217</strong>&nbsp;<strong>CVE-2026-27218</strong>&nbsp;<strong>CVE-2026-27219</strong>&nbsp;</td><td>Adobe Substance 3D Painter&nbsp;</td><td><strong>9 Important</strong>&nbsp;</td><td><strong>Memory exposure, arbitrary code execution,&nbsp;Application denial-of-service</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-27220</strong>&nbsp;<strong>CVE-2026-27278</strong>&nbsp;</td><td>Adobe Acrobat Reader&nbsp;</td><td><strong>2 Critical, 1 Important</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-27269</strong>&nbsp;</td><td>Adobe Premier Pro&nbsp;</td><td><strong>1 Critical</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-27223 through CVE-2026-27266</strong>&nbsp;</td><td>Adobe Experience Manager&nbsp;</td><td><strong>33 Important</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-27273</strong>&nbsp;<strong>CVE-2026-27274</strong>&nbsp;<strong>CVE-2026-27275</strong>&nbsp;<strong>CVE-2026-27276</strong>&nbsp;<strong>CVE-2026-27277</strong>&nbsp;<strong>CVE-2026-27279</strong>&nbsp;</td><td>Adobe Substance 3D Stager&nbsp;</td><td><strong>6 Critical</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-27280</strong>&nbsp;<strong>CVE-2026-27281</strong>&nbsp;</td><td>Adobe DNG SDK&nbsp;</td><td><strong>1 Critical, 1 Important</strong>&nbsp;</td><td><strong>Arbitrary Code Execution</strong><strong>,     </strong><strong> </strong>&nbsp;<strong>Application denial-of-service</strong><strong>  </strong><strong> </strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://helpx.adobe.com/security/security-bulletin.html" target="_blank" rel="noreferrer noopener"><em><strong>Adobe Security Bulletins</strong></em></a></p>



<h4 class="wp-block-heading">Cisco *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Affected Product</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-20131</strong>&nbsp;</td><td>Cisco Secure Firewall Management Center (FMC)&nbsp;</td><td>A vulnerability in the web-based management interface could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device.&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-20079</strong>&nbsp;</td><td>Cisco Secure Firewall Management Center (FMC)&nbsp;</td><td>A vulnerability in the web interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass authentication and execute script files on an affected device to obtain root access to the underlying operating system.&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-20122</strong>&nbsp;<strong>CVE-2026-20126</strong>&nbsp;<strong>CVE-2026-20128</strong>&nbsp;</td><td>Cisco Catalyst SD-WAN Manager&nbsp;</td><td>Multiple vulnerabilities could allow an attacker to access an affected system, elevate privileges to root, gain access to sensitive information, and overwrite arbitrary files.&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>Yes</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://sec.cloudapps.cisco.com/security/center/publicationListing.x" target="_blank" rel="noreferrer noopener"><em><strong>Cisco Security Advisories</strong></em></a></p>



<h4 class="wp-block-heading">Fortinet *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Affected Product</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-54820</strong>&nbsp;</td><td>FortiManager&nbsp;</td><td>A Stack-based Buffer Overflow vulnerability may allow a remote&nbsp;unauthenticatedattacker to execute unauthorized commands via crafted&nbsp;requests, ifthe service is enabled. The success of the attack depends on the ability to bypass the stack protection mechanisms.&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-22627</strong>&nbsp;</td><td>FortiSwitchAXFixed&nbsp;</td><td>A Buffer Copy without Checking Size of Input (&#8216;Classic Buffer Overflow&#8217;) vulnerability may allow an&nbsp;unauthenticatedattacker within the same adjacent network to execute unauthorized code or commands on the device via sending a crafted LLDP packet.&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://www.fortiguard.com/psirt" target="_blank" rel="noreferrer noopener"><em><strong>Fortinet PSIRT Advisories</strong></em></a></p>



<h4 class="wp-block-heading">Ivanti *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Affected Product</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-3483</strong>&nbsp;</td><td>Ivanti Desktop and Server Management (DSM)&nbsp;</td><td>An exposed dangerous method in Ivanti DSM before version&nbsp;2026.1.1allows a local authenticated attacker to escalate their privileges.&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://www.ivanti.com/blog/october-2025-security-update" target="_blank" rel="noreferrer noopener"><em><strong>Ivanti March 2026 Security Update</strong></em></a></p>



<h4 class="wp-block-heading">SAP *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Affected Component</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><strong>CVE-2019-17571</strong>&nbsp;</td><td>SAP Quotation Management Insurance application (FS-QUO)&nbsp;</td><td>Vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data.&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-27685</strong>&nbsp;</td><td>SAP NetWeaver Enterprise Portal Administration&nbsp;</td><td>Vulnerable if a privileged user uploads untrusted or malicious content that, upon deserialization, could result in a high impact on the confidentiality, integrity, and availability of the host system.&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-27689</strong>&nbsp;</td><td>SAP Supply Chain Management&nbsp;</td><td>Due to an uncontrolled resource consumption (Denial of Service) vulnerability, an authenticated attacker with regular user privileges and network access can repeatedly invoke a remote-enabled function module with an excessively large loop-control parameter.&nbsp;&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://support.sap.com/en/my-support/knowledge-base/security-notes-news/march-2026.html" target="_blank" rel="noreferrer noopener"><em><strong>SAP March 2026 Security Notes</strong></em></a></p>



<h4 class="wp-block-heading">VEEAM *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Affected Component</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-21666CVE-2026-21667</strong>&nbsp;</td><td>Backup Server&nbsp;</td><td>A vulnerability allowing an authenticated domain user to perform remote code execution (RCE).&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-21708</strong>&nbsp;</td><td>Windows-based Veeam Backup &amp; Replication | Veeam Software Appliance&nbsp;</td><td>A vulnerability allowing a Backup Viewer to perform remote code execution (RCE) as the&nbsp;postgres&nbsp;user.&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-21669</strong>&nbsp;</td><td>Windows-based Veeam Backup &amp; Replication&nbsp;</td><td>A vulnerability allowing an authenticated domain user to perform remote code execution (RCE) on the Backup Server.&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-21671</strong>&nbsp;</td><td>Veeam Software Appliance&nbsp;</td><td>A vulnerability allowing an authenticated user with the Backup Administrator role to perform remote code execution (RCE) in high availability (HA) deployments of Veeam Backup &amp; Replication.&nbsp;&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-21668</strong>&nbsp;</td><td>Backup Repository&nbsp;</td><td>A vulnerability allowing an authenticated domain user to bypass restrictions and manipulate arbitrary files.&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-21672</strong>&nbsp;</td><td>Veeam Backup &amp; Replication servers&nbsp;</td><td>A vulnerability allowing local privilege escalation on Windows-basedservers.&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-21670</strong>&nbsp;</td><td>Windows-based Veeam Backup &amp; Replication | Veeam Software Appliance&nbsp;</td><td>A vulnerability allowing a low-privileged user to extract saved SSH credentials.&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://www.veeam.com/knowledge-base.html" target="_blank" rel="noreferrer noopener"><em><strong>VEEAM KB Notes</strong></em></a></p>



<h3 class="wp-block-heading">Google Chrome</h3>



<ul class="wp-block-list">
<li><strong>Version:</strong> 146.0.7680.71/72 (Windows and Mac), 146.0.7680.71 (Linux)  </li>



<li><strong>Release Date:</strong> Tuesday, March 10, 2026 </li>
</ul>



<p><a href="https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html" target="_blank" rel="noreferrer noopener"><em><strong>Chrome Release Notes</strong></em></a></p>



<p><em>* Not handled by Fortress SRM.</em>&nbsp;</p>



<h2 class="wp-block-heading">Threat Intelligence Trends – March 2026</h2>



<p>The following resources are grouped by threat type / category.&nbsp;</p>



<h3 class="wp-block-heading">Emerging Threats</h3>



<p><strong>Interplay between Iranian Targeting of IP Cameras and Physical Warfare in the Middle East  </strong> Check Point Research observed a surge in Iranian‑linked attempts to compromise IP cameras across Israel, Gulf states, Lebanon, and Cyprus, beginning February 28, 2026. The targeting appears to support battlefield intelligence and potential missile operations, with earlier activity aligning to geopolitical flashpoints such as Iran’s temporary airspace closure.  <br><a href="https://research.checkpoint.com/2026/interplay-between-iranian-targeting-of-ip-cameras-and-physical-warfare-in-the-middle-east/" target="_blank" rel="noreferrer noopener"><em><strong>Read more</strong></em></a></p>



<p><strong>China‑Nexus Activity Against Qatar Observed Amid Expanding Regional Tensions  </strong> <br>Check Point Research observed increased activity from Chinese‑nexus APT groups targeting Qatar, including attempts by the Camaro Dragon threat actor to deploy PlugX malware within one day of the Middle East escalation. The attackers leveraged ongoing regional conflict to craft credible lures and rapidly adapt operations, highlighting China‑linked actors’ agility and expanding focus on the Gulf region. <br><strong><a href="https://blog.checkpoint.com/research/china-nexus-activity-against-qatar-observed-amid-expanding-regional-tensions/" target="_blank" rel="noreferrer noopener"><em>Read more</em></a>   </strong></p>



<p><strong>Iranian MOIS Actors &amp; the Cyber Crime Connection  </strong> <br>Check Point Research reports that Iranian Ministry of Intelligence and Security (MOIS)–linked groups, including Void Manticore and MuddyWater, are increasingly leveraging cybercriminal tools, services, and infrastructure to support state objectives. This convergence enhances operational capabilities, expands deniability, and blurs attribution as Iranian actors adopt ransomware branding, commercial infostealers, and criminal‑ecosystem tradecraft. <br><a href="https://research.checkpoint.com/2026/iranian-mois-actors-the-cyber-crime-connection/" target="_blank" rel="noreferrer noopener"><em><strong>Read more</strong></em></a></p>



<p><strong>Iran-Linked MuddyWater Deploys New Dindoor Malware Against U.S. Networks  </strong> <br>SOCRadar reports that Iranian APT MuddyWater (Seedworm) targeted multiple U.S. organizations—including a bank, airport, nonprofit, and a defense‑linked software firm—using a newly discovered backdoor called Dindoor. The campaign, active since early 2026, also leveraged a second backdoor (Fakeset) and attempted data exfiltration via Rclone, underscoring the group’s expanding espionage capabilities during heightened geopolitical tensions. <br><a href="https://socradar.io/blog/iran-muddywater-dindoor-malware-us-networks/" target="_blank" rel="noreferrer noopener"><em><strong>Read more</strong></em></a></p>



<h3 class="wp-block-heading">Social Engineering Attacks</h3>



<p><strong>Criminals Impersonating City and County Officials in Phishing Emails for Planning and Zoning Permits  </strong> <br>The FBI warns of a phishing scheme in which criminals impersonate city and county planning and zoning officials to solicit fraudulent payments. Attackers use real permit information and professional‑looking emails to deceive victims into sending money via wire transfer, peer‑to‑peer apps, or cryptocurrency. <br><a href="https://www.ic3.gov/PSA/2026/PSA260309" target="_blank" rel="noreferrer noopener"><em><strong>Read more</strong></em></a></p>



<p><strong>New A0Backdoor Linked to Teams Impersonation and Quick Assist Social Engineering</strong><br>BlueVoyant researchers identified a campaign where attackers impersonate IT staff on Microsoft Teams, use email bombing to create urgency, and convince victims to grant remote access through Quick Assist. Once on the device, the threat actors sideload malicious DLLs via digitally signed MSI packages to deploy the new A0Backdoor, which uses anti‑sandbox techniques and covert DNS MX‑based command‑and‑control.  <br><a href="https://www.bluevoyant.com/blog/new-a0backdoor-linked-to-teams-impersonation-and-quick-assist-social-engineering" target="_blank" rel="noreferrer noopener"><em><strong>Read more</strong></em></a></p>



<p><strong>Hackers Mimic LastPass Support Emails to Steal Vault Passwords</strong> <br>A new phishing campaign impersonates LastPass support by forwarding fake email threads and using display‑name spoofing to create urgency around supposed unauthorized account activity. Victims are funneled to fake login pages on domains like verify‑lastpass[.]com, where attackers harvest vault master passwords. <br><a href="https://www.bleepingcomputer.com/news/security/fake-lastpass-support-email-threads-try-to-steal-vault-passwords/" target="_blank" rel="noreferrer noopener"><em><strong>Read more</strong></em></a></p>



<p><strong>Starkiller Phishing Kit  </strong> <br>Researchers at Abnormal uncovered Starkiller, a commercial‑grade phishing kit that proxies real login pages in real time to steal credentials and bypass MFA. By loading genuine sites through attacker‑controlled infrastructure, it captures every keystroke and authentication token while remaining nearly impossible for victims to distinguish from the real thing. <br><a href="https://abnormal.ai/blog/starkiller-phishing-kit" target="_blank" rel="noreferrer noopener"><em><strong>Read more</strong></em></a></p>



<h3 class="wp-block-heading">Ransomware &amp; Malware Deployment</h3>



<p><strong>Hudson Rock Identifies Real‑World Infostealer Infection Targeting OpenClaw Configurations</strong><br>Hudson Rock discovered the first live case of an infostealer exfiltrating OpenClaw AI‑agent configuration files, marking a major shift from credential theft to stealing tokens, private keys, and personal AI “identity” data. The malware, likely a Vidar variant, used a broad file‑grabbing routine to sweep the victim’s .openclaw directory, capturing gateway tokens, cryptographic keys, and context files that could enable full impersonation of the user’s AI agent. <br><a href="https://www.infostealers.com/article/hudson-rock-identifies-real-world-infostealer-infection-targeting-openclaw-configurations/" target="_blank" rel="noreferrer noopener"><em><strong>Read more</strong></em></a></p>



<p><strong>PromptSpy Ushers in a New Era of Android Threats Using GenAI  </strong> <br>ESET researchers uncovered PromptSpy, the first known Android malware to abuse generative AI—specifically Google’s Gemini—to analyze on‑screen elements and guide malicious UI actions for persistence. The malware deploys a built‑in VNC module for remote access, captures lockscreen data, blocks uninstallation with invisible overlays, and primarily targets users in Argentina. <br><a href="https://www.welivesecurity.com/en/eset-research/promptspy-ushers-in-era-android-threats-using-genai/" target="_blank" rel="noreferrer noopener"><em><strong>Read more</strong></em></a></p>



<h3 class="wp-block-heading">Cloud &amp; Infrastructure Exploits</h3>



<p><strong>PayPal February 2026 Data Breach Notification  </strong> <br>A coding error in PayPal’s Working Capital loan application exposed sensitive customer data—including names, contact details, Social Security numbers, and dates of birth—from July to December 2025. PayPal reset affected account passwords, issued refunds for unauthorized transactions, and is offering two years of complimentary Equifax credit monitoring to impacted users.  <br><a href="https://www.documentcloud.org/documents/27345193-paypal-february-2026-breach-notification/" target="_blank" rel="noreferrer noopener"><em><strong>Read more</strong></em></a> </p>



<p><strong>Protecting Your Data: Essential Actions to Secure Experience Cloud Guest User Access  </strong> Salesforce warns that threat actors are exploiting misconfigured Experience Cloud guest user settings, allowing unauthorized access to CRM data through a modified AuraInspector scanning tool. The activity stems from overly permissive customer‑configured guest profiles—not a platform vulnerability—and organizations are urged to audit permissions and apply least‑privilege controls immediately. <br><strong><a href="https://www.salesforce.com/blog/protecting-your-data-essential-actions-to-secure-experience-cloud-guest-user-access/" target="_blank" rel="noreferrer noopener"><em>Read more</em></a> </strong></p>



<h2 class="wp-block-heading">Recommended Actions</h2>



<h3 class="wp-block-heading">Mitigations</h3>



<ul class="wp-block-list">
<li>Enforce <strong>strong network segmentation</strong>, isolating OT, surveillance systems, and any public‑facing IoT devices. </li>



<li>Mandate <strong>firmware updates</strong> for all IP cameras and IoT appliances; disable UPnP and unnecessary remote access. </li>



<li>Harden SQL, SharePoint, VPNs, and remote‑access infrastructure—common targets for MOIS- and Chinese‑linked APT groups. </li>



<li>Require <strong>privileged access management (PAM)</strong> for all admin accounts with MFA enforced. </li>



<li>Block high‑risk file types and disable macros for Office installations organization‑wide. </li>



<li>Enforce <strong>strict egress filtering</strong> to prevent exfiltration via Rclone or unauthorized cloud apps. </li>



<li>Deploy <strong>application allowlisting</strong> on critical assets to prevent execution of tools like PlugX or Dindoor/Fakeset backdoors. </li>
</ul>



<h3 class="wp-block-heading">Monitoring/Detection</h3>



<h4 class="wp-block-heading">Emerging Threat &amp; APT Activity</h4>



<ul class="wp-block-list">
<li>Track sudden login attempts from Middle East or APAC IP ranges, especially involving VPNs, O365, or identity providers. </li>



<li>Monitor IP camera and IoT behavior, including unusual outbound traffic to unknown cloud hosts or uncommon ports. </li>



<li>Alert on high‑volume ZIP/RAR creation, staging directories, or command‑line compressions commonly used during espionage operations. </li>



<li>Enable robust logging for PowerShell, WMI, LDAP queries, and movement patterns associated with MuddyWater, Void Manticore, and other Iranian/Chinese‑linked threat actors. </li>



<li>Detect PlugX, Dindoor, or Fakeset indicators such as DLL sideloading, unexpected scheduled tasks, anomalous service creation, or DNS queries with NXDOMAIN‑heavy patterns. </li>
</ul>



<h4 class="wp-block-heading">Social Engineering Campaigns</h4>



<ul class="wp-block-list">
<li>Flag email bombing campaigns targeting user inboxes, a common precursor to Teams impersonation and IT-helpdesk spoofing. </li>



<li>Monitor for unexpected Teams messages from external domains or newly created internal accounts. </li>



<li>Detect connections to typosquatted or newly registered LastPass‑themed domains, especially involving password reset attempts. </li>



<li>Identify Quick Assist sessions that were not initiated by IT and unusual MSI installation activity from temporary directories. </li>
</ul>



<h4 class="wp-block-heading">Ransomware &amp; Infostealers</h4>



<ul class="wp-block-list">
<li>Monitor access to sensitive directories, especially:  <br>&#8211; .openclaw, AI-agent configs, .json, .pem, .token files </li>



<li>Alert on high volume file reads and broad file grabbing behavior typical of Vidar or similar infostealers.  </li>



<li>Detect outbound connections to:  <br>&#8211; Pastebin-style data dump sites <br>&#8211; Temporary file sharing domains <br>&#8211; DNS MX–based C2 traffic (used by A0Backdoor) </li>
</ul>



<h4 class="wp-block-heading">Cloud &amp; Infrastructure Exploits</h4>



<ul class="wp-block-list">
<li>Implement continuous monitoring of:  <br>&#8211; Salesforce guest user permissions <br>&#8211; Public/guest object exposure <br>&#8211; Audit logs for unexpected API usage </li>



<li>In payment/finance systems, monitor:  <br>&#8211; Bulk access to PII <br>&#8211; Scripted or automated form submissions <br>&#8211; Authentication failures followed by password resets </li>
</ul>



<h2 class="wp-block-heading"><strong>About Fortress SRM’s Vigilant Managed Cyber Hygiene Offering</strong>&nbsp;</h2>



<h3 class="wp-block-heading">Why Patching Matters</h3>



<p>Unpatched software is a leading cause of breaches—nearly 1 in 3 attacks exploit known vulnerabilities.&nbsp;</p>



<h3 class="wp-block-heading">Vigilant Managed Cyber Hygiene</h3>



<p> Fortress SRM’s Vigilant Managed Cyber Hygiene simplifies patch management.&nbsp;</p>



<ul class="wp-block-list">
<li>Automated updates with 97%+ success rate for Microsoft &amp; 100+ third-party applications&nbsp;</li>



<li>Critical patches, OS upgrades, and configuration updates for all devices, on/off network&nbsp;</li>



<li>24/7/365 U.S.-based monitoring and real-time reporting for full visibility&nbsp;</li>
</ul>



<h4 class="wp-block-heading">Stay Protected. Stay Proactive. </h4>



<p><a href="https://fortresssrm.com/managed-security/" target="_blank" rel="noreferrer noopener"><strong>Learn how Fortress SRM can enhance your cybersecurity strategy</strong></a></p>
<p>The post <a href="https://fortresssrm.com/threat-and-security-update-march-2026/">Threat and Security Update – March, 2026</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Threat and Security Update – February, 2026</title>
		<link>https://fortresssrm.com/threat-and-security-update-february-2026/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Fri, 20 Feb 2026 15:49:50 +0000</pubDate>
				<category><![CDATA[Threat & Security Updates]]></category>
		<guid isPermaLink="false">https://fortresssrm.com/?p=1867</guid>

					<description><![CDATA[<p>Stay Ahead of Threats with the Latest Vulnerability Updates for February Stay up to date on critical cyber risks, Microsoft’s February Patch Tuesday, and other notable third-party vulnerabilities. Timely patching ...</p>
<p>The post <a href="https://fortresssrm.com/threat-and-security-update-february-2026/">Threat and Security Update – February, 2026</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading"><br>Stay Ahead of Threats with the Latest Vulnerability Updates for February</h3>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Stay up to date on critical cyber risks, Microsoft’s February Patch Tuesday, and other notable third-party vulnerabilities. Timely patching is key to maintaining a strong security posture and protecting your business from threats. </p>



<h3 class="wp-block-heading">Quick Highlights</h3>



<ul class="wp-block-list">
<li><strong>Microsoft Patch Tuesday:</strong> <br>&#8211; <strong>59 vulnerabilities</strong> disclosed<br>&#8211; 5 rated <strong>Critical</strong>, 6 are <strong>Zero-Day</strong> (6 actively exploited, 3 publicly disclosed)  </li>
</ul>



<ul class="wp-block-list">
<li><strong>High-Severity Advisories from Major Vendors:</strong> <br>&#8211; <strong>Adobe: </strong>44 vulnerabilities patched across 9 products <br>&#8211; <strong>Cisco: </strong>2 high-severity flaws, affecting Cisco Meeting Management, Cisco TelePresenceCollaboration Endpoint (CE) Software and Cisco RoomOS Software <br>&#8211; <strong>Fortinet: </strong>2 high-severity flaws in FortiSandbox and FortiOS <br>&#8211; <strong>SAP: </strong>2 critical vulnerabilities in SAP NetWeaver Application Server, SAP CRM and SAP S/4HANA <br>&#8211; <strong>Ivanti: </strong>2 high-severity flaws in Ivanti Endpoint Manager (EPM)  </li>
</ul>



<ul class="wp-block-list">
<li><strong>Top Threats to Watch:</strong> <br>&#8211; <strong>State‑linked impersonation and infiltration campaigns, </strong>including DPRK operatives using stolen LinkedIn identities to gain corporate access. <br>&#8211; <strong>Multi‑stage adversary‑in‑the‑middle (AiTM) phishing &amp; BEC operations, </strong>particularly those abusing SharePoint and session-cookie theft for lateral expansion. </li>
</ul>



<h2 class="wp-block-heading">Windows 10 Reaches End of Support</h2>



<p>As of <strong>October 14, 2025</strong>, Microsoft has officially ended support for Windows 10. October 2025’s Patch Tuesday was the <strong>final security update</strong> for the OS—unless your organization enrolls in the <strong>Extended Security Updates (ESU)</strong> program. </p>



<ul class="wp-block-list">
<li><strong>What This Means for Your Organization:</strong>&nbsp;<br>&#8211; No more security patches or bug fixes for Windows 10 devices&nbsp;&nbsp;<br>&#8211; Increased exposure to vulnerabilities and compliance risks&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Continued support requires either:&nbsp;&nbsp;<br>&#8211; Enrolling in Microsoft’s&nbsp;<strong>paid ESU program</strong>, or&nbsp;&nbsp;<br>&#8211; <strong><strong>Upgrading to Windows 11</strong></strong>&nbsp;</li>
</ul>



<p><strong>Need help planning your transition?</strong>&nbsp;<br>Fortress SRM can help assess your environment, prioritize upgrades, and ensure your endpoints&nbsp;remain&nbsp;patch-compliant and secure.</p>



<h2 class="wp-block-heading">Patch Tuesday Summary</h2>



<p><strong>Microsoft February 2026 Patch Tuesday</strong> <br>59 vulnerabilities disclosed, including 5 critical and<strong> </strong>6 zero-days. By category:</p>



<ul class="wp-block-list">
<li><strong>23</strong> Elevation of Privilege </li>



<li><strong>13</strong> Remote Code Execution </li>



<li><strong>7 </strong>Spoofing</li>



<li><strong>6 </strong>Information Disclosures</li>



<li><strong>6 </strong>Security Feature Bypass</li>



<li><strong>3 </strong>Denial of Service</li>
</ul>



<h2 class="wp-block-heading">Critical Common Vulnerabilities and Exposures (CVEs)</h2>



<h3 class="wp-block-heading">Windows Zero-Days</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Details</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-21510</strong>&nbsp;</td><td>Windows Shell Security Feature Bypass Vulnerability&nbsp;</td><td><strong>Important</strong>&nbsp;</td><td>Yes, also publicly disclosed&nbsp;</td></tr><tr><td><strong>CVE-2026-21514</strong>&nbsp;</td><td>Microsoft Word Security Feature Bypass Vulnerability&nbsp;</td><td><strong>Important</strong>&nbsp;</td><td>Yes, also publicly disclosed&nbsp;</td></tr><tr><td><strong>CVE-2026-21513</strong>&nbsp;</td><td>MSHTML Framework Security Feature Bypass Vulnerability&nbsp;</td><td><strong>Important</strong>&nbsp;</td><td>Yes, also publicly disclosed&nbsp;</td></tr><tr><td><strong>CVE-2026-21519</strong>&nbsp;</td><td>Desktop Window Manager Elevation of Privilege Vulnerability&nbsp;</td><td><strong>Important&nbsp;</strong>&nbsp;</td><td>Yes&nbsp;</td></tr><tr><td><strong>CVE-2026-21533</strong>&nbsp;</td><td>Windows Remote Desktop Services Elevation of Privilege Vulnerability&nbsp;</td><td><strong>Important</strong>&nbsp;</td><td>Yes&nbsp;</td></tr><tr><td><strong>CVE-2026-21525</strong>&nbsp;</td><td>Windows Remote Access Connection Manager Denial of Service Vulnerability&nbsp;</td><td><strong>Moderate</strong>&nbsp;</td><td>Yes&nbsp;</td></tr></tbody></table></figure>



<h3 class="wp-block-heading">Other Critical CVE&#8217;s Worth Mentioning</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Details</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-21522</strong>&nbsp;</td><td>Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td>No&nbsp;</td></tr><tr><td><strong>CVE-2026-23655</strong>&nbsp;</td><td>Microsoft ACI Confidential Containers Information Disclosure Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td>No&nbsp;</td></tr><tr><td><strong>CVE-2016-9535</strong>&nbsp;</td><td>MITRE CVE-2016-9535:&nbsp;LibTIFF&nbsp;Heap Buffer Overflow Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td>No&nbsp;</td></tr><tr><td><strong>CVE-2026-24300</strong>&nbsp;</td><td>Azure Front Door Elevation of Privilege Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td>No&nbsp;</td></tr><tr><td><strong>CVE-2026-21531</strong>&nbsp;</td><td>Azure SDK for Python Remote Code Execution Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td>No&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://msrc.microsoft.com/update-guide/releaseNote/2026-Feb" target="_blank" rel="noreferrer noopener"><strong><em>Microsoft February 2026 Security Update Release</em></strong></a></p>



<h3 class="wp-block-heading">3rd Party Critical CVE&#8217;s Worth Mentioning</h3>



<h4 class="wp-block-heading">Adobe Products *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>Affected Product&nbsp;</strong>&nbsp;</td><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Critical Issues</strong>&nbsp;</td><td><strong>Key Risks</strong>&nbsp;</td></tr><tr><td><strong>Adobe Audition</strong>&nbsp;</td><td>CVE-2026-21312&nbsp;</td><td><strong>1&nbsp;Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;</td></tr><tr><td><strong>Adobe After Effects</strong>&nbsp;</td><td>CVE-2026-21318&nbsp;CVE-2026-21320&nbsp;CVE-2026-21321&nbsp;CVE-2026-21322&nbsp;CVE-2026-21323&nbsp;CVE-2026-21324&nbsp;CVE-2026-21325&nbsp;CVE-2026-21326&nbsp;CVE-2026-21327&nbsp;CVE-2026-21328&nbsp;CVE-2026-21329&nbsp;CVE-2026-21330&nbsp;CVE-2026-21351&nbsp;</td><td><strong>13&nbsp;Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;</td></tr><tr><td><strong>Adobe InDesign</strong>&nbsp;</td><td>CVE-2026-21357&nbsp;</td><td><strong>1&nbsp;Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;</td></tr><tr><td><strong>Adobe Substance 3D Designer</strong>&nbsp;</td><td>CVE-2026-21334&nbsp;CVE-2026-21335&nbsp;</td><td><strong>2&nbsp;Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;</td></tr><tr><td><strong>Adobe Substance 3D Stager</strong>&nbsp;</td><td>CVE-2026-21341&nbsp;CVE-2026-21342&nbsp;CVE-2026-21343&nbsp;CVE-2026-21344&nbsp;CVE-2026-21345&nbsp;</td><td><strong>5&nbsp;Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;</td></tr><tr><td><strong>Adobe Bridge</strong><strong> </strong>&nbsp;</td><td>CVE-2026-21346&nbsp;CVE-2026-21347&nbsp;</td><td><strong>2&nbsp;Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;</td></tr><tr><td><strong>Lightroom Classic</strong>&nbsp;</td><td>CVE-2026-21349&nbsp;</td><td><strong>1&nbsp;Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;</td></tr><tr><td><strong>Adobe DNG Software Development Kit (SDK)</strong>&nbsp;</td><td>CVE-2026-21349&nbsp;CVE-2026-21352&nbsp;CVE-2026-21353&nbsp;</td><td><strong>3&nbsp;Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://helpx.adobe.com/security/security-bulletin.html" target="_blank" rel="noreferrer noopener"><strong><em>Adobe Security Bulletins</em></strong></a></p>



<h4 class="wp-block-heading">Cisco *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>Affected Product</strong>&nbsp;</td><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><strong>Cisco&nbsp;TelePresenceCollaboration Endpoint (CE) Software and Cisco&nbsp;RoomOSSoftware</strong>&nbsp;</td><td>CVE-2026-20119&nbsp;</td><td>A vulnerability in the text rendering subsystem could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.&nbsp;</td><td><strong>High</strong>&nbsp;</td><td>No&nbsp;</td></tr><tr><td><strong>Cisco Meeting Management</strong>&nbsp;</td><td>CVE-2026-20098&nbsp;</td><td>A vulnerability in the Certificate Management feature could allow an authenticated, remote attacker to upload arbitrary files, execute arbitrary commands, and elevate privileges to root on an affected system.&nbsp;</td><td><strong>High</strong>&nbsp;</td><td>No&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://sec.cloudapps.cisco.com/security/center/publicationListing.x" target="_blank" rel="noreferrer noopener"><strong><em>Cisco Security Advisories</em></strong></a></p>



<h4 class="wp-block-heading">Fortinet *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>Affected Product</strong>&nbsp;</td><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><strong>FortiSandbox</strong>&nbsp;</td><td>CVE-2025-52436&nbsp;</td><td>An Improper Neutralization of Input During Web Page Generation (&#8216;Cross-site Scripting&#8217;) vulnerability may allow an&nbsp;unauthenticatedattacker to execute commands via crafted requests.&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><strong>FortiOS</strong>&nbsp;</td><td>CVE-2026-22153&nbsp;</td><td>An Authentication Bypass by Primary Weakness vulnerability may allow an unauthenticated attacker to bypass LDAP authentication of Agentless VPN or FSSO policy, under specific LDAP server configuration.&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://www.fortiguard.com/psirt" target="_blank" rel="noreferrer noopener"><strong><em>Fortinet PSIRT Advisories</em></strong></a></p>



<h4 class="wp-block-heading">Ivanti *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>Affected Product&nbsp;</strong>&nbsp;</td><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><strong>Ivanti Endpoint Manager (EPM)</strong>&nbsp;</td><td>CVE-2026-1602&nbsp;CVE-2026-1603&nbsp;</td><td>Ivanti has released updates for Ivanti Endpoint Manager which addresses one high severity vulnerability and one medium severity vulnerability. Successful exploitation could allow a remote authenticated attacker to leak arbitrary data or compromise user sessions.&nbsp;</td><td><strong>High</strong>&nbsp;</td><td>No&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://www.ivanti.com/blog/february-2026-security-update" target="_blank" rel="noreferrer noopener"><strong><em>Ivanti February 2026 Security Update</em></strong></a></p>



<h4 class="wp-block-heading">SAP *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>Affected Component&nbsp;</strong>&nbsp;</td><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><strong>SAP NetWeaver Application Server</strong>&nbsp;</td><td>CVE-2026-0488&nbsp;</td><td>This vulnerability allows an authenticated, low-privileged user to perform background Remote Function Calls without the required S_RFC authorization in certain cases.&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td>No&nbsp;</td></tr><tr><td><strong>SAP CRM and SAP S/4HANA</strong>&nbsp;</td><td>CVE-2026-0509&nbsp;</td><td>An authenticated could exploit a flaw in a generic function module&nbsp;call&nbsp;and execute unauthorized critical functionalities, which includes the ability to execute an arbitrary SQL statement.&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td>No&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://support.sap.com/en/my-support/knowledge-base/security-notes-news/february-2026.html" target="_blank" rel="noreferrer noopener"><strong><em>SAP February 2026 Security Notes</em></strong></a></p>



<h3 class="wp-block-heading">Google Chrome</h3>



<ul class="wp-block-list">
<li><strong>Version: </strong>145.0.7632.75/76 (Windows and Mac), 145.0.7632.75 (Linux) </li>



<li><strong>Release Date:</strong> Friday, February 13, 2026 </li>



<li><strong>Key Fixes: </strong>High<strong> </strong>CVE-2026-2441 currently exploited in the wild. <strong> </strong> </li>
</ul>



<p><a href="https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_13.html" target="_blank" rel="noreferrer noopener"><strong><em>Chrome Release Notes</em></strong></a></p>



<p><em>* Not handled by Fortress SRM.</em>&nbsp;</p>



<h2 class="wp-block-heading">Threat Intelligence Trends – February 2026</h2>



<p>The following resources are grouped by threat type / category.&nbsp;</p>



<h3 class="wp-block-heading">Emerging Threats</h3>



<p><strong>DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies</strong> <br>North Korean IT workers are using stolen or impersonated LinkedIn profiles—with verified workplace emails and identity badges—to fraudulently secure remote jobs in Western organizations. Their objectives include generating revenue for the DPRK regime and conducting espionage by gaining access to sensitive corporate systems. <br><a href="https://thehackernews.com/2026/02/dprk-operatives-impersonate.html" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<p><strong>Resurgence of a Multi‑Stage AiTM Phishing and BEC Campaign Abusing SharePoint</strong> <br>Microsoft researchers uncovered a multi‑stage adversary‑in‑the‑middle (AiTM) phishing and business email compromise campaign targeting organizations in the energy sector, leveraging SharePoint file‑sharing services to deliver phishing payloads. The attackers used compromised trusted identities, inbox‑rule manipulation, and stolen session cookies to silently expand access across multiple organizations. <br><a href="https://www.microsoft.com/en-us/security/blog/2026/01/21/multistage-aitm-phishing-bec-campaign-abusing-sharepoint/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<p><strong>LastPass Warns of Fake Maintenance Messages Targeting Users’ Master Passwords</strong> <br>LastPass is alerting users to an active phishing campaign impersonating the service, sending emails that falsely claim urgent maintenance and instruct users to back up their vaults within 24 hours. These messages redirect victims to a phishing site designed to steal master passwords, though LastPass confirms it never asks for master passwords and is working to dismantle the malicious infrastructure. <br><a href="https://thehackernews.com/2026/01/lastpass-warns-of-fake-maintenance.html" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<p><strong>Convincing LinkedIn Comment‑Reply Tactic Used in New Phishing Campaign</strong> <br>Scammers are flooding LinkedIn posts with fake “reply” comments impersonating the platform, warning users of bogus policy violations and urging them to visit phishing links that often misuse LinkedIn’s own lnkd.in URL shortener. These deceptive replies mimic LinkedIn branding and can redirect victims through multiple malicious domains designed to harvest credentials. <br><a href="https://www.bleepingcomputer.com/news/security/convincing-linkedin-comment-reply-tactic-used-in-new-phishing/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<h3 class="wp-block-heading">Ransomware &amp; Malware Deployment</h3>



<p><strong>Fake 7‑Zip Downloads Are Turning Home PCs into Proxy Nodes</strong> <br>A lookalike 7‑Zip website is distributing a trojanized installer that secretly converts victims’ computers into residential proxy nodes, hiding behind a functional copy of the legitimate 7‑Zip program. The malware silently drops additional components (Uphero.exe, hero.exe, hero.dll) and abuses trusted channels—such as YouTube tutorials referencing the wrong download domain—to funnel users toward the malicious site. <a href="https://www.malwarebytes.com/blog/threat-intel/2026/02/fake-7-zip-downloads-are-turning-home-pcs-into-proxy-nodes" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<p><strong>Reynolds: Defense Evasion Capability Embedded in Ransomware Payload</strong> <br>A recent Reynolds ransomware campaign stood out because the payload included a bring‑your‑own‑vulnerable‑driver (BYOVD) componentdirectly inside the ransomware itself, rather than as a separate pre‑deployment tool. The bundled vulnerable NsecSoft NSecKrnl driver enables the ransomware to kill security processes, representing an unusual but increasingly common technique for defense impairment. <br><a href="https://www.security.com/threat-intelligence/black-basta-ransomware-byovd" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<p><strong>Malicious Use of Virtual Machine Infrastructure</strong> <br>Sophos researchers uncovered that bulletproof hosting providers are abusing legitimate ISPsystem virtualization infrastructure to mass‑deploy Windows virtual machines with identical autogenerated hostnames, many of which are later used in ransomware operations and other cybercriminal activity. These templated VMs have been linked to incidents involving LockBit, Qilin, BlackCat/ALPHV, NetSupportRAT, and previously exposed Conti/TrickBot operators, illustrating how large‑scale image reuse creates cover for threat actors. <a href="https://www.sophos.com/en-gb/blog/malicious-use-of-virtual-machine-infrastructure" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<p><strong>VoidLink: The Cloud‑Native Malware Framework</strong> <br>Check Point Research uncovered VoidLink, a highly modular cloud‑native Linux malware framework composed of custom loaders, implants, rootkits, and more than 30 plugin modules designed for long‑term, stealthy persistence in modern cloud and container environments. Written in Zig, VoidLink can detect major cloud platforms and container runtimes, harvest cloud and Git credentials, and uses extensive OPSEC features such as runtime code encryption, self‑deletion, and adaptive behavior to evade detection. <a href="https://research.checkpoint.com/2026/voidlink-the-cloud-native-malware-framework/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<h3 class="wp-block-heading">Cloud &amp; Infrastructure Exploits</h3>



<p><strong>Notepad++ Infrastructure Hijacked in State‑Linked Supply Chain Attack</strong> <br>Notepad++ suffered an infrastructure‑level compromise in which attackers hijacked update traffic and selectively redirected targeted users to malicious update servers, enabling delivery of a custom backdoor called *Chrysalis*. The attack did not exploit Notepad++ code but stemmed from a compromised shared hosting provider, with evidence suggesting a likely state‑sponsored threat actor. <br><a href="https://socradar.io/blog/notepad-infrastructure-hijacked/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<p><strong>Silent Push Uncovers New Magecart Network Targeting Global Payment Providers</strong> <br>Silent Push researchers discovered a long‑running web‑skimming (Magecart) campaign active since at least early 2022, involving a vast network of malicious domains injecting obfuscated JavaScript into compromised e‑commerce sites. The campaign targets major payment networks—including American Express, Diners Club, Discover, JCB, Mastercard, and UnionPay—stealing customer credit card data during checkout via fake payment forms. <br><a href="https://www.silentpush.com/blog/magecart/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<h3 class="wp-block-heading">AI-Driven Threats</h3>



<p><strong>Silent Brothers: Ollama Hosts Form Anonymous AI Network Beyond Platform Guardrails</strong> <br>SentinelOne and Censys uncovered an unmanaged, publicly accessible ecosystem of more than 175,000 exposed Ollama AI hosts across 130 countries, forming a shadow AI compute layer that operates outside standard monitoring and governance boundaries. Nearly half of these hosts are configured with tool‑calling capabilities—allowing code execution, API access, and system interaction—creating significant security risks as attackers can exploit them for automation, malware deployment, or large‑scale abuse. <br><a href="https://www.sentinelone.com/labs/silent-brothers-ollama-hosts-form-anonymous-ai-network-beyond-platform-guardrails/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<p><strong>KONNI Targets Developers With AI‑Generated PowerShell Malware</strong> <br>Check Point Research uncovered a North Korea–aligned KONNI phishing campaign targeting software developers and engineering teams across Japan, Australia, and India using AI‑generated PowerShell backdoors. The lures mimic legitimate blockchain‑related project documentation, signaling an effort to compromise development environments and access sensitive infrastructure, API keys, and cryptocurrency assets. <br><a href="https://research.checkpoint.com/2026/konni-targets-developers-with-ai-malware/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<p><strong>VoidLink: Early Evidence of Advanced AI‑Generated Malware</strong> <br>Check Point Research identified VoidLink as one of the first fully documented cases of advanced malware predominantly created through AI‑driven development, reaching a functional 88,000‑line implant in under a week. Operational security leaks exposed development artifacts—including sprint plans, specification documents, and source code—revealing that the framework was planned and built using Spec‑Driven Development, with AI generating architecture, modules, and documentation at a pace previously seen only in well‑resourced threat groups. <br><a href="https://research.checkpoint.com/2026/voidlink-early-ai-generated-malware-framework/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<h2 class="wp-block-heading">Recommended Actions</h2>



<h3 class="wp-block-heading">Mitigations</h3>



<ul class="wp-block-list">
<li><strong>Prioritize February Patch Tuesday updates </strong>across Windows, Office, and third‑party platforms (Adobe, Cisco, Fortinet, SAP, Ivanti). Ensure high‑severity vulnerabilities<strong>—</strong>especially the<strong> 6 Windows zero</strong><strong>‑</strong><strong>days</strong>—are patched immediately<strong>.</strong> </li>



<li><strong>Block and monitor impersonation risks </strong>by enforcing strong identity verification, MFA, and continuous monitoring for anomalous login patterns or new devices. </li>



<li><strong>Harden cloud and virtualization infrastructure </strong>against threats like VoidLink, ISPsystem VM abuse, and cloud‑native malware by enforcing least privilege, reviewing API keys, and monitoring for unauthorized container or VM deployments. </li>



<li><strong>Secure endpoints and browsers </strong>by restricting access to unverified download sites to prevent malware like fake 7‑Zip installers. </li>
</ul>



<h3 class="wp-block-heading">Monitoring</h3>



<ul class="wp-block-list">
<li><strong>Monitor identity platforms and email systems </strong>for indicators of AiTM activity, MFA bypass attempts, session‑cookie theft, and inbox rule manipulation. </li>



<li><strong>Watch for signs of compromised developer environments</strong>, including suspicious PowerShell execution, anomalous Git activity, or unauthorized cloud resource creation. </li>



<li><strong>Track network indicators tied to large botnets or proxy-node malware, </strong>such as unexplained outbound connections or VM instances with identical hostnames. </li>



<li><strong>Increase telemetry collection in cloud environments</strong>, focusing on unknown containers, unusual API calls, or disabled logging. </li>
</ul>



<h3 class="wp-block-heading">Detection Tips</h3>



<ul class="wp-block-list">
<li><strong>Look for MFA push fatigue patterns</strong>, unexpected MFA approvals, or sessions authenticated without corresponding MFA prompts. </li>



<li><strong>Flag AI</strong><strong>‑</strong><strong>generated PowerShell scripts </strong>or obfuscated command-line behavior linked to KONNI or AI‑assisted malware families. </li>



<li><strong>Detect anomalous SharePoint activity</strong>, including mass file sharing, newly created sharing links, or impersonated identities distributing files. </li>



<li><strong>Scan for BYOVD techniques</strong>, particularly attempts to load vulnerable kernel drivers such as NsecSoft NSecKrnl in ransomware deployment. </li>



<li><strong>Monitor web traffic for Magecart-like patterns</strong>, such as injected JavaScript, unauthorized payment form changes, or repeated contact with suspicious domains<strong>.</strong> </li>
</ul>



<h2 class="wp-block-heading"><strong>About Fortress SRM’s Vigilant Managed Cyber Hygiene Offering</strong>&nbsp;</h2>



<h3 class="wp-block-heading">Why Patching Matters</h3>



<p>Unpatched software is a leading cause of breaches—nearly 1 in 3 attacks exploit known vulnerabilities.&nbsp;</p>



<h3 class="wp-block-heading">Vigilant Managed Cyber Hygiene</h3>



<p> Fortress SRM’s Vigilant Managed Cyber Hygiene simplifies patch management.&nbsp;</p>



<ul class="wp-block-list">
<li>Automated updates with 97%+ success rate for Microsoft &amp; 100+ third-party applications&nbsp;</li>



<li>Critical patches, OS upgrades, and configuration updates for all devices, on/off network&nbsp;</li>



<li>24/7/365 U.S.-based monitoring and real-time reporting for full visibility&nbsp;</li>
</ul>



<h4 class="wp-block-heading">Stay Protected. Stay Proactive. </h4>



<p><a href="https://fortresssrm.com/managed-security/" target="_blank" rel="noreferrer noopener">Learn how Fortress SRM can enhance your cybersecurity strategy →</a>&nbsp;</p>
<p>The post <a href="https://fortresssrm.com/threat-and-security-update-february-2026/">Threat and Security Update – February, 2026</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Threat and Security Update – January, 2026</title>
		<link>https://fortresssrm.com/threat-and-security-update-january-2026/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Thu, 22 Jan 2026 14:39:20 +0000</pubDate>
				<category><![CDATA[Threat & Security Updates]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1811</guid>

					<description><![CDATA[<p>Stay Ahead of Threats with the Latest Vulnerability Updates for January Stay up to date on critical cyber risks, Microsoft’s January Patch Tuesday, and other notable third-party vulnerabilities. Timely patching ...</p>
<p>The post <a href="https://fortresssrm.com/threat-and-security-update-january-2026/">Threat and Security Update – January, 2026</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading"><br>Stay Ahead of Threats with the Latest Vulnerability Updates for January</h3>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Stay up to date on critical cyber risks, Microsoft’s January Patch Tuesday, and other notable third-party vulnerabilities. Timely patching is key to maintaining a strong security posture and protecting your business from threats. </p>



<h3 class="wp-block-heading">Quick Highlights</h3>



<ul class="wp-block-list">
<li><strong>Microsoft Patch Tuesday:</strong> <br>&#8211; 112 vulnerabilities disclosed<br>&#8211; 8 rated <strong>Critical</strong>, 3 are <strong>Zero-Day</strong> (1 actively exploited)  </li>
</ul>



<ul class="wp-block-list">
<li><strong>High-Severity Advisories from Major Vendors:</strong> <br>&#8211; <strong>Adobe: </strong>17 critical vulnerabilities patched across 11 products <br>&#8211; <strong>Fortinet</strong>: 1 high-severity flaws in FortiOS and FortiSwitchManager <br>&#8211; <strong>SAP</strong>: 4 critical vulnerabilities in SAP Landscape Transformation, SAP S/4HANA, and SAP Wily Introscope Enterprise Manager <br>&#8211; <strong>n8n</strong>: Fixed critical vulnerability affecting versions 1.65–1.120.4 <br>&#8211; <strong>React Server</strong>: Disclosed critical RCE vulnerability in React Server Components <br>&#8211; <strong>Veeam</strong>: Disclosed multiple critical vulnerabilities affecting Veeam Backup &amp; Replication v 13.0.1.180 and earlier   </li>
</ul>



<ul class="wp-block-list">
<li><strong>Top Threats to Watch:</strong> <br>&#8211; <strong>AI‑Powered Social Engineering &amp; Identity Attacks – </strong>Attackers are abusing OAuth device-code authorization flows, QR‑code “Quishing,” and LinkedIn comment‑reply impersonation to bypass MFA and steal credentials at scale. <br>&#8211; <strong>Supply‑Chain &amp; Developer Ecosystem Compromises – </strong>Major compromises include the Office Assistant supply‑chain attack, malicious VS Code/OpenVSX extensions (GlassWorm), and breach of Target developer systems—highlighting continued targeting of dev environments and CI/CD ecosystems. <br>&#8211; <strong>AI‑Driven Malware &amp; Botnet Expansion</strong> – GoBruteforcer campaigns leverage AI‑generated default credentials and weak configurations to compromise 50,000+ servers, especially crypto and blockchain environments. <br>&#8211; <strong>Malicious Browser Extensions Harvesting AI Chats &amp; Corporate Data – </strong>Two Chrome extensions with 900k+ installs stole ChatGPT/DeepSeek conversations and corporate browsing data, demonstrating large‑scale exfiltration from trusted browser ecosystems. <br>&#8211; <strong>Critical RCE Vulnerabilities Actively Exploited in the Wild – </strong>Active exploitation of WatchGuard Firebox (CVE‑2025‑14733), Fortinet FG‑IR‑19‑283, React Server Components (CVSS 10.0), Veeam Backup &amp; Replication, and n8n workflow vulnerabilities poses severe risk for remote code execution, config theft, and full system compromise. </li>
</ul>



<h2 class="wp-block-heading">Windows 10 Reaches End of Support</h2>



<p>As of <strong>October 14, 2025</strong>, Microsoft has officially ended support for Windows 10. This month’s Patch Tuesday was the <strong>final security update</strong> for the OS—unless your organization enrolls in the <strong>Extended Security Updates (ESU)</strong> program. </p>



<ul class="wp-block-list">
<li><strong>What This Means for Your Organization:</strong>&nbsp;<br>&#8211; No more security patches or bug fixes for Windows 10 devices&nbsp;&nbsp;<br>&#8211; Increased exposure to vulnerabilities and compliance risks&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Continued support requires either:&nbsp;&nbsp;<br>&#8211; Enrolling in Microsoft’s&nbsp;<strong>paid ESU program</strong>, or&nbsp;&nbsp;<br>&#8211; <strong><strong>Upgrading to Windows 11</strong></strong>&nbsp;</li>
</ul>



<p><strong>Need help planning your transition?</strong>&nbsp;<br>Fortress SRM can help assess your environment, prioritize upgrades, and ensure your endpoints&nbsp;remain&nbsp;patch-compliant and secure.</p>



<h2 class="wp-block-heading">Patch Tuesday Summary</h2>



<p><strong>Microsoft January 2026 Patch Tuesday</strong> <br><strong>112</strong> vulnerabilities disclosed, including <strong>8</strong> critical and<strong> 3</strong> zero-days. By category:</p>



<ul class="wp-block-list">
<li><strong>57</strong> Elevation of Privilege </li>



<li><strong>22</strong> Remote Code Execution </li>



<li><strong>22</strong> Information Disclosure </li>



<li><strong>5</strong> Spoofing </li>



<li><strong>3 </strong>Tampering </li>



<li><strong>3</strong> Security Feature Bypass </li>



<li><strong>2</strong> Denial of Service </li>
</ul>



<h2 class="wp-block-heading">Critical Common Vulnerabilities and Exposures (CVEs)</h2>



<h3 class="wp-block-heading">Windows Zero-Days</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Details</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-62221</strong></a><strong></strong>&nbsp;</td><td><strong>Elevation&nbsp;of Privilege Flaw in Windows Cloud Files Mini Filter Driver&nbsp;which&nbsp;can&nbsp;be&nbsp;used&nbsp;to&nbsp;gain SYSTEM&nbsp;privileges</strong>&nbsp;</td><td><strong>Important</strong>&nbsp;</td><td><strong>Yes</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64671" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-64671</strong></a><strong></strong>&nbsp;</td><td><strong>Remote Code Execution Vulnerability&nbsp;in GitHub Copilot for&nbsp;Jetbrains&nbsp;which can allow an attack to execute commands locally</strong>&nbsp;</td><td><strong>Important</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54100" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-54100</strong></a><strong></strong>&nbsp;</td><td><strong>Remote Code Execution Vulnerability&nbsp;in PowerShell which could allow embedded scripts to be executed if the webpage is fetched using Invoke-WebRequest</strong>&nbsp;</td><td><strong>Important</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<h3 class="wp-block-heading">Other Critical CVE&#8217;s Worth Mentioning</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Details</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-20957</strong>&nbsp;</td><td>Microsoft Excel Remote Code Execution Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td>No&nbsp;</td></tr><tr><td><strong>CVE-2026-20952</strong>&nbsp;</td><td>Microsoft Office Remote Code Execution Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td>No&nbsp;</td></tr><tr><td><strong>CVE-2026-20854</strong>&nbsp;</td><td>Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td>No&nbsp;</td></tr><tr><td><strong>CVE-2026-20955</strong>&nbsp;</td><td>Microsoft Excel Remote Code Execution Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td>No&nbsp;</td></tr><tr><td><strong>CVE-2026-20953</strong>&nbsp;</td><td>Microsoft Office Remote Code Execution Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td>No&nbsp;</td></tr><tr><td><strong>CVE-2026-20944</strong>&nbsp;</td><td>Microsoft Word Remote Code Execution Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td>No&nbsp;</td></tr><tr><td><strong>CVE-2026-20876</strong>&nbsp;</td><td>Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td>No&nbsp;</td></tr><tr><td><strong>CVE-2026-20822</strong>&nbsp;</td><td>Windows Graphics Component Elevation of Privilege Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td>No&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://msrc.microsoft.com/update-guide/releaseNote/2026-Jan" target="_blank" rel="noreferrer noopener"><em>Microsoft January 2026 Security Update Release</em></a></p>



<h3 class="wp-block-heading">3rd Party Critical CVE&#8217;s Worth Mentioning</h3>



<h4 class="wp-block-heading">Adobe Products *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>Affected Product</strong>&nbsp;</td><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Critical Issues</strong>&nbsp;</td><td><strong>Key Risks</strong>&nbsp;</td></tr><tr><td><strong>Adobe Dreamweaver</strong>&nbsp;</td><td>CVE-2026-21267&nbsp;CVE-2026-21268&nbsp;CVE-2026-21274&nbsp;CVE-2026-21271&nbsp;CVE-2026-21272&nbsp;</td><td><strong>5&nbsp;Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;Arbitrary file system&nbsp;write&nbsp;</td></tr><tr><td><strong>Adobe&nbsp;InDesign</strong>&nbsp;</td><td>CVE-2026-21275&nbsp;CVE-2026-21276&nbsp;CVE-2026-21277&nbsp;CVE-2026-21304&nbsp;</td><td><strong>4&nbsp;Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;</td></tr><tr><td><strong>Adobe&nbsp;Substance 3D Modeler</strong>&nbsp;</td><td>CVE-2026-21298&nbsp;CVE-2026-21299&nbsp;</td><td><strong>2&nbsp;Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;</td></tr><tr><td><strong>Adobe Illustrator</strong>&nbsp;</td><td>CVE-2026-21280&nbsp;</td><td><strong>1&nbsp;Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;</td></tr><tr><td><strong>Adobe InCopy</strong>&nbsp;</td><td>CVE-2026-21281&nbsp;</td><td><strong>1&nbsp;Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;</td></tr><tr><td><strong>Adobe Bridge</strong>&nbsp;</td><td>CVE-2026-21283&nbsp;</td><td><strong>1&nbsp;Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;</td></tr><tr><td><strong>Adobe&nbsp;Substance 3D Stager</strong>&nbsp;</td><td>CVE-2026-21287&nbsp;</td><td><strong>1&nbsp;Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;&nbsp;</td></tr><tr><td><strong>Adobe Substance 3D Painter</strong>&nbsp;</td><td>CVE-2026-21305&nbsp;</td><td><strong>1Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;&nbsp;</td></tr><tr><td><strong>Adobe Substance 3D Sampler</strong>&nbsp;</td><td>CVE-2026-21306&nbsp;<strong></strong>&nbsp;</td><td><strong>1&nbsp;Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;</td></tr><tr><td><strong>Adobe ColdFusion</strong>&nbsp;</td><td>CVE-2025-66516&nbsp;</td><td><strong>0&nbsp;Critical, 1 Important</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;</td></tr><tr><td><strong>Adobe Substance 3D Designer</strong>&nbsp;</td><td>CVE-2026-21308&nbsp;</td><td><strong>0&nbsp;Critical, 1 Important</strong>&nbsp;</td><td>Memory leak&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://helpx.adobe.com/security/security-bulletin.html" target="_blank" rel="noreferrer noopener"><em>Adobe Security Bulletins</em></a></p>



<h4 class="wp-block-heading">Fortinet *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>Affected Product</strong>&nbsp;</td><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td>FortiOS&nbsp;&nbsp;FortiSwitchManager<strong>&nbsp;</strong>&nbsp;<strong></strong>&nbsp;</td><td><strong>CVE-2025-25249</strong>&nbsp;</td><td>A heap-based buffer overflow vulnerability in&nbsp;cw_acd&nbsp;daemon may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests&nbsp;</td><td><strong>High</strong>&nbsp;</td><td>No&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://www.fortiguard.com/psirt" target="_blank" rel="noreferrer noopener"><em>Fortinet PSIRT Advisories</em></a></p>



<h4 class="wp-block-heading">SAP *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>Affected Component</strong>&nbsp;</td><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><strong>SAP S/4HANA (Private Cloud and&nbsp;On-Premise)</strong>&nbsp;</td><td>CVE-2026-0501&nbsp;CVE-2026-0498&nbsp;</td><td>CVE-2026-0501&nbsp;&#8211;&nbsp;Due to insufficient input validation, an authenticated user could execute crafted SQL queries to read,&nbsp;modify, and&nbsp;deletebackend database data.&nbsp;CVE-2026-0498&nbsp;&#8211;&nbsp;allows an attacker with admin privileges to exploit&nbsp;a vulnerability&nbsp;in the function module exposed via RFC.&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><strong>SAP Landscape Transformation</strong>&nbsp;</td><td>CVE-2026-0491&nbsp;</td><td>Allows&nbsp;an attacker with admin privileges to exploit&nbsp;a vulnerability&nbsp;in the function module exposed via RFC.&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><strong>SAP Wily Introscope Enterprise Manager</strong>&nbsp;</td><td>CVE-2026-0500&nbsp;</td><td>Due to the usage of vulnerable&nbsp;third party&nbsp;component, an unauthenticated attacker could create a malicious JNLP file accessible by a public facing URL.&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://support.sap.com/en/my-support/knowledge-base/security-notes-news/october-2025.html" target="_blank" rel="noreferrer noopener"><em>SAP January 2026 Security Notes</em></a></p>



<h3 class="wp-block-heading">Google Chrome</h3>



<ul class="wp-block-list">
<li><strong>Version:</strong> 144.0.7559.59/60 (Windows and Mac), 144.0.7559.59 (Linux) </li>



<li><strong>Release Date:</strong> Tuesday, January 13, 2026 </li>



<li><strong>Key Fixes:</strong> High CVE-2026-0899, High CVE-2026-0900 and High CVE-2026-0901 </li>
</ul>



<p><a href="https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_13.html" target="_blank" rel="noreferrer noopener"><em>Chrome Release Notes</em></a></p>



<h3 class="wp-block-heading">Mozilla Firefox</h3>



<ul class="wp-block-list">
<li><strong>Version:</strong> Firefox 147 </li>



<li><strong>Release Date:</strong> Tuesday, January 13, 2026 </li>



<li><strong>Key Fixes:</strong> High CVE-2026-0877/78/79/80/81/82 </li>
</ul>



<p><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/" target="_blank" rel="noreferrer noopener"><em>Mozilla Release Notes</em></a></p>



<p><em>* Not handled by Fortress SRM.</em>&nbsp;</p>



<h2 class="wp-block-heading">Threat Intelligence Trends – January 2026</h2>



<p>The following resources are grouped by threat type / category.&nbsp;</p>



<h3 class="wp-block-heading">Emerging Threats</h3>



<p><strong>SOCRadar Annual Dark Web Report 2025</strong>  <br>SOCRadar’s 2025 Annual Dark Web Report highlights a data‑driven overview of underground cybercrime, showing that data leaks dominate dark web activity, with database‑related threats making up 64.06% of observed incidents and selling posts 59.32%. The United States remains the top target, responsible for 19.91% of dark‑web mentions and over 41% of ransomware attacks, while Public Administration emerges as the most exposed sector at 12.85%. <br><a href="https://socradar.io/blog/annual-dark-web-report-2025/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a> </p>



<p><strong><strong>Silent Push Uncovers Long‑Running Magecart Skimming Campaign</strong> </strong> <br><em>Security researchers discovered a sophisticated Magecart web‑skimming network that has been active since at least 2022, targeting major payment cards including American Express, Discover, Mastercard, JCB, UnionPay, and others. </em><br><a href="https://www.silentpush.com/blog/magecart/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a></p>



<p><strong>Target’s Dev Server Taken Offline After Hackers Claim Theft of Internal Source Code</strong> <br>Hackers published samples of what they claim is stolen internal Target source code on a public Gitea instance, advertising a much larger 860GB dataset for sale and referencing internal systems, developer metadata, and private repositories. <br><a href="https://www.bleepingcomputer.com/news/security/targets-dev-server-offline-after-hackers-claim-to-steal-source-code/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a></p>



<p><strong>Trust Wallet Confirms Extension Hack Led to $7 Million Crypto Theft</strong> <br>Trust Wallet confirmed that a malicious Chrome extension update (version 2.68) published on December 24 allowed attackers to exfiltrate sensitive wallet data, resulting in approximately $7 million in stolen cryptocurrency. <br><a href="https://www.bleepingcomputer.com/news/security/trust-wallet-confirms-extension-hack-led-to-7-million-crypto-theft/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a></p>



<p><strong>Senior U.S. Officials Impersonated in Malicious Smishing &amp; Vishing Campaign</strong> <br>An IC3 Public Service Announcement warns that since at least 2023, threat actors have been impersonating senior U.S. government officials through smishing (SMS phishing) and AI‑generated vishing calls to build rapport with victims before moving conversations to encrypted apps. <br><a href="https://www.ic3.gov/PSA/2025/PSA251219" target="_blank" rel="noreferrer noopener">Read more →</a></p>



<h3 class="wp-block-heading">Ransomware &amp; Malware Deployment</h3>



<p><strong><strong>Office Assistant Supply Chain Attack Delivers Malicious Plugin</strong> </strong> <br>Security researchers uncovered a long‑running supply‑chain attack in which the popular Chinese AI‑powered Office Assistant application (version 3.1.10.1) secretly loaded a malicious downloader component that contacted C2 domains, retrieved multi‑stage payloads, and ultimately deployed the Mltab malicious browser plugin.<br><a href="https://ti.qianxin.com/blog/articles/office-assistant-supply-chain-attack-en/" target="_blank" rel="noreferrer noopener">Read more →</a></p>



<p><strong><strong><strong>GlassWorm Goes Mac: Fresh Infrastructure, New Tricks</strong> </strong></strong> <br>A new GlassWorm wave marks a major pivot from Windows to macOS, distributing malicious VS Code/OpenVSX extensions that use AES‑256‑CBC–encrypted JavaScript payloads instead of earlier invisible Unicode or Rust‑based techniques.<br><a href="https://www.koi.ai/blog/glassworm-goes-mac-fresh-infrastructure-new-tricks" target="_blank" rel="noreferrer noopener">Read more →</a></p>



<p><strong>MacSync Stealer Evolves into Code‑Signed Swift Malware</strong> <br>Security researchers discovered a new MacSync Stealer variant delivered as a code‑signed and notarized Swift application inside a disk image, allowing it to bypass Gatekeeper and avoid traditional execution‑chain indicators. <br><a href="https://www.jamf.com/blog/macsync-stealer-evolution-code-signed-swift-malware-analysis/" target="_blank" rel="noreferrer noopener">Read more →</a></p>



<p><strong>GachiLoader: Obfuscated Node.js Loader Spread via YouTube Ghost Network</strong> <br>Check Point Research identified GachiLoader, a heavily obfuscated Node.js‑based loader distributed through compromised YouTube accounts promoting fake game cheats and cracked software. <br><a href="https://research.checkpoint.com/2025/gachiloader-node-js-malware-with-api-tracing/" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<h3 class="wp-block-heading">Social Engineering Exploits</h3>



<p><strong><strong>Convincing LinkedIn Comment‑Reply Tactic Used in New Phishing Campaign</strong> </strong>  <br>A new phishing campaign is flooding LinkedIn posts with fake “reply” comments impersonating LinkedIn, falsely claiming policy violations and urging users to click external links masked with lnkd.in shorteners for added credibility. <br><a href="https://www.bleepingcomputer.com/news/security/convincing-linkedin-comment-reply-tactic-used-in-new-phishing/" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<p><strong>GRU‑Linked BlueDelta Evolves Credential‑Harvesting Tactics</strong> <br>Russia‑linked BlueDelta (APT28) expanded its credential‑harvesting campaigns throughout February–September 2025, targeting Turkish energy and nuclear researchers, a European think tank, and organizations in North Macedonia and Uzbekistan. The group used highly tailored lures, spoofed Microsoft OWA, Google, and Sophos VPN login pages. <br><a href="https://www.recordedfuture.com/research/gru-linked-bluedelta-evolves-credential-harvesting" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<p><strong>North Korean Kimsuky Actors Leverage Malicious QR Codes in Spearphishing (Quishing) Campaigns</strong> <br>A new FBI Cybersecurity Advisory warns that North Korean Kimsuky actors are increasingly using malicious QR codes (“Quishing”) in highly targeted spearphishing campaigns against U.S. think tanks, NGOs, academia, and government‑linked entities. <br><a href="https://www.ic3.gov/CSA/2026/260108.pdf" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<p><strong>DocuSign Impersonation Wave Leveraging Real‑Time LogoKit Customization</strong> <br>Security researchers  identified a growing wave of DocuSign impersonation attacks in which phishing emails mimic authentic DocuSign notifications, spoof sender domains, and address recipients by their login name to increase credibility. <br><a href="https://www.group-ib.com/blog/docusign-impersonation-logokit/" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<p><strong>Access Granted: Phishing With Device Code Authorization Enables Stealthy M365 Account Takeovers</strong> <br>Proofpoint researchers warn that multiple threat clusters—both financially motivated and state‑aligned—are now abusing Microsoft’s OAuth 2.0 device code authorization flow to trick users into granting attackers access to their Microsoft 365 accounts. <br><a href="https://www.proofpoint.com/us/blog/threat-insight/access-granted-phishing-device-code-authorization-account-takeover" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<h3 class="wp-block-heading">AI-Driven Threats</h3>



<p><strong>Inside GoBruteforcer: AI‑Generated Server Defaults, Weak Passwords, and Crypto‑Focused Campaigns</strong> <br>Check Point Research analyzed an evolved GoBruteforcer botnet variant that exploits AI‑generated server deployment examples and legacy stacks like XAMPP, which frequently include predictable default usernames and weak passwords, leaving over 50,000 internet‑facing servers vulnerable. <br><a href="https://research.checkpoint.com/2026/inside-gobruteforcer-ai-generated-server-defaults-weak-passwords-and-crypto-focused-campaigns/" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<p><strong>LLMs &amp; Ransomware: An Operational Accelerator, Not a Revolution</strong> <br>SentinelOne researchers conclude that large language models (LLMs) are accelerating ransomware operations—improving speed, scalability, multilingual phishing, tooling generation, data triage, and negotiation—without fundamentally transforming attacker tactics. <br><a href="https://www.sentinelone.com/labs/llms-ransomware-an-operational-accelerator-not-a-revolution/" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<p><strong>Chrome Extensions Impersonate AI Tools to Steal ChatGPT &amp; DeepSeek Chats</strong> <br>Security researchers report that two malicious Chrome extensions—Chat GPT for Chrome with GPT‑5, Claude Sonnet &amp; DeepSeek AI and AI Sidebar with Deepseek, ChatGPT, Claude and more—accumulated over 900,000 installs while secretly exfiltrating full ChatGPT and DeepSeek conversation data and users’ browsing activity. <br><a href="https://socradar.io/blog/chrome-extensions-steal-chatgpt-deepseek-chats/" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<h3 class="wp-block-heading"><strong>Vulnerabilities Actively Exploited</strong></h3>



<p><strong>Security Advisory: Vulnerability in n8n Versions 1.65–1.120.4</strong> <br>n8n disclosed a critical security vulnerability affecting versions 1.65–1.120.4, specifically in workflows using a Form Submission trigger with file upload and a Form Ending node returning binary data. <br><a href="https://community.n8n.io/t/security-advisory-security-vulnerability-in-n8n-versions-1-65-1-120-4/247305" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<p><strong>Vulnerabilities Resolved in Veeam Backup &amp; Replication 13.0.1.1071 (KB4792)</strong> <br>Veeam’s KB4792 advisory discloses multiple vulnerabilities affecting Veeam Backup &amp; Replication 13.0.1.180 and all earlier v13 builds, all of which were fixed in version 13.0.1.1071. <br><a href="https://www.veeam.com/kb4792" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<p><strong>Critical Security Vulnerability in React Server Components (RSC)</strong> <br>React disclosed CVE‑2025‑55182, a critical unauthenticated remote code execution (RCE) vulnerability (CVSS 10.0) affecting React Server Components, caused by unsafe deserialization of payloads sent to React Server Function endpoints. <br><a href="https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<p><strong>WatchGuard Firebox iked Out‑of‑Bounds Write Vulnerability (WGSA‑2025‑00027)</strong> <br>WatchGuard disclosed WGSA‑2025‑00027, a critical Out‑of‑Bounds Write vulnerability (CVE‑2025‑14733) in the Fireware OS ikedprocess, allowing remote unauthenticated RCE on Firebox appliances. <br><a href="https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00027" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<p><strong>Product Security Advisory &amp; Analysis: Observed Abuse of FG‑IR‑19‑283 (CVE‑2020‑12812)</strong> <br>Fortinet has confirmed active, in‑the‑wild exploitation of the long‑patched FortiGate authentication bypass vulnerability FG‑IR‑19‑283 / CVE‑2020‑12812, originally disclosed in July 2020. <br><a href="https://www.fortinet.com/blog/psirt-blogs/product-security-advisory-and-analysis-observed-abuse-of-fg-ir-19-283" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<h2 class="wp-block-heading">Recommended Actions</h2>



<h3 class="wp-block-heading">Mitigations</h3>



<ul class="wp-block-list">
<li><strong>Patch all affected systems immediately</strong>, prioritizing critical vulnerabilities in Microsoft Patch Tuesday (8 Critical, 3 Zero‑Days), Adobe products, SAP, Fortinet, and WatchGuard Fireware OS (CVE‑2025‑14733) to prevent remote code execution and active exploitation attempts. </li>



<li><strong>Upgrade or retire Windows 10 endpoints</strong> (end‑of‑support October 14, 2025) or enroll devices in Microsoft&#8217;s ESU program to maintain patch coverage. </li>



<li><strong>Harden identity infrastructure</strong> by enforcing MFA everywhere, disabling vulnerable LDAP/2FA configurations in FortiGate devices, and reviewing OAuth app permissions to defend against device‑code phishing abuses (per Proofpoint research). </li>



<li><strong>Remove malicious or suspicious browser extensions</strong>, especially AI‑related Chrome add-ons impersonating legitimate tools, and enforce extension allowlisting enterprise‑wide to prevent “prompt‑poaching” attacks. </li>



<li><strong>Apply security updates for n8n workflows</strong>, upgrading to version 1.121.0+ to fix the file‑access vulnerability in Form Submission workflows. </li>



<li><strong>Update React applications and frameworks</strong> (Next.js, Parcel/Vite RSC plugins) to patched versions addressing the CVE‑2025‑55182 RCE deserialization flaw. </li>



<li><strong>Ensure Veeam Backup &amp; Replication is updated</strong> to version 13.0.1.1071 to close RCE paths exploitable by Backup/Tape Operators or Backup Admins. </li>



<li><strong>Harden exposed servers and databases</strong> by eliminating default/AI‑generated weak credentials to reduce susceptibility to GoBruteforcer botnet campaigns. </li>
</ul>



<h3 class="wp-block-heading">Monitoring</h3>



<ul class="wp-block-list">
<li><strong>Monitor identity platforms (Azure AD/M365)</strong> for unusual OAuth device‑code authorizations, unexpected app consents, anomalous MFA‑less logins, and session‑token reuse attempts. </li>



<li><strong>Watch for VPN and firewall anomalies,</strong> including FortiGate login attempts using case‑variant usernames (e.g., Jsmith vs jsmith) and WatchGuard Firebox connections to any published Indicators of Attack (IOAs). </li>



<li><strong>Enable alerting for Chrome/Edge extension installations</strong>, especially AI sidebar/chat extensions, and track outbound connections to known attacker C2 domains associated with data‑exfiltrating browser extensions. </li>



<li><strong>Monitor for signs of n8n exploitation</strong>, such as unexpected file reads, unauthorized workflow executions, or abnormal file‑handling behavior in Form Submission workflows. </li>



<li><strong>Continuously monitor internet</strong><strong>‑</strong><strong>facing services</strong> (FTP/MySQL/PostgreSQL/phpMyAdmin) for brute‑force attempts, high‑volume authentication failures, and scanning activity consistent with GoBruteforcer botnet behavior. </li>
</ul>



<h3 class="wp-block-heading">Detection Tips</h3>



<ul class="wp-block-list">
<li><strong>Look for RCE exploitation attempts</strong> targeting WatchGuard Firebox (CVE‑2025‑14733), including unexpected outbound connections to attacker IPs, exfiltration of config files, or rapid creation of gzip archives containing credentials. </li>



<li><strong>Detect device</strong><strong>‑</strong><strong>code phishing chains</strong> by flagging user activity involving login.microsoft.com/devicelogin with suspicious timing, unexpected device codes, or unknown applications requesting access tokens. </li>



<li><strong>Identify malicious browser extensions</strong> by scanning for extensions communicating with domains such as deepaichats[.]com, chatsaigpt[.]com, or suspicious Lovable‑hosted infrastructure used in AI‑chat exfiltration campaigns. </li>



<li><strong>Check for indicators of GoBruteforcer infection</strong>, including newly dropped web shells, outbound IRC beaconing, high‑frequency scanning of public IP space, or processes using default/AI‑generated usernames (e.g., myuser, appuser). </li>



<li><strong>Hunt for React Server Component exploitation</strong> by reviewing server logs for malformed RSC payloads, unexpected POST requests to RSC/Server Function endpoints, or errors related to deserialization. </li>



<li><strong>Inspect n8n logs for anomalous access patterns</strong>, especially unauthorized POST requests to Form Submission endpoints that include unexpected file‑handling fields. </li>
</ul>



<h2 class="wp-block-heading"><strong>About Fortress SRM’s Vigilant Managed Cyber Hygiene Offering</strong>&nbsp;</h2>



<h3 class="wp-block-heading">Why Patching Matters</h3>



<p>Unpatched software is a leading cause of breaches—nearly 1 in 3 attacks exploit known vulnerabilities.&nbsp;</p>



<h3 class="wp-block-heading">Vigilant Managed Cyber Hygiene</h3>



<p> Fortress SRM’s Vigilant Managed Cyber Hygiene simplifies patch management.&nbsp;</p>



<ul class="wp-block-list">
<li>Automated updates with 97%+ success rate for Microsoft &amp; 100+ third-party applications&nbsp;</li>



<li>Critical patches, OS upgrades, and configuration updates for all devices, on/off network&nbsp;</li>



<li>24/7/365 U.S.-based monitoring and real-time reporting for full visibility&nbsp;</li>
</ul>



<h4 class="wp-block-heading">Stay Protected. Stay Proactive. </h4>



<p><a href="https://fortresssrm.com/managed-security/" target="_blank" rel="noreferrer noopener">Learn how Fortress SRM can enhance your cybersecurity strategy →</a>&nbsp;</p>
<p>The post <a href="https://fortresssrm.com/threat-and-security-update-january-2026/">Threat and Security Update – January, 2026</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Threat and Security Update – December, 2025</title>
		<link>https://fortresssrm.com/threat-and-security-update-december-2025/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Thu, 18 Dec 2025 16:04:46 +0000</pubDate>
				<category><![CDATA[Threat & Security Updates]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1806</guid>

					<description><![CDATA[<p>Stay Ahead of Threats with the Latest Vulnerability Updates for December Stay up to date on critical cyber risks, Microsoft’s December Patch Tuesday, and other notable third-party vulnerabilities. Timely patching ...</p>
<p>The post <a href="https://fortresssrm.com/threat-and-security-update-december-2025/">Threat and Security Update – December, 2025</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading"><br>Stay Ahead of Threats with the Latest Vulnerability Updates for December</h3>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Stay up to date on critical cyber risks, Microsoft’s December Patch Tuesday, and other notable third-party vulnerabilities. Timely patching is key to maintaining a strong security posture and protecting your business from threats. </p>



<h3 class="wp-block-heading">Quick Highlights</h3>



<ul class="wp-block-list">
<li><strong>Microsoft Patch Tuesday:</strong> <br>&#8211; 57 vulnerabilities disclosed <br>&#8211; 3 rated <strong>Critical</strong>, 3 are <strong>Zero-Day</strong> (1 actively exploited) </li>
</ul>



<ul class="wp-block-list">
<li><strong>Adobe Security Updates:</strong> <br>&#8211; 139 vulnerabilities patched across 5 products <br>&#8211; 14 rated <strong>Critical</strong>, affecting Creative Cloud Desktop Application, Acrobat and Reader, DNG Software Development Kit (SDK), Experience Manager, and ColdFusion</li>
</ul>



<ul class="wp-block-list">
<li><strong>High-Severity Advisories from Major Vendors:</strong> <br>&#8211; <strong>Cisco</strong>: 1 critical-severity flaws in React and Next.js Frameworks <br>&#8211; <strong>Fortinet</strong>: 1 critical and 1 high-severity flaws in FortiOS, FortiWeb, FortiProxy, FortiSwitchManager, and FortiSandbox <br>&#8211; <strong>Ivanti</strong>: 1 critical and 3 high-severity flaws in Ivanti Endpoint Manager (EPM) <br>&#8211; <strong>SAP</strong>: 3 critical vulnerabilities in SAP Solution Manager, SAP Commerce Cloud, and SAP jConnect <br>&#8211; <strong>Google: </strong>Fixed 3 security issues, one that is being actively exploited <br>&#8211; <strong>Android: </strong>Fixed<strong> </strong>2 actively exploited zero-days  </li>
</ul>



<ul class="wp-block-list">
<li><strong>Top Threats to Watch:</strong> <br>&#8211; <strong>Fortinet SSO Auth Bypass</strong> – Critical flaws allow attackers to bypass FortiCloud authentication. <br>&#8211; <strong>APT Collaboration</strong> – Gamaredon (Russia) and Lazarus (North Korea) sharing infrastructure. <br>&#8211; <strong>Insider Breach at CrowdStrike</strong> – Employee leaked internal screenshots to hackers. <br>&#8211; <strong>GlassWorm Malware</strong> – Self-propagating worm hiding malicious code in VS Code extensions. <br>&#8211; <strong>Storm-0249 Ransomware Tactics</strong> – Abuse of EDR software for stealthy persistence. <br>&#8211; <strong>Massive Phishing Campaign</strong> – 4,300+ domains targeting hotel guests and vacation planners. <br>&#8211; <strong>AI-Orchestrated Espionage</strong> – Claude AI exploited for autonomous cyber operations. <br>&#8211; <strong>FBI/CISA Alerts</strong> – Account takeover fraud, virtual kidnapping scams, and pro-Russia hacktivist attacks on critical infrastructure. </li>
</ul>



<h2 class="wp-block-heading">Windows 10 Reaches End of Support</h2>



<p>As of <strong>October 14, 2025</strong>, Microsoft has officially ended support for Windows 10. This month’s Patch Tuesday was the <strong>final security update</strong> for the OS—unless your organization enrolls in the <strong>Extended Security Updates (ESU)</strong> program. </p>



<ul class="wp-block-list">
<li><strong>What This Means for Your Organization:</strong> <br>&#8211; No more security patches or bug fixes for Windows 10 devices  <br>&#8211; Increased exposure to vulnerabilities and compliance risks  </li>
</ul>



<ul class="wp-block-list">
<li>Continued support requires either:  <br>&#8211; Enrolling in Microsoft’s <strong>paid ESU program</strong>, or  <br>&#8211; <strong><strong>Upgrading to Windows 11</strong></strong> </li>
</ul>



<p><strong>Need help planning your transition?</strong> <br>Fortress SRM can help assess your environment, prioritize upgrades, and ensure your endpoints remain patch-compliant and secure.</p>



<h2 class="wp-block-heading">Patch Tuesday Summary</h2>



<p><strong>Microsoft December 2025 Patch Tuesday</strong> <br><strong>57</strong> vulnerabilities disclosed, including <strong>3</strong> critical and <strong>3</strong> zero-days. By impact category:</p>



<ul class="wp-block-list">
<li><strong>28</strong> Elevation of Privilege </li>



<li><strong>19</strong> Remote Code Execution </li>



<li><strong>4</strong> Information Disclosure </li>



<li><strong>3</strong> Denial of Service  </li>



<li><strong>3</strong> Spoofing </li>
</ul>



<h2 class="wp-block-heading">Critical Common Vulnerabilities and Exposures (CVEs)</h2>



<h3 class="wp-block-heading">Windows Zero-Days</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Details</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-62221</strong></a><strong></strong>&nbsp;</td><td><strong>Elevation&nbsp;of Privilege Flaw in Windows Cloud Files Mini Filter Driver&nbsp;which&nbsp;can&nbsp;be&nbsp;used&nbsp;to&nbsp;gain SYSTEM&nbsp;privileges</strong>&nbsp;</td><td><strong>Important</strong>&nbsp;</td><td><strong>Yes</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64671" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-64671</strong></a><strong></strong>&nbsp;</td><td><strong>Remote Code Execution Vulnerability&nbsp;in GitHub Copilot for&nbsp;Jetbrains&nbsp;which can allow an attack to execute commands locally</strong>&nbsp;</td><td><strong>Important</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54100" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-54100</strong></a><strong></strong>&nbsp;</td><td><strong>Remote Code Execution Vulnerability&nbsp;in PowerShell which could allow embedded scripts to be executed if the webpage is fetched using Invoke-WebRequest</strong>&nbsp;</td><td><strong>Important</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<h3 class="wp-block-heading">Other Critical CVE&#8217;s Worth Mentioning</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Details</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62554" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-62554</strong></a><strong></strong>&nbsp;</td><td><strong>Microsoft Office Remote Code Execution Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62557" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-62557</strong></a><strong></strong>&nbsp;</td><td><strong>Microsoft Office Remote Code Execution Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62562" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-62562</strong></a><strong></strong>&nbsp;</td><td><strong>Microsoft Outlook Remote Code Execution Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://msrc.microsoft.com/update-guide/releaseNote/2025-Dec" target="_blank" rel="noreferrer noopener"><em>Microsoft December 2025 Security Update Release</em></a><em> </em></p>



<h3 class="wp-block-heading">3rd Party Critical CVE&#8217;s Worth Mentioning</h3>



<h4 class="wp-block-heading">Adobe Products *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Affected&nbsp;Product</strong>&nbsp;</td><td><strong>Critical Issues</strong>&nbsp;</td><td><strong>Key Risks</strong>&nbsp;</td></tr><tr><td><a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61808</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61809</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61830</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61810</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61811</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61812</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61813</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61821</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61822</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61823</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64897</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64898</strong></a><strong></strong>&nbsp;</td><td><strong>Adobe Cold Fusion</strong>&nbsp;</td><td><strong>7</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;<strong>Security feature bypass</strong>&nbsp;<strong>Arbitrary file system read/write</strong>&nbsp;<strong>Privilege&nbsp;escalation</strong>&nbsp;<strong></strong>&nbsp;</td></tr><tr><td><a href="https://helpx.adobe.com/security/products/experience-manager/apsb25-115.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64537</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/experience-manager/apsb25-115.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64539</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/experience-manager/apsb25-115.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>Full List-&gt;</strong></a><strong></strong>&nbsp;</td><td><strong>Adobe Experience Manager</strong>&nbsp;</td><td><strong>2</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;<strong>Privilege escalation</strong>&nbsp;</td></tr><tr><td><a href="https://helpx.adobe.com/security/products/dng-sdk/apsb25-118.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64783</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/dng-sdk/apsb25-118.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64784</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/dng-sdk/apsb25-118.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64893</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/dng-sdk/apsb25-118.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64894</strong></a><strong></strong>&nbsp;<strong></strong>&nbsp;</td><td><strong>Adobe DNG SDK</strong>&nbsp;</td><td><strong>3</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;<strong>Memory exposure</strong>&nbsp;<strong>Application denial-of-service</strong>&nbsp;</td></tr><tr><td><a href="https://helpx.adobe.com/security/products/acrobat/apsb25-119.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64785</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/acrobat/apsb25-119.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64899</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/acrobat/apsb25-119.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64786</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/acrobat/apsb25-119.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64787</strong></a><strong></strong>&nbsp;</td><td><strong>Adobe Acrobat Reader</strong>&nbsp;</td><td><strong>2</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;<strong>Security feature bypass</strong>&nbsp;</td></tr><tr><td><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/creative-cloud/apsb25-120.html" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-64896</strong></a><strong></strong>&nbsp;</td><td><strong>Adobe Creative Cloud Desktop</strong>&nbsp;</td><td><strong>0</strong>&nbsp;</td><td><strong>Application denial-of-service</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://helpx.adobe.com/security/security-bulletin.html" target="_blank" rel="noreferrer noopener"><em>Adobe Security Bulletins</em></a></p>



<h4 class="wp-block-heading">Cisco *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Affected Product</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-react-flight-TYw32Ddb" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-55182</strong></a><strong></strong>&nbsp;</td><td><strong>React and Next.js Frameworks</strong>&nbsp;</td><td><strong>React server that could allow an unauthenticated, remote attacker to perform remote code execution on an affected device or system.</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://sec.cloudapps.cisco.com/security/center/publicationListing.x" target="_blank" rel="noreferrer noopener"><em>Cisco Security Advisories</em></a></p>



<h4 class="wp-block-heading">Fortinet *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Affected Product</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://www.fortiguard.com/psirt/FG-IR-25-647" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59718 CVE-2025-59719</strong></a><strong></strong>&nbsp;</td><td><strong>FortiOS,&nbsp;FortiWeb,&nbsp;FortiProxy&nbsp;and&nbsp;FortiSwitchManager</strong>&nbsp;</td><td><strong>Vulnerability&nbsp;allows&nbsp;anunauthenticated attacker to bypass the&nbsp;FortiCloud&nbsp;SSO&nbsp;login&nbsp;via a crafted SAML message.</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>Yes</strong>&nbsp;</td></tr><tr><td><a href="https://www.fortiguard.com/psirt/FG-IR-25-479" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-53949</strong></a><strong></strong>&nbsp;</td><td><strong>FortiSandbox</strong>&nbsp;</td><td><strong>Vulnerability&nbsp;allows&nbsp;an authenticated attacker to execute unauthorized code on the underlying system via crafted HTTP requests.</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://www.fortiguard.com/psirt" target="_blank" rel="noreferrer noopener"><em>Fortinet PSIRT Advisories</em></a></p>



<h4 class="wp-block-heading">Ivanti *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Affected Product</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://forums.ivanti.com/s/article/Security-Advisory-EPM-December-2025-for-EPM-2024?language=en_US" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-10573</strong></a><strong>&nbsp;</strong>&nbsp;</td><td><strong>Ivanti Endpoint Manager (EPM)</strong>&nbsp;</td><td><strong>Vulnerabilityallows&nbsp;a&nbsp;remote unauthenticated attacker to execute arbitrary JavaScript in the context of an administrator session.</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://forums.ivanti.com/s/article/Security-Advisory-EPM-December-2025-for-EPM-2024?language=en_US" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-13659</strong></a><strong></strong>&nbsp;</td><td><strong>Ivanti Endpoint Manager (EPM)</strong>&nbsp;</td><td><strong>Vulnerabilityallows&nbsp;a&nbsp;remote, unauthenticated attacker to write arbitrary files on the server, potentially leading to remote code execution.</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://forums.ivanti.com/s/article/Security-Advisory-EPM-December-2025-for-EPM-2024?language=en_US" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-13661</strong></a><strong></strong>&nbsp;</td><td><strong>Ivanti Endpoint Manager (EPM)</strong>&nbsp;</td><td><strong>Vulnerabilityallows&nbsp;a&nbsp;remote authenticated attacker to write arbitrary files outside of the intended directory.</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://forums.ivanti.com/s/article/Security-Advisory-EPM-December-2025-for-EPM-2024?language=en_US" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-13662</strong></a><strong></strong>&nbsp;</td><td><strong>Ivanti Endpoint Manager (EPM)</strong>&nbsp;</td><td><strong>Vulnerabilityallows&nbsp;a remote&nbsp;unauthenticatedattacker to execute arbitrary code.</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://www.ivanti.com/blog/december-2025-security-update" target="_blank" rel="noreferrer noopener"><em>Ivanti December 2025 Security Update</em></a></p>



<h4 class="wp-block-heading">SAP *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Affected Component</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42880" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42880</strong></a><strong></strong>&nbsp;</td><td><strong>SAP Solution Manager</strong>&nbsp;</td><td><strong>Allows an authenticated attacker to insert malicious code when calling a remote-enabled function module.</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-55754" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-55754</strong></a><strong></strong>&nbsp;</td><td><strong>SAP Commerce Cloud</strong>&nbsp;</td><td><strong>Console manipulation via escape sequences in log messages</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42928" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42928</strong></a><strong></strong>&nbsp;</td><td><strong>SAP&nbsp;jConnect&nbsp;&#8211; SDK for ASE</strong>&nbsp;</td><td><strong>High privileged&nbsp;user&nbsp;could exploit a deserialization vulnerability in SAP&nbsp;jConnect&nbsp;to launch remote code execution.</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42878" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42878</strong></a><strong></strong>&nbsp;</td><td><strong>SAP Web Dispatcher and Internet Communication Manager (ICM)</strong>&nbsp;</td><td><strong>Unauthenticated attackers could exploit them to access diagnostics, send crafted requests, or disrupt services.</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42874" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42874</strong></a><strong></strong>&nbsp;</td><td><strong>SAP NetWeaver</strong>&nbsp;</td><td><strong>Allows an attacker with network access and high privileges to execute arbitrary code on the affected system due to insufficient input validation and improper handling of remote method calls.</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-48976" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-48976</strong></a><strong></strong>&nbsp;</td><td><strong>SAP Business Objects</strong>&nbsp;</td><td><strong>DoS vulnerability</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42877" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42877</strong></a><strong></strong>&nbsp;</td><td><strong>SAP Web Dispatcher, Internet Communication Manager and SAP Content Server</strong>&nbsp;</td><td><strong>Allow an unauthenticated user to exploit logical errors that lead to&nbsp;a memorycorruption vulnerability.</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42876" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42876</strong></a><strong></strong>&nbsp;</td><td><strong>SAP S/4 HANA Private Cloud</strong>&nbsp;</td><td><strong>An authenticated attacker with authorization limited to a single company code could read sensitive data and post or&nbsp;modifydocuments across all company codes.</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://support.sap.com/en/my-support/knowledge-base/security-notes-news/october-2025.html" target="_blank" rel="noreferrer noopener"><em>SAP December 2025 Security Notes</em></a></p>



<h3 class="wp-block-heading">Android</h3>



<ul class="wp-block-list">
<li><strong>Release Date:</strong> Friday, December 5, 2025  </li>



<li><strong>Key Fixes:</strong> 2 actively exploited zero-days, CVE-2025-48633 and CVE-2025-48572 involving information disclosure and elevation of privilege. </li>
</ul>



<p><a href="https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop_17.html" target="_blank" rel="noreferrer noopener"><em><a href="https://source.android.com/docs/security/bulletin/2025-12-01" target="_blank" rel="noreferrer noopener"><em>Android Security Bulletin</em></a></em></a> </p>



<h3 class="wp-block-heading">Google Chrome</h3>



<ul class="wp-block-list">
<li><strong>Version:</strong> 143.0.7499.109/.110 (Windows and Mac), 143.0.7499.109 (Linux) </li>



<li><strong>Release Date:</strong> Wednesday, December 10, 2025 </li>



<li><strong>Key Fixes:</strong> CVE-2025-14372, CVE-2025-14373, and 1 high severity actively exploited not currently classified. </li>
</ul>



<p><a href="https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html" target="_blank" rel="noreferrer noopener"><em>Chrome Release Notes</em></a></p>



<p><em>* Not handled by Fortress SRM.</em>&nbsp;</p>



<h2 class="wp-block-heading">Threat Intelligence Trends – December 2025</h2>



<p>The following resources are grouped by threat type / category.&nbsp;</p>



<h3 class="wp-block-heading">Emerging Threats</h3>



<p><strong><strong>Fortinet warns of critical FortiCloud SSO login auth bypass flaws</strong> </strong> <br>Fortinet has released security updates to address two critical vulnerabilities in FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager that could allow attackers to bypass FortiCloud SSO authentication. <a href="https://www.bleepingcomputer.com/news/security/fortinet-warns-of-critical-forticloud-sso-login-auth-bypass-flaws/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em>  </p>



<p><strong>Alliances of convenience: How APTs are beginning to work together</strong> <br>New evidence uncovered suggests that two of the world’s most aggressive advanced persistent threat (APT) actors, Russia-aligned Gamaredon and North Korea’s Lazarus, may be operating on shared infrastructure. <a href="https://www.gendigital.com/blog/insights/research/apt-cyber-alliances-2025" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<p><strong>CrowdStrike Catches Insider Feeding Information to Hackers</strong> <br>American cybersecurity firm CrowdStrike has confirmed that an insider shared screenshots taken on internal systems with hackers after they were leaked on Telegram by the Scattered Lapsus$ Hunters threat actors. <a href="https://www.bleepingcomputer.com/news/security/crowdstrike-catches-insider-feeding-information-to-hackers/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<h3 class="wp-block-heading">Ransomware &amp; Malware Deployment</h3>



<p><strong>GlassWorm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace</strong> <br>GlassWorm malware targeting VS Code extensions on OpenVSX marketplace, using invisible Unicode characters that hides malicious intent in code editors. <a href="https://www.koi.ai/blog/glassworm-first-self-propagating-worm-using-invisible-code-hits-openvsx-marketplace" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<p><strong><strong>Storm-0249 Hijacks EDR Software for Ransomware Staging</strong> </strong> <br>Financially motivated initial access broker (IAB) @Storm-0249 has shifted from using broad phishing to stealthier methods of initial access and establishing persistence. To achieve this, the IAB abused trusted endpoint detection and response (EDR) processes. <a href="https://reliaquest.com/blog/threat-spotlight-storm-0249-precision-endpoint-exploitation/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<h3 class="wp-block-heading">Social Engineering Exploits</h3>



<p><strong>Thousands of Domains Target Hotel Guests in Massive Phishing Campaign</strong>  <br>A Russian-speaking threat actor operating an ongoing, mass phishing campaign targeting people who might be planning (or about to leave for) a vacation has registered more than 4,300 domain names used in the attacks since the beginning of the year. <a href="https://www.netcraft.com/blog/thousands-of-domains-target-hotel-guests-in-massive-phishing-campaign" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<h3 class="wp-block-heading">AI-Driven Threats</h3>



<p><strong>Claude AI Abused in AI-orchestrated Cyber Espionage Campaign</strong> <br>This campaign demonstrated unprecedented integration and autonomy of AI throughout the attack lifecycle, with the threat actor manipulating Claude Code to support reconnaissance, vulnerability discovery, exploitation, lateral movement, credential harvesting, data analysis, and exfiltration operations largely autonomously. <em><a href="https://assets.anthropic.com/m/ec212e6566a0d47/original/Disrupting-the-first-reported-AI-orchestrated-cyber-espionage-campaign.pdf" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </em> </p>



<h3 class="wp-block-heading"><strong>FBI/CISA Advisories</strong></h3>



<p><strong>Account Takeover Fraud via Impersonation of Financial Institution Support</strong> <br>The FBI warns of cyber criminals impersonating financial institutions to steal money or information in Account Takeover (ATO) fraud schemes. <a href="https://www.ic3.gov/PSA/2025/PSA251125" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<p><strong>Criminals Using Altered Proof-of-Life Media to Extort Victims in Virtual Kidnapping for Ransom Scams</strong> <br>The FBI warns the public about criminals altering photos found on social media or other publicly available sites to use as fake proof of life photos in virtual kidnapping for ransom scams. <a href="https://www.ic3.gov/PSA/2025/PSA251205" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> <em> </em></p>



<p><strong>Title</strong> <strong>Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure</strong> <br>The FBI, CISA, NSA, and partners release a joint advisory on Russian hacktivists targeting critical infrastructure with less sophisticated, lower impact attacks via VNC connections. <a href="https://www.ic3.gov/CSA/2025/251209.pdf" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<h2 class="wp-block-heading">Recommended Actions</h2>



<h3 class="wp-block-heading">Mitigations</h3>



<ul class="wp-block-list">
<li>Apply Microsoft December Patch Tuesday updates immediately, prioritizing critical and zero-day vulnerabilities. </li>



<li>Patch Adobe, Cisco, Fortinet, Ivanti, and SAP products to address critical flaws and prevent exploitation. </li>



<li>Upgrade or enroll in Extended Security Updates (ESU) for Windows 10 devices to maintain compliance and reduce risk. </li>



<li>Implement least privilege access and enforce MFA to reduce insider threat impact. </li>



<li>Harden EDR configurations and validate integrity to prevent abuse by ransomware actors. </li>
</ul>



<h3 class="wp-block-heading">Monitoring</h3>



<ul class="wp-block-list">
<li>Monitor for FortiCloud SSO authentication bypass attempts and unusual login patterns. </li>



<li>Track APT-related infrastructure indicators (Gamaredon, Lazarus) and insider activity anomalies. </li>



<li>Watch for GlassWorm indicators in VS Code extensions and OpenVSX marketplace downloads. </li>



<li>Monitor DNS and web traffic for phishing domains targeting travel/hospitality. </li>



<li>Observe AI-related activity for signs of automated reconnaissance or exploitation. </li>
</ul>



<h3 class="wp-block-heading">Detection Tips</h3>



<ul class="wp-block-list">
<li>Deploy rules to detect Unicode-based obfuscation in code repositories (GlassWorm). </li>



<li>Alert on unexpected EDR process manipulation or persistence techniques (Storm-0249). </li>



<li>Flag large-scale domain registrations and suspicious email campaigns linked to phishing. </li>



<li>Detect anomalous API calls or privilege escalations in Fortinet, Ivanti, and SAP environments. </li>



<li>Use behavioral analytics to identify AI-driven attack patterns and insider data exfiltration. </li>
</ul>



<h2 class="wp-block-heading"><strong>About Fortress SRM’s Vigilant Managed Cyber Hygiene Offering</strong>&nbsp;</h2>



<h3 class="wp-block-heading">Why Patching Matters</h3>



<p>Unpatched software is a leading cause of breaches—nearly 1 in 3 attacks exploit known vulnerabilities.&nbsp;</p>



<h3 class="wp-block-heading">Vigilant Managed Cyber Hygiene</h3>



<p> Fortress SRM’s Vigilant Managed Cyber Hygiene simplifies patch management.&nbsp;</p>



<ul class="wp-block-list">
<li>Automated updates with 97%+ success rate for Microsoft &amp; 100+ third-party applications&nbsp;</li>



<li>Critical patches, OS upgrades, and configuration updates for all devices, on/off network&nbsp;</li>



<li>24/7/365 U.S.-based monitoring and real-time reporting for full visibility&nbsp;</li>
</ul>



<h4 class="wp-block-heading">Stay Protected. Stay Proactive. </h4>



<p><a href="https://fortresssrm.com/managed-security/" target="_blank" rel="noreferrer noopener">Learn how Fortress SRM can enhance your cybersecurity strategy →</a>&nbsp;</p>
<p>The post <a href="https://fortresssrm.com/threat-and-security-update-december-2025/">Threat and Security Update – December, 2025</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Oops, Azure Did It Again: 5 Risks You Can&#8217;t Ignore</title>
		<link>https://fortresssrm.com/oops-azure-did-it-again-5-risks-you-cant-ignore/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Mon, 24 Nov 2025 16:41:54 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1797</guid>

					<description><![CDATA[<p>Written by: Donovan Crowley, Fortress SRM Director of Security Strategy Cloud environments aren’t just that “data center in the sky” anymore. They have become the backbone of modern enterprise IT. And ...</p>
<p>The post <a href="https://fortresssrm.com/oops-azure-did-it-again-5-risks-you-cant-ignore/">Oops, Azure Did It Again: 5 Risks You Can&#8217;t Ignore</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wp-block-post-date"><time datetime="2025-11-24T11:41:54-05:00">November 24, 2025</time></div>


<p><strong>Written by:</strong> Donovan Crowley, Fortress SRM Director of Security Strategy</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Cloud environments aren’t just that “data center in the sky” anymore. They have become the backbone of modern enterprise IT. And with hybrid and multi-cloud setups becoming the norm, Microsoft Azure is often at the center, powering it all.&nbsp;</p>



<p>But here’s the catch: with great flexibility comes great complexity… and where there’s complexity, there’s risk.&nbsp;</p>



<p>Azure’s power lies in its configurability, but that same flexibility makes misconfigurations easy to create and hard to spot. In fact, misconfigurations remain one of the leading causes of cloud breaches today, far more common than flashy exploits or headline-grabbing vulnerabilities.&nbsp;</p>



<p>Across our assessments and incident response cases, we see the same pattern: a small configuration slip, seemingly harmless, quietly escalates into serious exposure. And often, it happens without generating a single alert.&nbsp;</p>



<p>Some of the most overlooked risks we see again and again include:&nbsp;</p>



<ul class="wp-block-list">
<li>Overly permissive access rules that expose private workloads.&nbsp;</li>



<li>Local or legacy accounts bypassing MFA or Conditional Access.&nbsp;</li>



<li>Dormant identities and unused resources creating governance blind spots.&nbsp;</li>



<li>Misconfigured or missing logs that hinder threat detection.&nbsp;</li>



<li>Persistent admin privileges without PIM or just-in-time controls.&nbsp;</li>
</ul>



<p>Alone, these issues might not look like much. But in a fast-moving cloud environment, they stack up. And attackers love that hidden surface, auditors find it fast, and defenders usually spot it too late.&nbsp;</p>



<p>In this post, we’ll break down the top five Azure misconfigurations we see in the wild, why even experienced teams miss them, and how a focused Cloud Security Posture Management (CSPM) assessment can help you fix them quickly.&nbsp;</p>



<h2 class="wp-block-heading">Top 5 Azure Misconfigurations Putting You At Risk</h2>



<p>Azure makes it easy to move fast. You can deploy an entire workload in minutes, integrate it, and scale instantly. But that speed also means you can misconfigure it just as quickly.&nbsp;</p>



<p>Cloud environments never sit still. New resources spin up, identity assignments change, and hidden dependencies. As a result, the same core misconfigurations show up in almost every assessment we run, whether the organization is a small startup or a Fortune 100 enterprise.&nbsp;</p>



<p>Here are the top five issues you cannot afford to ignore.&nbsp;&nbsp;</p>



<h3 class="wp-block-heading">1. NSGs and RBAC Gone Wild: The Danger of Overly Permissive Permissions</h3>



<p><em>Too much access + too many privileges = your biggest Azure attack surface.&nbsp;&nbsp;</em></p>



<h4 class="wp-block-heading"><strong>What to Watch For (Common Symptoms)</strong></h4>



<ul class="wp-block-list">
<li>Open inbound Network Security Group (NSG) rules that allow traffic from 0.0.0.0/0, especially for RDP (port 3389) and SSH (port 22).&nbsp;</li>



<li>Excessive RBAC role assignments, where users or groups are given broad roles (e.g., Owner or Contributor) where specific, granular functional roles should be used (e.g., Reader, Virtual Machine Contributor, etc.).&nbsp;</li>



<li>“Temporary” or convenience-driven configuration access that never gets removed.</li>
</ul>



<h4 class="wp-block-heading">Why It Matters</h4>



<p>Exposed ports are top targets for brute-force and credential-stuffing attacks. Overprivileged accounts turn a minor breach into a major one. Regulatory frameworks like CIS, ISO, and NIST flag this as high-right.&nbsp;&nbsp;</p>



<h5 class="wp-block-heading">What to Check Right Now</h5>



<p>1.) <strong>Do any NSGs allow unrestricted inbound access?</strong>&nbsp;<br>2.) <strong>Do you have more than a handful of Owner/Contributor assignments?</strong>&nbsp;<br>3.) <strong>Are administrative ports directly exposed to the internet?</strong>&nbsp;</p>



<h4 class="wp-block-heading">Recommended Fixes</h4>



<p><strong>NSG Hardening</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Restrict inbound access to known IP ranges only. Use IP whitelisting for administrative protocols.</li>



<li>Remove public exposure entirely where possible and use Azure Bastion for secure admin access.&nbsp;</li>



<li>Use Azure site-to-site or point-to-point VPN to your work site or static remote sites instead of public access for resource management.&nbsp;</li>



<li>Enforce network hygiene and compliance with Azure Policy, including:&nbsp;<br>&#8211; <em>Deny Public Inbound Ports</em>&nbsp;<br>&#8211; <em>Deny Internet Facing NSG Rules</em>&nbsp;</li>
</ul>



<p><strong>RBAC Hardening</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Adopt a least-privilege roles only model.</li>



<li>Favor granular roles such as:&nbsp;<br>&#8211; Virtual Machine Contributor&nbsp;<br>&#8211; Storage Blob Data Reader&nbsp;<br>&#8211; Key Vault Reader&nbsp;</li>



<li>Audit role assignments for overprivilege regularly. Example:<br><code>az role assignment list --all --query "[?</code><br><code>roleDefinitionName=='Owner'].[principalName,scope]"</code></li>



<li>Schedule recurring RBAC and NSG reviews with resource owners and identity teams.</li>
</ul>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Pro Tip: Automate the Safety Net</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<p>To scale risk detection and remediation:&nbsp;</p>



<ul class="wp-block-list">
<li>Use Azure Defender for Cloud and your SIEM to alert on risky NSG or RBAC configurations.&nbsp;</li>



<li>Enable Just-in-Time VM Access via Defender to reduce inbound port exposure during operational windows.&nbsp;</li>
</ul>



<h3 class="wp-block-heading">2. Local Admin Accounts That Won’t Quit: The Risk of Skipping Entra ID (Azure AD) Authentication&nbsp;</h3>



<p><em>Local accounts are like leftover sushi: they might look fine, but they’re a hazard.&nbsp;</em>&nbsp;</p>



<h4 class="wp-block-heading"><strong style="white-space: normal;">What to Watch For (Common Symptoms)</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<ul class="wp-block-list">
<li>VMs or workloads accessed via local admin accounts, often shared informally among teams.&nbsp;</li>



<li>Applications or automation authenticate with static credentials embedded in code or stored insecurely.&nbsp;</li>



<li>Service accounts operating without lifecycle control, MFA, or logging.&nbsp;</li>
</ul>



<p>These shortcuts may speed things up, but they bypass every layer of modern identity security.&nbsp;</p>



<h4 class="wp-block-heading">Why It Matters</h4>



<p>Attackers love static secrets, and local accounts bypass modern identity controls. Entra ID bypass = no MFA, no audit trail, and a giant gap in zero-trust.&nbsp;&nbsp;</p>



<h5 class="wp-block-heading">What to Check Right Now</h5>



<p>1.) <strong>Are any VMs or workloads still using local admin accounts?</strong>&nbsp;<br>2.) <strong>Do any apps or scripts rely on embedded secrets?</strong>&nbsp;<br>3.) <strong>Are service accounts operating without logging or lifecycle management?</strong>&nbsp;</p>



<h4 class="wp-block-heading">Recommended Fixes</h4>



<p><strong>Enforce Entra ID Authentication First:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Enable Azure AD login for all VMs to centralize authentication and logging.&nbsp;</li>



<li>For Windows VMs, use Azure AD joined or Hybrid Join with AADLoginForWindows VM extension.&nbsp;</li>
</ul>



<p><strong>Replace Secrets with Managed Identities:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Use System-assigned or User-assigned Managed Identities for Azure resources to access other services securely.&nbsp;</li>



<li>Eliminate secrets stored in code, environment variables, or key vaults.&nbsp;</li>
</ul>



<p><strong>Secure Administrative Access&nbsp;</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Disable direct local admin access wherever possible.&nbsp;</li>



<li>Leverage Azure Bastion or Just-in-Time (JIT) VM Access for secure admin connections.&nbsp;</li>



<li>Enforce session expiry, logging, and MFA via Privileged Identity Management (PIM) or conditional access.&nbsp;</li>
</ul>



<p><strong>Audit and Cleanup Local Admin Accounts:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Inventory all local admin accounts across VM fleets. Use PowerShell or CLI to enumerate accounts:<br><code>Get-LocalGroupMember -Group "Administrators"</code></li>



<li>Regularly rotate or remove local accounts not tied to valid operational workflows.&nbsp;</li>



<li>Schedule recurring reviews to prevent “set-and-forget&#8221; accounts.&nbsp;&nbsp;</li>
</ul>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Pro Tip: Continuous Detection</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<ul class="wp-block-list">
<li>Use tools like <strong>Microsoft Defender for Cloud</strong> and <strong>Microsoft Entra ID Identity Protection</strong> for continuous detection of anomalous sign-in behavior.&nbsp;</li>



<li>Focus on accounts that haven’t yet been migrated to Entra ID.&nbsp;&nbsp;</li>
</ul>



<h3 class="wp-block-heading">3. Stale Resources and Identity Sprawl: Why Azure Cleanup Can&#8217;t Wait</h3>



<p><em>Old VMs, unused accounts, orphaned disks&#8230; clutter isn’t just messy, it’s also super risky.&nbsp;</em>&nbsp;</p>



<h4 class="wp-block-heading"><strong>What to Watch For (Common Symptoms)</strong>&nbsp;</h4>



<ul class="wp-block-list">
<li>Dormant service principals, legacy user accounts, or invalid Entra ID credentials left active.&nbsp;</li>



<li>Stopped or orphaned VMs, unattached disks, and retired resource groups still incurring cost or creating risk.&nbsp;</li>



<li>Resource sprawl caused by ad hoc deployments without naming standards, tagging, or lifecycle policies.&nbsp;</li>
</ul>



<p>Even well-managed environments accumulate this kind of “cloud waste” and unmanaged sprawl without guardrails. Not only does this create hidden risk, but it also makes audits, costs analysis, and compliance much harder than they need to be.&nbsp;&nbsp;</p>



<h4 class="wp-block-heading">Why It Matters</h4>



<p>Dormant assets = unmonitored attack surface. Plus, they inflate costs and complicate audits.&nbsp;&nbsp;</p>



<h5 class="wp-block-heading">What to Check Right Now</h5>



<p>1.) <strong>Any identities or service principals not used in 90+ days?</strong>&nbsp;<br>2.) <strong>Stopped or deallocated VMs, unattached disks, or idle load balancers?</strong>&nbsp;<br>3.) <strong>Resources missing tags or lifecycle policies?</strong>&nbsp;</p>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Recommended Fixes</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<p><strong>Audit Entra ID Objects:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Scan Entra ID users, groups, and service principals for inactivity:<br><code>(MSOL module deprecated in April): Get-<br>EntraInactiveSignInUser -LastSignInBeforeDaysAgo 90 -All</code></li>



<li>Remove or disable any identities not used in the past 90 days.&nbsp;</li>



<li>Rotate shared or service account credentials regularly.&nbsp;</li>
</ul>



<p><strong>Identify Stale Azure Resources:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Use Azure Advisor and Cost Management to detect unused resources.&nbsp;</li>



<li>Enable Azure Resource Graph Explorer to query at scale across subscriptions:&nbsp;<br><code>resources<br>| where type == 'microsoft.compute/virtualmachines'<br>| extend powerState = tostring(properties.extended.instanceView.powerState.displayStatus)&nbsp;<br>| where powerState == 'VM deallocated' or powerState == 'VM stopped'&nbsp;<br>| project name, resourceGroup, powerState, location&nbsp;<br>| order by name asc&nbsp;</code></li>
</ul>



<p><strong>Apply Naming, Tagging, and Lifecycle Standards:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Adopt consistent resource naming conventions and tagging requirements for ownership, environment, and expiration.&nbsp;</li>



<li>Automate tagging via deployment pipelines or Azure Policy for consistency.&nbsp;</li>
</ul>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Pro Tip: Automate Cleanup</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<ul class="wp-block-list">
<li>Build recurring workflows with Azure Automation runbooks or Logic Apps.</li>



<li>Flag inactive objects and notify resources owners before automatic removal.</li>
</ul>



<h3 class="wp-block-heading">4. Missing Logs = Blind Security: Missing Log Configuration on Azure Resources</h3>



<p><em>No logs = no visibility. Without proper logging, breaches, misconfigurations, or insider activity can fly under the radar.&nbsp;</em>&nbsp;</p>



<p>Logging is the backbone of cloud observability and security. Yet, in many Azure environments, critical resources are provisioned without proper diagnostic settings, leaving teams without visibility into performance, access, or potential compromise.&nbsp;</p>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Common Symptoms</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<ul class="wp-block-list">
<li>Resources like Virtual Machines, Storage Accounts, Key Vaults, Databases, and App Services do not have diagnostic logs enabled.&nbsp;</li>



<li>Logs aren’t routed to a central Log Analytics Workspace (LAW), SIEM, or secure storage.&nbsp;</li>



<li>Inconsistent or absent log retention policies across teams or subscriptions.&nbsp;&nbsp;</li>
</ul>



<p>Without logs, security teams operate blind, and incidents may only be discovered after significant damage.&nbsp;&nbsp;</p>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Why It Matters</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<p>Logs are the foundation of detection, investigation, and compliance. Without them, you’re flying blind.&nbsp;&nbsp;</p>



<h5 class="wp-block-heading">What to Check Right Now</h5>



<p>1.) <strong>Are all critical resources logging to a central destination?</strong>&nbsp;<br>2.) <strong>Are retention policies consistent and compliant?</strong>&nbsp;<br>3.) <strong>Are diagnostic settings deployed at scale for all subscriptions and management groups?</strong>&nbsp;</p>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Recommended Fixes</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<p><strong>Enforce Diagnostic Settings at Scale</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Use built-in Azure Policies to automatically audit and deploy diagnostics, such as:&nbsp;<br>&#8211; Audit Diagnostic Settings&nbsp;<br>&#8211; Deploy Diagnostic Settings for Key Vault&nbsp;<br>&#8211; Audit VMs without Monitoring Agent&nbsp;</li>



<li>Assign these policies at management group or subscription level for wide coverage.&nbsp;</li>
</ul>



<p><strong>Confirm Logging Across Resource Types</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>List diagnostic settings for resource groups or resource types using the CLI:<br>&nbsp;<br>az monitor diagnostic-settings list &#8211;resource-group &lt;resource-group-name&gt;&nbsp;<br></li>



<li>Identify gaps and generate a remediation plan based on priority.&nbsp;</li>
</ul>



<p><strong>Centralize Log Routing and Retention</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Forward logs to:&nbsp;<br>&#8211; A Log Analytics Workspace (LAW) for structured queries and alerts&nbsp;<br>&#8211; A SIEM platform (e.g., Microsoft Sentinel, Elastic, SentinelOne Singularity) for threat detection&nbsp;<br>&#8211; Or secure storage with immutable retention policies for compliance&nbsp;</li>
</ul>



<p><strong>Enable Additional Monitoring Signals</strong>&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Activity Logs: </strong>Track control-plane activity and administrative actions.&nbsp;</li>



<li><strong>VMInsights:</strong> Provide rich OS-level visibility for virtual machines.&nbsp;</li>



<li><strong>Defender for Cloud logs:</strong> Monitor workload-level vulnerability and threat detection.&nbsp;</li>
</ul>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Pro Tip: Continuous Coverage</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<ul class="wp-block-list">
<li>Build a “Log Coverage Report” with Azure Monitor Workbooks or custom Resource Graph queries.&nbsp;&nbsp;</li>



<li>Use this to continuously assess and visualize log gaps across all assets in your tenant.&nbsp;</li>
</ul>



<h3 class="wp-block-heading">5. Azure Admins Without PIM or Role Controls: A Ticking Time Bomb</h3>



<p><em>Without Just-in-Time (JIT) and Privileged Identity Management (PIM), a single compromised admin can put your entire environment at risk.</em>&nbsp;</p>



<h4 class="wp-block-heading"><strong style="white-space: normal;">What to Watch For (Common Symptoms)</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<ul class="wp-block-list">
<li>High-privilege roles (Global Admin, User Access Administrator, Owner) assigned permanently to user accounts or groups.&nbsp;</li>



<li>No guardrails in place for role assignment, expiration, or user justification.&nbsp;</li>



<li>Lack of auditing or monitoring on administrative role usage.&nbsp;</li>
</ul>



<p>Permanent admin assignments create a latent breach vector. Attackers are big fans of accounts that never expire.&nbsp;</p>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Why It Matters</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<p>Violates least privilege and zero trust. Attackers actively target standing admin roles to move laterally. Compliance frameworks demand temporary, auditable, controlled privileged access.&nbsp;&nbsp;</p>



<h5 class="wp-block-heading">What to Check Right Now</h5>



<p>1.) <strong>Which users or groups hold permanent high-privilege roles?</strong>&nbsp;<br>2.) <strong>Are there no approval workflows or time limits in place?</strong>&nbsp;<br>3.) <strong>Is JIT VM access enabled for administrative connections?</strong>&nbsp;</p>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Recommended Fixes</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<p><strong>Enable Privileged Identity Management (PIM)</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Apply PIM to all high-impact roles including:&nbsp;<br>&#8211; Global Administrator&nbsp;<br>&#8211; Security Administrator&nbsp;<br>&#8211; Owner, Contributor (for resource-level RBAC)&nbsp;</li>



<li>Enforce: <br>&#8211; Time-bound access (e.g., 4-hour windows)&nbsp;<br>&#8211; Justification and MFA for elevation&nbsp;<br>&#8211; Approval workflows for sensitive roles&nbsp;</li>
</ul>



<p><strong>Audit and Rotate Standing Privileges</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Review all current assignments to high-privilege roles by navigating to the Azure Portal and exporting the assignment list from PIM.&nbsp;</li>



<li>Remove or transition permanent assignments to eligible assignments under PIM.&nbsp;</li>



<li>Use Continuous Access Evaluation (CAE) in Entra ID to revoke access quickly if user risk changes or session anomalies are detected.&nbsp;</li>
</ul>



<p><strong>Apply Just-In-Time Access</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>In addition to PIM for identity roles, configure Just-in-Time VM access via Defender for Cloud.&nbsp;</li>



<li>This locks down inbound RDP/SSH and only opens access upon authorized request for a limited time.&nbsp;</li>
</ul>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Pro Tip: Continuous Monitoring</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<ul class="wp-block-list">
<li>Integrate audit logs from PIM and JIT into a SIEM (e.g., Microsoft Sentinel).</li>



<li>Monitor privilege elevations to detect unusual patterns and get early warnings on potential misuse.&nbsp;&nbsp;</li>
</ul>



<h2 class="wp-block-heading">CSPM Assessment: Fast, Focused, Continuous</h2>



<p>Traditional audits provide only a snapshot in time. Azure environments evolve constantly, and point-in-time reviews cannot keep up. Cloud Security Posture Management, or CSPM, changes that. It delivers automated visibility, intelligent detection, and prioritized remediation, giving your team both immediate and ongoing security improvements. </p>



<p><strong>Bottom line:</strong> CSPM turns “Oops, Azure did it again” into “Got it covered.”</p>



<h3 class="wp-block-heading">Why CSPM Matters</h3>



<p>Even small misconfigurations can have major consequences:</p>



<ul class="wp-block-list">
<li><strong>Ransomware exposure</strong>&nbsp;– open ports and stale accounts are actively exploited.</li>



<li><strong>Compliance failures</strong>&nbsp;– HIPAA, PCI DSS, ISO 27001, and other frameworks require proper access controls and audit trails.</li>



<li><strong>Unexpected downtime</strong>&nbsp;– misconfigurations can disrupt critical workloads.</li>



<li><strong>Reputational damage</strong>&nbsp;– customers expect reliable operations, not incident disclosures.</li>
</ul>



<p>CSPM gives you continuous, automated insight into your environment. It identifies the misconfigurations that cause the most risk, including overly permissive access, stale identities, missing logs, credential misuse, and standing admin privileges. Every finding is tied to context, severity, business impact, and compliance requirements, so you know exactly what to fix first.</p>



<p>With CSPM in place, you move from reacting to incidents to preventing them. From scrambling before audits to walking in prepared. From hoping you are secure to knowing exactly where you stand.</p>



<h3 class="wp-block-heading">What You Get with a CSPM Assessment</h3>



<p>A CSPM assessment from Fortress SRM is conducted by our veteran cloud security analysts using modern tooling to deliver rapid visibility, automated detection, and actionable remediation tailored to your Azure environment.</p>



<ul class="wp-block-list">
<li><strong>Rapid visibility</strong>&nbsp;– every user, resource, and permission across your Azure tenant.</li>



<li><strong>Automated detection</strong>&nbsp;– misconfigurations and security gaps with context and priority.</li>



<li><strong>Actionable remediation</strong>&nbsp;– clear, tailored steps for your environment.</li>



<li><strong>Continuous posture improvement</strong>&nbsp;– structured, ongoing cloud security management.</li>
</ul>



<h4 class="wp-block-heading">Next Step</h4>



<p>Do not wait for an auditor or an attacker to uncover your risks. Fortress SRM provides hands-on support and continuous improvement to help you stay ahead of threats and ensure compliance.</p>



<p><strong>Contact Fortress SRM to schedule your Azure CSPM Assessment and see exactly where your risks are and how to fix them fast.</strong></p>


<script type="text/javascript">
/* <![CDATA[ */
var gform;gform||(document.addEventListener("gform_main_scripts_loaded",function(){gform.scriptsLoaded=!0}),document.addEventListener("gform/theme/scripts_loaded",function(){gform.themeScriptsLoaded=!0}),window.addEventListener("DOMContentLoaded",function(){gform.domLoaded=!0}),gform={domLoaded:!1,scriptsLoaded:!1,themeScriptsLoaded:!1,isFormEditor:()=>"function"==typeof InitializeEditor,callIfLoaded:function(o){return!(!gform.domLoaded||!gform.scriptsLoaded||!gform.themeScriptsLoaded&&!gform.isFormEditor()||(gform.isFormEditor()&&console.warn("The use of gform.initializeOnLoaded() is deprecated in the form editor context and will be removed in Gravity Forms 3.1."),o(),0))},initializeOnLoaded:function(o){gform.callIfLoaded(o)||(document.addEventListener("gform_main_scripts_loaded",()=>{gform.scriptsLoaded=!0,gform.callIfLoaded(o)}),document.addEventListener("gform/theme/scripts_loaded",()=>{gform.themeScriptsLoaded=!0,gform.callIfLoaded(o)}),window.addEventListener("DOMContentLoaded",()=>{gform.domLoaded=!0,gform.callIfLoaded(o)}))},hooks:{action:{},filter:{}},addAction:function(o,r,e,t){gform.addHook("action",o,r,e,t)},addFilter:function(o,r,e,t){gform.addHook("filter",o,r,e,t)},doAction:function(o){gform.doHook("action",o,arguments)},applyFilters:function(o){return gform.doHook("filter",o,arguments)},removeAction:function(o,r){gform.removeHook("action",o,r)},removeFilter:function(o,r,e){gform.removeHook("filter",o,r,e)},addHook:function(o,r,e,t,n){null==gform.hooks[o][r]&&(gform.hooks[o][r]=[]);var d=gform.hooks[o][r];null==n&&(n=r+"_"+d.length),gform.hooks[o][r].push({tag:n,callable:e,priority:t=null==t?10:t})},doHook:function(r,o,e){var t;if(e=Array.prototype.slice.call(e,1),null!=gform.hooks[r][o]&&((o=gform.hooks[r][o]).sort(function(o,r){return o.priority-r.priority}),o.forEach(function(o){"function"!=typeof(t=o.callable)&&(t=window[t]),"action"==r?t.apply(null,e):e[0]=t.apply(null,e)})),"filter"==r)return e[0]},removeHook:function(o,r,t,n){var e;null!=gform.hooks[o][r]&&(e=(e=gform.hooks[o][r]).filter(function(o,r,e){return!!(null!=n&&n!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][r]=e)}});
/* ]]&gt; */
</script>

                <div class='gf_browser_unknown gform_wrapper gform_legacy_markup_wrapper gform-theme--no-framework' data-form-theme='legacy' data-form-index='0' id='gform_wrapper_1' >
                        <div class='gform_heading'>
                            <h3 class="gform_title">Contact Us</h3>
                            <p class='gform_description'></p>
                        </div><form method='post' enctype='multipart/form-data'  id='gform_1'  action='/feed/' data-formid='1' novalidate>
                        <div class='gform-body gform_body'><ul id='gform_fields_1' class='gform_fields top_label form_sublabel_below description_below validation_below'><li id="field_1_8" class="gfield gfield--type-honeypot gform_validation_container field_sublabel_below gfield--has-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_8'>Phone</label><div class='ginput_container'><input name='input_8' id='input_1_8' type='text' value='' autocomplete='new-password'/></div><div class='gfield_description' id='gfield_description_1_8'>This field is for validation purposes and should be left unchanged.</div></li><li id="field_1_1" class="gfield gfield--type-name gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label gfield_label_before_complex' >Name<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_complex ginput_container ginput_container--name no_prefix has_first_name no_middle_name has_last_name no_suffix gf_name_has_2 ginput_container_name gform-grid-row' id='input_1_1'>
                            
                            <span id='input_1_1_3_container' class='name_first gform-grid-col gform-grid-col--size-auto' >
                                                    <input type='text' name='input_1.3' id='input_1_1_3' value=''   aria-required='true'   placeholder='First Name'  />
                                                    <label for='input_1_1_3' class='gform-field-label gform-field-label--type-sub '>First</label>
                                                </span>
                            
                            <span id='input_1_1_6_container' class='name_last gform-grid-col gform-grid-col--size-auto' >
                                                    <input type='text' name='input_1.6' id='input_1_1_6' value=''   aria-required='true'   placeholder='Last Name'  />
                                                    <label for='input_1_1_6' class='gform-field-label gform-field-label--type-sub '>Last</label>
                                                </span>
                            
                        </div></li><li id="field_1_5" class="gfield gfield--type-text gf_left_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_5'>Company<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_text'><input name='input_5' id='input_1_5' type='text' value='' class='medium'    placeholder='Company' aria-required="true" aria-invalid="false"   /></div></li><li id="field_1_6" class="gfield gfield--type-text gf_right_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_6'>Title<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_text'><input name='input_6' id='input_1_6' type='text' value='' class='medium'    placeholder='Title' aria-required="true" aria-invalid="false"   /></div></li><li id="field_1_3" class="gfield gfield--type-phone gf_left_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_3'>Phone<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_phone'><input name='input_3' id='input_1_3' type='tel' value='' class='medium'  placeholder='Phone' aria-required="true" aria-invalid="false"   /></div></li><li id="field_1_2" class="gfield gfield--type-email gf_right_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_2'>Email<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_email'>
                            <input name='input_2' id='input_1_2' type='email' value='' class='medium'   placeholder='Email Address' aria-required="true" aria-invalid="false"  />
                        </div></li><li id="field_1_7" class="gfield gfield--type-textarea gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_7'>Where did you hear about Fortress SRM?</label><div class='ginput_container ginput_container_textarea'><textarea name='input_7' id='input_1_7' class='textarea small'      aria-invalid="false"   rows='10' cols='50'></textarea></div></li><li id="field_1_4" class="gfield gfield--type-textarea gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_4'>Message<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_textarea'><textarea name='input_4' id='input_1_4' class='textarea medium'    placeholder='Message' aria-required="true" aria-invalid="false"   rows='10' cols='50'></textarea></div></li></ul></div>
        <div class='gform-footer gform_footer top_label'> <input type='submit' id='gform_submit_button_1' class='gform_button button' onclick='gform.submission.handleButtonClick(this);' data-submission-type='submit' value='Submit'  /> 
            <input type='hidden' class='gform_hidden' name='gform_submission_method' data-js='gform_submission_method_1' value='postback' />
            <input type='hidden' class='gform_hidden' name='gform_theme' data-js='gform_theme_1' id='gform_theme_1' value='legacy' />
            <input type='hidden' class='gform_hidden' name='gform_style_settings' data-js='gform_style_settings_1' id='gform_style_settings_1' value='{&quot;inputPrimaryColor&quot;:&quot;#204ce5&quot;}' />
            <input type='hidden' class='gform_hidden' name='is_submit_1' value='1' />
            <input type='hidden' class='gform_hidden' name='gform_submit' value='1' />
            
            <input type='hidden' class='gform_hidden' name='gform_currency' data-currency='USD' value='+zyIY4kfFpB9fSwXvuInVKxW7PGQfuYjlLZvZ/5d8loi10pEkjDiQrI+X0K6ePnxliWaLBnOupMMyaqjBPzOraYAE0q98RirOSurriRxAa4WHIE=' />
            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' />
            <input type='hidden' class='gform_hidden' name='state_1' value='WyJbXSIsImU2ZDAzMWFjZGE5YzM2MzllMDNkNzAzN2VjOTBiYzczIl0=' />
            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_target_page_number_1' id='gform_target_page_number_1' value='0' />
            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_source_page_number_1' id='gform_source_page_number_1' value='1' />
            <input type='hidden' name='gform_field_values' value='' />
            
        </div>
                        <p style="display: none !important;" class="akismet-fields-container" data-prefix="ak_"><label>&#916;<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js" value="128"/><script>document.getElementById( "ak_js_1" ).setAttribute( "value", ( new Date() ).getTime() );</script></p></form>
                        </div><script type="text/javascript">
/* <![CDATA[ */
 gform.initializeOnLoaded( function() {gformInitSpinner( 1, 'https://fortresssrm.com/wp-content/plugins/gravityforms/images/spinner.svg', true );jQuery('#gform_ajax_frame_1').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_1');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_1').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_1').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_1').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_1').removeClass('gform_validation_error');}setTimeout( function() { /* delay the scroll by 50 milliseconds to fix a bug in chrome */  }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_1').val();gformInitSpinner( 1, 'https://fortresssrm.com/wp-content/plugins/gravityforms/images/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [1, current_page]);window['gf_submitting_1'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}jQuery('#gform_wrapper_1').replaceWith(confirmation_content);jQuery(document).trigger('gform_confirmation_loaded', [1]);window['gf_submitting_1'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_1').text());}else{jQuery('#gform_1').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger("gform_pre_post_render", [{ formId: "1", currentPage: "current_page", abort: function() { this.preventDefault(); } }]);        if (event && event.defaultPrevented) {                return;        }        const gformWrapperDiv = document.getElementById( "gform_wrapper_1" );        if ( gformWrapperDiv ) {            const visibilitySpan = document.createElement( "span" );            visibilitySpan.id = "gform_visibility_test_1";            gformWrapperDiv.insertAdjacentElement( "afterend", visibilitySpan );        }        const visibilityTestDiv = document.getElementById( "gform_visibility_test_1" );        let postRenderFired = false;        function triggerPostRender() {            if ( postRenderFired ) {                return;            }            postRenderFired = true;            gform.core.triggerPostRenderEvents( 1, current_page );            if ( visibilityTestDiv ) {                visibilityTestDiv.parentNode.removeChild( visibilityTestDiv );            }        }        function debounce( func, wait, immediate ) {            var timeout;            return function() {                var context = this, args = arguments;                var later = function() {                    timeout = null;                    if ( !immediate ) func.apply( context, args );                };                var callNow = immediate && !timeout;                clearTimeout( timeout );                timeout = setTimeout( later, wait );                if ( callNow ) func.apply( context, args );            };        }        const debouncedTriggerPostRender = debounce( function() {            triggerPostRender();        }, 200 );        if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) {            const observer = new MutationObserver( ( mutations ) => {                mutations.forEach( ( mutation ) => {                    if ( mutation.type === 'attributes' && visibilityTestDiv.offsetParent !== null ) {                        debouncedTriggerPostRender();                        observer.disconnect();                    }                });            });            observer.observe( document.body, {                attributes: true,                childList: false,                subtree: true,                attributeFilter: [ 'style', 'class' ],            });        } else {            triggerPostRender();        }    } );} ); 
/* ]]&gt; */
</script>
<p>The post <a href="https://fortresssrm.com/oops-azure-did-it-again-5-risks-you-cant-ignore/">Oops, Azure Did It Again: 5 Risks You Can&#8217;t Ignore</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Threat and Security Update – November, 2025</title>
		<link>https://fortresssrm.com/threat-and-security-update-november-2025/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Fri, 21 Nov 2025 14:42:51 +0000</pubDate>
				<category><![CDATA[Threat & Security Updates]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1795</guid>

					<description><![CDATA[<p>Stay Ahead of Threats with the Latest Vulnerability Updates for November Stay up to date on critical cyber risks, Microsoft’s November Patch Tuesday, and other notable third-party vulnerabilities. Timely patching ...</p>
<p>The post <a href="https://fortresssrm.com/threat-and-security-update-november-2025/">Threat and Security Update – November, 2025</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading"><br>Stay Ahead of Threats with the Latest Vulnerability Updates for November</h3>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Stay up to date on critical cyber risks, Microsoft’s November Patch Tuesday, and other notable third-party vulnerabilities. Timely patching is key to maintaining a strong security posture and protecting your business from threats.&nbsp;</p>



<h3 class="wp-block-heading">Quick Highlights</h3>



<ul class="wp-block-list">
<li><strong>Microsoft Patch Tuesday:</strong>&nbsp;<br>&#8211; 63&nbsp;vulnerabilities disclosed&nbsp;<br>&#8211; 4&nbsp;rated&nbsp;<strong>Critical</strong>,&nbsp;1&nbsp;<strong>Zero-Day</strong>&nbsp;(actively exploited)&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Adobe Security Updates:</strong>&nbsp;<br>&#8211; 29&nbsp;vulnerabilities patched across&nbsp;8&nbsp;products&nbsp;<br>&#8211; 23&nbsp;rated&nbsp;<strong>Critical</strong>, affecting&nbsp;InDesign,&nbsp;inCopy, Photoshop, Illustrator, Illustrator Mobile, Pass, Substance 3D Stager, and Format Plugins&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>High-Severity Advisories from Major Vendors:</strong>&nbsp;<br>&#8211; <strong>Cisco</strong>:&nbsp;3 critical-severity flaws&nbsp;and&nbsp;1&nbsp;high-severity flaws,&nbsp;in&nbsp;Unified CCX, Secure Firewall ASA,&nbsp;Secure FTD,&nbsp;IOS/IOS XE/IOS XR, ISE RADIUS&nbsp;<br>&#8211; <strong>Fortinet</strong>: 1 medium-severity flaw in&nbsp;FortiOS&nbsp;<br>&#8211; <strong>Ivanti</strong>:&nbsp;1&nbsp;high-severity flaw in&nbsp;Ivanti Endpoint Manager&nbsp;<br>&#8211; <strong>SAP</strong>:&nbsp;3&nbsp;critical vulnerabilities in&nbsp;NetWeaver AS Java, SQL Anywhere Monitor, and Solution Manager<br>&#8211; <strong>Google Chrome:</strong>&nbsp;1&nbsp;high-severity flaw&nbsp;fixed in security updates&nbsp;<br>&#8211; <strong>Mozilla Firefox:</strong>&nbsp;9 high-severity flaws&nbsp;fixed in&nbsp;security updates&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Top Threats to Watch:</strong>&nbsp;<br>&#8211; <strong>Microsoft Teams Exploitation</strong>&nbsp;– Vulnerabilities enabling impersonation, message manipulation, and spoofing in Teams&nbsp;<br>&#8211; <strong>Advanced Persistent Threat (APT) Activity</strong>&nbsp;– Increased operations by China-, Iran-, and North Korea-aligned groups&nbsp;<br>&#8211; <strong>AI-Driven Cyberattacks</strong>&nbsp;– Threat actors&nbsp;leveraging&nbsp;AI for prompt injection, social engineering, and malware&nbsp;&nbsp;<br>&#8211; <strong>Sophisticated Social Engineering Campaigns</strong>&nbsp;– Large-scale smishing, phishing kits like Quantum Route Redirect, and gift card fraud&nbsp;&nbsp;</li>
</ul>



<h2 class="wp-block-heading">Windows 10 Reaches End of Support</h2>



<p>As of&nbsp;<strong>October 14, 2025</strong>, Microsoft has officially ended support for Windows 10.&nbsp;October’s Patch Tuesday was the&nbsp;<strong>final security update</strong>&nbsp;for the OS—unless your organization enrolls in the&nbsp;<strong>Extended Security Updates (ESU)</strong>&nbsp;program.&nbsp;</p>



<ul class="wp-block-list">
<li><strong>What This Means for Your Organization:</strong>&nbsp;<br>&#8211; No more security patches or bug fixes for Windows 10 devices&nbsp;<br>&#8211; Increased exposure to vulnerabilities and compliance risks&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Continued support requires either:&nbsp;&nbsp;<br>&#8211; Enrolling in Microsoft’s&nbsp;<strong>paid ESU program</strong>, or&nbsp;<br>&#8211; <strong>Upgrading to&nbsp;Latest Version of&nbsp;Windows 11</strong>&nbsp;</li>
</ul>



<p><strong>Need help planning your transition?</strong>&nbsp;<br>Fortress SRM can help assess your environment, prioritize upgrades, and ensure your endpoints&nbsp;remain&nbsp;patch-compliant and secure.&nbsp;</p>



<h2 class="wp-block-heading">Patch Tuesday Summary</h2>



<p><strong>Microsoft November 2025 Patch Tuesday</strong>&nbsp;<br><strong>63</strong>&nbsp;<strong>vulnerabilities</strong>&nbsp;disclosed, including&nbsp;<strong>4&nbsp;critical</strong>&nbsp;and&nbsp;<strong>1&nbsp;zero-day</strong>. By category:</p>



<ul class="wp-block-list">
<li><strong>29</strong>&nbsp;Elevation of Privilege&nbsp;</li>



<li><strong>16</strong> Remote Code Execution&nbsp;</li>



<li><strong>11</strong> Information Disclosure&nbsp;</li>



<li><strong>3</strong>&nbsp;Denial of Service&nbsp;</li>



<li><strong>2</strong>&nbsp;Security Feature Bypass&nbsp;</li>



<li><strong>2</strong>&nbsp;Spoofing&nbsp;</li>
</ul>



<h2 class="wp-block-heading">Critical Common Vulnerabilities and Exposures (CVEs)</h2>



<h3 class="wp-block-heading">Windows Zero-Days</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Details</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-62215" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-62215</strong></a><strong></strong>&nbsp;</td><td><strong>Windows Kernel Elevation of Privilege Vulnerability</strong>&nbsp;</td><td><strong>Exploited Zero-Day</strong>&nbsp;</td><td><strong>Yes</strong>&nbsp;</td></tr></tbody></table></figure>



<h3 class="wp-block-heading">Other Critical CVE&#8217;s Worth Mentioning</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Details</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-62199" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-62199</strong></a><strong></strong>&nbsp;</td><td><strong>Microsoft Office Remote Code Execution Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30398" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-30398</strong></a><strong></strong>&nbsp;</td><td><strong>Nuance&nbsp;PowerScribe&nbsp;360 Information Disclosure Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-62214" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-62214</strong></a><strong></strong>&nbsp;</td><td><strong>Visual Studio Remote Code Execution Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-60716" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-60716</strong></a><strong></strong>&nbsp;</td><td><strong>DirectX Graphics Kernel Elevation of Privilege Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><em><a href="https://msrc.microsoft.com/update-guide/releaseNote/2025-Nov" target="_blank" rel="noreferrer noopener">Microsoft November 2025 Security Update Release</a></em></p>



<h3 class="wp-block-heading">3rd Party Critical CVE&#8217;s Worth Mentioning</h3>



<h4 class="wp-block-heading">Adobe Products *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Affected&nbsp;Product</strong>&nbsp;</td><td><strong>Critical Issues</strong>&nbsp;</td><td><strong>Key Risks</strong>&nbsp;</td></tr><tr><td><a href="https://helpx.adobe.com/security/products/indesign/apsb25-106.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61814</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/indesign/apsb25-106.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61815</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/indesign/apsb25-106.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61824</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/indesign/apsb25-106.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61832</strong></a><strong></strong>&nbsp;</td><td><strong>InDesign</strong>&nbsp;</td><td><strong>4 Critical</strong>&nbsp;</td><td><strong>Arbitrary Code Execution</strong>&nbsp;</td></tr><tr><td><a href="https://helpx.adobe.com/security/products/incopy/apsb25-107.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61816</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/incopy/apsb25-107.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61817</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/incopy/apsb25-107.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61818</strong></a><strong></strong>&nbsp;</td><td><strong>InCopy</strong>&nbsp;</td><td><strong>3 Critical</strong>&nbsp;</td><td><strong>Arbitrary Code Execution</strong>&nbsp;</td></tr><tr><td><a href="https://helpx.adobe.com/security/products/photoshop/apsb25-108.html" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-61819</strong></a>&nbsp;</td><td><strong>Photoshop</strong>&nbsp;</td><td><strong>1 Critical</strong>&nbsp;</td><td><strong>Arbitrary Code Execution</strong>&nbsp;</td></tr><tr><td><a href="https://helpx.adobe.com/security/products/illustrator/apsb25-109.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61820</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/illustrator/apsb25-109.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61831</strong></a><strong></strong>&nbsp;</td><td><strong>Illustrator</strong>&nbsp;</td><td><strong>2 Critical</strong>&nbsp;</td><td><strong>Arbitrary Code Execution</strong>&nbsp;</td></tr><tr><td><a href="https://helpx.adobe.com/security/products/illustrator-mobile-ios/apsb25-111.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61826</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/illustrator-mobile-ios/apsb25-111.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61827</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/illustrator-mobile-ios/apsb25-111.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61828</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/illustrator-mobile-ios/apsb25-111.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61829</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/illustrator-mobile-ios/apsb25-111.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61836</strong></a><strong></strong>&nbsp;</td><td><strong>Illustrator Mobile</strong>&nbsp;</td><td><strong>5 Critical</strong>&nbsp;</td><td><strong>Arbitrary Code Execution</strong>&nbsp;</td></tr><tr><td><a href="https://helpx.adobe.com/security/products/pass/apsb25-112.html" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-61830</strong></a><strong></strong>&nbsp;</td><td><strong>Pass</strong>&nbsp;</td><td><strong>1 Critical</strong>&nbsp;</td><td><strong>Security Feature Bypass</strong>&nbsp;</td></tr><tr><td><a href="https://helpx.adobe.com/security/products/substance3d_stager/apsb25-113.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61833</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/substance3d_stager/apsb25-113.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61834</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/substance3d_stager/apsb25-113.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64531</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/substance3d_stager/apsb25-113.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61835</strong></a><strong></strong>&nbsp;</td><td><strong>Substance 3D Stager</strong>&nbsp;</td><td><strong>4 Critical</strong>&nbsp;</td><td><strong>Arbitrary Code Execution</strong>&nbsp;</td></tr><tr><td><a href="https://helpx.adobe.com/security/products/formatplugins/apsb25-114.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61837</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/formatplugins/apsb25-114.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61838</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/formatplugins/apsb25-114.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61839</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/formatplugins/apsb25-114.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61840</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/formatplugins/apsb25-114.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61841</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/formatplugins/apsb25-114.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61842</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/formatplugins/apsb25-114.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61843</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/formatplugins/apsb25-114.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61844</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/formatplugins/apsb25-114.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61845</strong></a><strong></strong>&nbsp;</td><td><strong>Format Plugins</strong>&nbsp;</td><td><strong>3 Critical</strong>&nbsp;</td><td><strong>Arbitrary Code Execution</strong>&nbsp;<strong>Memory Exposure</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://helpx.adobe.com/security/security-bulletin.html" target="_blank" rel="noreferrer noopener"><em>Adobe Security Bulletins</em></a></p>



<h3 class="wp-block-heading">Cisco *</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Affected Product</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cc-unauth-rce-QeN8h7mQ" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-20354</strong></a><strong></strong>&nbsp;<a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cc-unauth-rce-QeN8h7mQ" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-20358</strong></a><strong></strong>&nbsp;</td><td><strong>Cisco Unified CCX</strong>&nbsp;</td><td><strong>Remote Code Execution Vulnerabilities</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-code-exec-WmfP3h3O" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-20363</strong></a><strong></strong>&nbsp;</td><td><strong>Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, Cisco Secure Firewall Threat Defense (FTD) Software, Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software</strong>&nbsp;</td><td><strong>Web Services Remote Code Execution Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-z5xP8EUB" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-20333</strong></a><strong></strong>&nbsp;</td><td><strong>Cisco Secure Firewall Adaptive Security Appliance (ASA) Software&nbsp;and&nbsp;Cisco&nbsp;Secure Firewall Threat Defense (FTD) Software</strong>&nbsp;</td><td><strong>Web Server Remote Code Execution Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>Yes</strong>&nbsp;</td></tr><tr><td><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-radsupress-dos-8YF3JThh" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-20343</strong></a><strong></strong>&nbsp;</td><td><strong>Cisco Identity Services Engine (ISE)&nbsp;RADIUS</strong>&nbsp;</td><td><strong>Denial of Service Vulnerability</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://sec.cloudapps.cisco.com/security/center/publicationListing.x" target="_blank" rel="noreferrer noopener"><em>Cisco&nbsp;Security Advisories</em></a></p>



<h3 class="wp-block-heading">Fortinet *</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Affected Product</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://fortiguard.fortinet.com/psirt/FG-IR-25-026" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-24477</strong></a><strong></strong>&nbsp;</td><td><strong>FortiOS&nbsp;cw_staddaemon</strong>&nbsp;</td><td><strong>Heap-Based Buffer Overflow Vulnerability</strong>&nbsp;</td><td><strong>Medium</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://www.fortiguard.com/psirt" target="_blank" rel="noreferrer noopener"><em>Fortinet PSIRT Advisories</em></a></p>



<h3 class="wp-block-heading">Ivanti *</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Affected Product</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2025-for-EPM-2024?language=en_US" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-10918</strong></a><strong></strong>&nbsp;</td><td><strong>Ivanti Endpoint Manager (EPM)</strong>&nbsp;</td><td><strong>Arbitrary File Write on Disk</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://www.ivanti.com/blog/november-2025-security-update" target="_blank" rel="noreferrer noopener"><em>Ivanti&nbsp;November&nbsp;2025 Security Update</em></a></p>



<h3 class="wp-block-heading">SAP *</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Affected Component</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42890" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42890</strong></a><strong></strong>&nbsp;</td><td>SQL Anywhere Monitor (Non-Gui)&nbsp;</td><td><strong>Insecure key &amp; Secret Management vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42944" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42944</strong></a><strong></strong>&nbsp;</td><td>SAP NetWeaver AS Java&nbsp;</td><td><strong>Security Hardening for Insecure Deserialization</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42887" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42887</strong></a><strong></strong>&nbsp;</td><td>SAP Solution Manager&nbsp;</td><td><strong>Code Injection vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42940" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42940</strong></a><strong></strong>&nbsp;</td><td>SAP&nbsp;CommonCryptoLib&nbsp;</td><td><strong>Memory Corruption vulnerability</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://support.sap.com/en/my-support/knowledge-base/security-notes-news/november-2025.html" target="_blank" rel="noreferrer noopener"><em>SAP&nbsp;November&nbsp;2025&nbsp;Security Notes</em></a></p>



<h3 class="wp-block-heading">Google Chrome</h3>



<ul class="wp-block-list">
<li><strong>Version:</strong>&nbsp;142.0.7444.175/.176&nbsp;(Windows and Mac),&nbsp;142.0.7444.175&nbsp;(Linux)&nbsp;</li>



<li><strong>Release Date:</strong>&nbsp;November 11, 2025&nbsp;</li>



<li><strong>Key Fixes:</strong>&nbsp;Security fix for&nbsp;CVE-2025-13223&nbsp;and&nbsp;CVE-2025-13224&nbsp;</li>
</ul>



<p><a href="https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop_17.html" target="_blank" rel="noreferrer noopener"><em>Chrome Release Notes</em></a>&nbsp;</p>



<h3 class="wp-block-heading"><strong>Mozilla Firefox</strong>&nbsp;</h3>



<ul class="wp-block-list">
<li><strong>Version:</strong>&nbsp;Firefox 145&nbsp;</li>



<li><strong>Release Date:</strong>&nbsp;November 11, 2025&nbsp;</li>



<li><strong>Key Fixes:</strong>&nbsp;Security fix for&nbsp;9&nbsp;high severity CVE’s, including&nbsp;CVE-2025-13021, CVE-2025-13022, CVE-2025-13012, CVE-2025-13023, CVE-2025-13016, CVE-2025-13024, CVE-2025-13025, CVE-2025-13026, CVE-2025-13027&nbsp;</li>
</ul>



<p><a href="https://www.mozilla.org/en-US/security/advisories/" target="_blank" rel="noreferrer noopener"><em>Firefox&nbsp;Release Notes</em></a></p>



<p><em>* Not handled by Fortress SRM.</em>&nbsp;</p>



<h2 class="wp-block-heading">Threat Intelligence Trends –&nbsp;November 2025</h2>



<p>The following resources are grouped by threat type / category.&nbsp;</p>



<h3 class="wp-block-heading">Emerging Threats</h3>



<p><strong>Exploiting Microsoft Teams: Impersonation and Spoofing Vulnerabilities Exposed</strong>&nbsp;<br>Check Point Research uncovered four vulnerabilities in Microsoft Teams that allowed attackers to impersonate executives, manipulate messages, spoof notifications, and forge identities in video and audio calls.&nbsp;<a href="https://research.checkpoint.com/2025/microsoft-teams-impersonation-and-spoofing-vulnerabilities-exposed/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a>&nbsp;</p>



<p><strong>APT Activity Report Q2 2025–Q3 2025</strong>&nbsp;<br>ESET’s APT Activity Report for Q2–Q3 2025 highlights increased operations by China-aligned groups using adversary-in-the-middle techniques, Iran-aligned actors ramping up internal&nbsp;spearphishing, and North Korea-aligned hackers expanding cryptocurrency attacks into new regions like Uzbekistan.&nbsp;<a href="https://www.welivesecurity.com/en/eset-research/eset-apt-activity-report-q2-2025-q3-2025/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a>&nbsp;</p>



<p><strong>Preparing for Threats to Come: Cybersecurity Forecast 2026</strong>&nbsp;<br>Google Cloud’s Cybersecurity Forecast 2026 predicts that threat actors will fully embrace AI-driven attacks, using techniques like prompt injection and AI-enabled social engineering, while defenders counter with AI agents and advanced identity management.&nbsp;<a href="https://cloud.google.com/blog/topics/threat-intelligence/cybersecurity-forecast-2026/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a>&nbsp;</p>



<h3 class="wp-block-heading">Ransomware &amp; Malware Deployment</h3>



<p><strong>Uncovering&nbsp;Qilin&nbsp;Attack Methods Exposed Through Multiple Cases</strong>&nbsp;<br>The&nbsp;Qilin&nbsp;ransomware group (formerly Agenda) has&nbsp;emerged&nbsp;as one of the most prolific ransomware threats, using a double-extortion model that combines file encryption with public data leaks.&nbsp;<a href="https://blog.talosintelligence.com/uncovering-qilin-attack-methods-exposed-through-multiple-cases/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a>&nbsp;</p>



<h3 class="wp-block-heading">Social Engineering Exploits</h3>



<p><strong>Jingle Thief: Inside a Cloud Based Gift Card Fraud Campaign</strong>&nbsp;<br>The Jingle Thief campaign is a cloud-based gift card fraud operation&nbsp;exploiting&nbsp;Microsoft 365 environments using phishing and smishing,&nbsp;run by financially motivated threat actors based in Morocco.&nbsp;&nbsp;<a href="https://unit42.paloaltonetworks.com/cloud-based-gift-card-fraud-campaign/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em>&nbsp;</em>&nbsp;</p>



<p><strong>The Smishing Deluge: China-Based Campaign Flooding Global Text Messages</strong>&nbsp;<br>The Smishing Deluge campaign, attributed to the Smishing Triad, is a large-scale, decentralized smishing operation using fraudulent SMS messages about toll violations and package&nbsp;misdelivery&nbsp;to steal sensitive data.&nbsp;<a href="https://unit42.paloaltonetworks.com/global-smishing-campaign/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a>&nbsp;</p>



<p><strong>Quantum Route Redirect: Anonymous Tool Streamlining Global Phishing Attack</strong>&nbsp;<br>The Quantum Route Redirect phishing kit is an advanced automation platform that streamlines global phishing campaigns targeting Microsoft 365 users, turning complex setups into simple one-click launches.&nbsp;<a href="https://blog.knowbe4.com/quantum-route-redirect-anonymous-tool-streamlining-global-phishing-attack" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a>&nbsp;</p>



<p><strong>Black Friday Scams – How to Detect the Red Flags and Protect your wallet and Data</strong>&nbsp;<br>Cybercriminals are exploiting Black Friday shopping trends with&nbsp;scams&nbsp;that use fake retail websites, phishing emails, and malicious ads to steal payment information and personal data.&nbsp;<a href="https://cybersecuritynews.com/black-friday-scams/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a>&nbsp;</p>



<h3 class="wp-block-heading">AI-Driven Threats</h3>



<p><strong>First Vulnerability in OpenAI Atlas Browser, Allowing Injection of Malicious Instructions into ChatGPT</strong>&nbsp;<br>LayerX discovered the first vulnerability in OpenAI’s ChatGPT Atlas browser, which allows attackers to inject malicious instructions into ChatGPT’s memory via a Cross-Site Request Forgery (CSRF) exploit.&nbsp;<a href="https://layerxsecurity.com/blog/layerx-identifies-vulnerability-in-new-chatgpt-atlas-browser/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em>&nbsp;</em>&nbsp;</p>



<p><strong>GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools</strong>&nbsp;<br>Google Threat Intelligence reports that threat actors have moved beyond using AI for productivity and are now deploying AI-enabled malware that dynamically generates malicious scripts and evades detection.&nbsp;<a href="https://cloud.google.com/blog/topics/threat-intelligence/threat-actor-usage-of-ai-tools" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a>&nbsp;</p>



<p><strong>HackedGPT: Novel AI Vulnerabilities Open the Door for Private Data Leakage</strong>&nbsp;<br>Tenable Research has discovered seven vulnerabilities and attack techniques in ChatGPT, including unique indirect prompt injections, exfiltration of personal user information, persistence, evasion, and bypass of safety mechanisms.&nbsp;<a href="https://www.tenable.com/blog/hackedgpt-novel-ai-vulnerabilities-open-the-door-for-private-data-leakage" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a>&nbsp;</p>



<h2 class="wp-block-heading">Recommended Actions</h2>



<h3 class="wp-block-heading">Mitigations</h3>



<ul class="wp-block-list">
<li>Apply all Microsoft November Patch Tuesday updates, prioritizing critical and zero-day CVEs (e.g., CVE-2025-62215).&nbsp;</li>



<li>Upgrade or enroll in Extended Security Updates (ESU) for Windows 10 devices to&nbsp;maintain&nbsp;compliance and reduce exposure.&nbsp;</li>



<li>Patch third-party applications promptly, especially Adobe, Cisco, and SAP products with critical vulnerabilities.&nbsp;</li>



<li>Harden email and collaboration platforms (Microsoft 365, Teams) against phishing and impersonation attacks by enabling safe links, anti-spoofing policies, and conditional access.&nbsp;</li>
</ul>



<h3 class="wp-block-heading">Monitoring</h3>



<ul class="wp-block-list">
<li>Monitor for&nbsp;signs of exploitation of zero-day vulnerabilities and critical CVEs in Microsoft and third-party products.&nbsp;</li>



<li>Track anomalous login activity, especially from new geolocations or impossible travel scenarios, to detect APT and social engineering campaigns.&nbsp;</li>



<li>Watch for large-scale smishing/phishing attempts and suspicious redirects (Quantum Route Redirect indicators).&nbsp;</li>



<li>Enable cloud app security monitoring for Microsoft 365 and Google Workspace to detect unauthorized gift card issuance or mailbox rule changes.&nbsp;</li>
</ul>



<h2 class="wp-block-heading"><strong>About Fortress SRM’s Vigilant Managed Cyber Hygiene Offering</strong>&nbsp;</h2>



<h3 class="wp-block-heading">Why Patching Matters</h3>



<p>Unpatched software is a leading cause of breaches—nearly 1 in 3 attacks exploit known vulnerabilities.&nbsp;</p>



<h3 class="wp-block-heading">Vigilant Managed Cyber Hygiene</h3>



<p> Fortress SRM’s Vigilant Managed Cyber Hygiene simplifies patch management.&nbsp;</p>



<ul class="wp-block-list">
<li>Automated updates with 97%+ success rate for Microsoft &amp; 100+ third-party applications&nbsp;</li>



<li>Critical patches, OS upgrades, and configuration updates for all devices, on/off network&nbsp;</li>



<li>24/7/365 U.S.-based monitoring and real-time reporting for full visibility&nbsp;</li>
</ul>



<h4 class="wp-block-heading">Stay Protected. Stay Proactive. </h4>



<p><a href="https://fortresssrm.com/managed-security/" target="_blank" rel="noreferrer noopener">Learn how Fortress SRM can enhance your cybersecurity strategy →</a>&nbsp;</p>
<p>The post <a href="https://fortresssrm.com/threat-and-security-update-november-2025/">Threat and Security Update – November, 2025</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Threat and Security Update – October, 2025</title>
		<link>https://fortresssrm.com/threat-and-security-update-october-2025/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Tue, 21 Oct 2025 14:53:30 +0000</pubDate>
				<category><![CDATA[Threat & Security Updates]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1782</guid>

					<description><![CDATA[<p>Stay Ahead of Threats with the Latest Vulnerability Updates for October Stay up to date on critical cyber risks, Microsoft’s October Patch Tuesday, and other notable third-party vulnerabilities. Timely patching ...</p>
<p>The post <a href="https://fortresssrm.com/threat-and-security-update-october-2025/">Threat and Security Update – October, 2025</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading"><br>Stay Ahead of Threats with the Latest Vulnerability Updates for October</h3>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Stay up to date on critical cyber risks, Microsoft’s October Patch Tuesday, and other notable third-party vulnerabilities. Timely patching is key to maintaining a strong security posture and protecting your business from threats.&nbsp;</p>



<h3 class="wp-block-heading">Quick Highlights</h3>



<ul class="wp-block-list">
<li><strong>Windows 10 End of Support</strong> <br>&#8211; Final patch released <strong>October 14</strong> <br>&#8211; No more updates unless enrolled in <strong>Extended Security Updates (ESU)</strong> or <strong>upgraded to Windows 11</strong> <br>&#8211; Now is the time to assess your upgrade path <br></li>



<li><strong>Microsoft Patch Tuesday:</strong> <br>&#8211; 175 vulnerabilities disclosed <br>&#8211; 17 rated <strong>Critical</strong>, 6 are <strong>Zero-Day</strong> (3 actively exploited) </li>
</ul>



<ul class="wp-block-list">
<li><strong>Adobe Security Updates:</strong>&nbsp;<br>&#8211; 36 vulnerabilities patched across 12 products&nbsp;<br>&#8211; 24 rated <strong>Critical</strong>, affecting Illustrator, FrameMaker, Creative Cloud, and more&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>High-Severity Advisories from Major Vendors:</strong>&nbsp;<br>&#8211; <strong>Cisco</strong>: 4 high-severity flaws, including SNMP RCE and Secure Boot bypass&nbsp;<br>&#8211; <strong>Fortinet</strong>: 2 high-severity flaws in FortiPAM and FortiOS&nbsp;<br>&#8211; <strong>SAP</strong>: 3 critical vulnerabilities in NetWeaver, Print Service, and SRM&nbsp;<br>&#8211; <strong>Ivanti</strong>: 5 high-severity flaws in EPMM and Neurons for MDM&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Top Threats to Watch:</strong>&nbsp;<br>&#8211; <strong>Crimson Collective</strong> targeting AWS with leaked keys and extortion tactics&nbsp;<br>&#8211; <strong>VMware CVE-2025-41244</strong> zero-day exploited for privilege escalation&nbsp;<br>&#8211; <strong>Quishing 2.0</strong>: QR code phishing attacks evolving in sophistication&nbsp;<br>&#8211; <strong>Ransomware Cartel</strong>: LockBit, DragonForce &amp; Qilin collaborating&nbsp;<br>&#8211; <strong>Oyster Malware</strong> via fake Microsoft Teams installers&nbsp;<br>&#8211; <strong>Weaponized DFIR Tools</strong>: Velociraptor abused in ransomware attacks&nbsp;<br>&#8211; <strong>AI-Driven Threats</strong>: ShadowLeak zero-click exploit in ChatGPT; AI-generated phishing and malware&nbsp;</li>
</ul>



<h2 class="wp-block-heading">Windows 10 Reaches End of Support</h2>



<p>As of <strong>October 14, 2025</strong>, Microsoft has officially ended support for Windows 10. This month’s Patch Tuesday was the <strong>final security update</strong> for the OS—unless your organization enrolls in the <strong>Extended Security Updates (ESU)</strong> program.&nbsp;</p>



<p><strong>What This Means for Your Organization:</strong> </p>



<ul class="wp-block-list">
<li>No more security patches or bug fixes for Windows 10 devices </li>



<li>Increased exposure to vulnerabilities and compliance risks </li>



<li>Continued support requires either:  <br>&#8211; Enrolling in Microsoft’s <strong>paid ESU program</strong>, or<br>&#8211; <strong>Upgrading to Windows 11</strong> </li>
</ul>



<p><strong>Need help planning your transition?</strong>&nbsp;<br>Fortress SRM can help assess your environment, prioritize upgrades, and ensure your endpoints remain patch-compliant and secure.&nbsp;</p>



<h2 class="wp-block-heading">Patch Tuesday Summary</h2>



<p><strong>Microsoft October 2025 Patch Tuesday</strong>&nbsp;<br>175 vulnerabilities disclosed, including 8 critical and 6 zero-days. By category:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>80</strong> Elevation of Privilege </li>



<li><strong>31</strong> Remote Code Execution</li>



<li><strong>28</strong> Information Disclosure</li>



<li><strong>11</strong> Security Feature Bypass </li>



<li><strong>11</strong> Denial of Service </li>



<li><strong>10 </strong>Spoofing </li>
</ul>



<h2 class="wp-block-heading">Critical Common Vulnerabilities and Exposures (CVEs)</h2>



<h3 class="wp-block-heading">Windows Zero-Days</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Details</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24990" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-24990</strong></a><strong></strong>&nbsp;</td><td><strong>Windows Agere Modem Driver Elevation of Privilege Vulnerability</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>Yes</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24052" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-24052</strong></a><strong></strong>&nbsp;</td><td><strong>Windows Agere Modem Driver Elevation of Privilege Vulnerability</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59230" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59230</strong></a><strong></strong>&nbsp;</td><td><strong>Windows Remote Access Connection Manager Elevation of Privilege Vulnerability</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>Yes</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-47827" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-47827</strong></a><strong></strong>&nbsp;</td><td><strong>Secure Boot bypass in IGEL OS before 11</strong>&nbsp;</td><td><strong>Medium</strong>&nbsp;</td><td><strong>Yes</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-0033" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-0033</strong></a><strong></strong>&nbsp;</td><td><strong>RMP corruption during SNP initialization in AMD Restricted Memory Page</strong>&nbsp;</td><td><strong>Medium</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-2884" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-2884</strong></a><strong></strong>&nbsp;</td><td><strong>Out-of-bounds read bug in TCG TPM2.0 reference implementation.</strong>&nbsp;</td><td><strong>Medium</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<h3 class="wp-block-heading">Other Critical CVE&#8217;s Worth Mentioning</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Details</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59287</strong></a><strong></strong>&nbsp;</td><td><strong>Windows Server Update Service (WSUS) Remote Code Execution Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59246" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59246</strong></a><strong></strong>&nbsp;<a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59218" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59218</strong></a><strong></strong>&nbsp;</td><td><strong>Azure Entra ID Elevation of Privilege Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59234" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59234</strong></a><strong></strong>&nbsp;</td><td><strong>Microsoft Office Remote Code Execution Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-49708" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-49708</strong></a><strong></strong>&nbsp;</td><td><strong>Microsoft Graphics Component Elevation of Privilege Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59291" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59291</strong></a><strong></strong>&nbsp;</td><td><strong>Elevation of Privilege Flaw in Confidential Azure Container Instances</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59292" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59292</strong></a><strong></strong>&nbsp;</td><td><strong>Elevation of Privilege Flaw in Azure Compute Gallery</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59227" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59227</strong></a><strong></strong>&nbsp;</td><td><strong>Remote Code Execution Vulnerability in Microsoft Office</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59247" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59247</strong></a><strong></strong>&nbsp;</td><td><strong>Elevation of Privilege Flaw in Azure PlayFab</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59252" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59252</strong></a><strong></strong>&nbsp;<a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59272" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59272</strong></a><strong></strong>&nbsp;<a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59286" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59286</strong></a><strong></strong>&nbsp;</td><td><strong>M365 Copilot Spoofing Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59271" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59271</strong></a><strong></strong>&nbsp;</td><td><strong>Elevation of Privilege Flaw in Redis Enterprise</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-55321" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-55321</strong></a><strong></strong>&nbsp;</td><td><strong>Spoofing Vulnerability in Azure Monitor Log Analytics</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59236" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59236</strong></a><strong></strong>&nbsp;</td><td><strong>Remote Code Execution Vulnerability in Microsoft Excel</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2016-9535" target="_blank" rel="noreferrer noopener"><strong>CVE-2016-9535</strong></a><strong></strong>&nbsp;</td><td><strong>Heap Bugger Overflow in LibTIFF</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<h3 class="wp-block-heading">3rd Party Critical CVE&#8217;s Worth Mentioning</h3>



<h4 class="wp-block-heading">Adobe Products *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Affected Product</strong>&nbsp;</td><td><strong>Critical Issues</strong>&nbsp;</td><td><strong>Key Risks</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-49552</strong>&nbsp;<strong>CVE-2025-49553</strong>&nbsp;<strong>CVE-2025-54196</strong>&nbsp;</td><td><strong>Connect </strong><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287</a><strong></strong>&nbsp;</td><td><strong>2 Critical</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;<strong>Security feature bypass</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-54263</strong>&nbsp;<strong>CVE-2025-54264</strong>&nbsp;<strong>CVE-2025-54265</strong>&nbsp;<strong>CVE-2025-54266</strong>&nbsp;<strong>CVE-2025-54267</strong>&nbsp;</td><td><strong>Commerce&nbsp;</strong>&nbsp;</td><td><strong>2 Critical</strong>&nbsp;</td><td><strong>Security feature bypass</strong>&nbsp;<strong>Privilege escalation</strong>&nbsp;<strong>Arbitrary code execution</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-54271</strong>&nbsp;</td><td><strong>Creative Cloud</strong>&nbsp;</td><td><strong>0 Critical</strong>&nbsp;</td><td><strong>Arbitrary file system write</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-54268</strong>&nbsp;<strong>CVE-2025-54278</strong>&nbsp;</td><td><strong>Bridge&nbsp;</strong>&nbsp;</td><td><strong>1 Critical</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;<strong>Memory exposure</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-54279</strong>&nbsp;<strong>CVE-2025-61804</strong>&nbsp;<strong>CVE-2025-54269</strong>&nbsp;<strong>CVE-2025-54270</strong>&nbsp;</td><td><strong>Animate&nbsp;</strong>&nbsp;</td><td><strong>2 Critical</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;<strong>Memory exposure</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-54272</strong>&nbsp;<strong>CVE-2025-61796</strong>&nbsp;<strong>CVE-2025-61797</strong>&nbsp;</td><td><strong>Experience Manager Screens</strong>&nbsp;</td><td><strong>0 Critical</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-54273</strong>&nbsp;<strong>CVE-2025-54274</strong>&nbsp;<strong>CVE-2025-54280</strong>&nbsp;<strong>CVE-2025-54275</strong>&nbsp;</td><td><strong>Substance 3D Viewer</strong>&nbsp;</td><td><strong>3 Critical</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;<strong>Application DoS</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-54276</strong>&nbsp;</td><td><strong>Substance 3D Modeler</strong>&nbsp;</td><td><strong>1 Critical</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-54281</strong>&nbsp;<strong>CVE-2025-54282</strong>&nbsp;</td><td><strong>FrameMaker</strong>&nbsp;</td><td><strong>2 Critical</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-54283</strong>&nbsp;<strong>CVE-2025-54284</strong>&nbsp;</td><td><strong>Illustrator</strong>&nbsp;</td><td><strong>2 Critical</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-61798</strong>&nbsp;<strong>CVE-2025-61799</strong>&nbsp;<strong>CVE-2025-61800</strong>&nbsp;<strong>CVE-2025-61801</strong>&nbsp;</td><td><strong>Dimension&nbsp;</strong>&nbsp;</td><td><strong>4 Critical</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-61802</strong>&nbsp;<strong>CVE-2025-61803</strong>&nbsp;<strong>CVE-2025-61805</strong>&nbsp;<strong>CVE-2025-61806</strong>&nbsp;<strong>CVE-2025-61807</strong>&nbsp;</td><td><strong>Substance 3D Stager</strong>&nbsp;</td><td><strong>5 Critical</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://helpx.adobe.com/security/security-bulletin.html" target="_blank" rel="noreferrer noopener"><em>Adobe Security Bulletins →</em></a><em></em>&nbsp;</p>



<h3 class="wp-block-heading">Cisco *</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Affected Product</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-phone-dos-FPyjLV7A" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-20350 CVE-2025-20351</strong></a><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287</a><strong></strong>&nbsp;</td><td><strong>Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875</strong>&nbsp;</td><td><strong>SIP software DoS vulnerabilities</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secboot-UqFD8AvC" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-20313 CVE-2025- 20314</strong></a><strong></strong>&nbsp;</td><td><strong>Cisco IOS XE&nbsp;</strong>&nbsp;</td><td><strong>Secure Boot Bypass</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-20352</strong></a><strong></strong>&nbsp;</td><td><strong>Cisco IOS / IOS XE&nbsp;</strong>&nbsp;</td><td><strong>SNMP RCE &amp; DoS</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>Yes</strong>&nbsp;</td></tr><tr><td><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-tacacs-hdB7thJw" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-20160</strong></a><strong></strong>&nbsp;</td><td><strong>Cisco IOS and IOS XE</strong>&nbsp;</td><td><strong>TACACS+ Authentication Bypass</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://sec.cloudapps.cisco.com/security/center/publicationListing.x" target="_blank" rel="noreferrer noopener"><em>Cisco Security Advisories →</em></a><em></em>&nbsp;</p>



<h3 class="wp-block-heading">Fortinet *</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Affected Product</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://www.fortiguard.com/psirt/FG-IR-25-010" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-49201</strong></a><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287</a><strong></strong>&nbsp;</td><td><strong>FortiPAM and FortiSwitch Manager&nbsp;</strong>&nbsp;</td><td><strong>Weak authentication allows brute-force bypass</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.fortiguard.com/psirt/FG-IR-24-361" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-58325</strong></a><strong></strong>&nbsp;</td><td><strong>FortiOS&nbsp;</strong>&nbsp;</td><td><strong>Local authenticated attacker can execute system commands</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://www.fortiguard.com/psirt" target="_blank" rel="noreferrer noopener"><em>Fortinet PSIRT Advisories →</em></a><em></em>&nbsp;</p>



<h3 class="wp-block-heading">Ivanti *</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Affected Product</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-10242 </strong> <strong>CVE-2025-10243</strong> <strong>CVE-2025-10985</strong> <strong>CVE-2025-10986</strong><br><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287</a> </td><td><strong>Ivanti EPMM&nbsp;</strong>&nbsp;</td><td><strong>OS Command Injection and Path traversals via remote authenticated attacker</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><strong>CWE-862</strong>&nbsp;<strong>CWE-308</strong>&nbsp;<strong>CWE-306</strong>&nbsp;</td><td><strong>Ivanti Neurons for MDM</strong>&nbsp;</td><td><strong>Missing authentication and MFA bypass&nbsp;</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://www.ivanti.com/blog/october-2025-security-update" target="_blank" rel="noreferrer noopener"><em>Ivanti October 2025 Security Update →</em></a><em></em>&nbsp;</p>



<h3 class="wp-block-heading">SAP *</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Affected Component</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42944" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42944</strong></a><br><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287</a> </td><td>SAP NetWeaver AS Java&nbsp;</td><td>Insecure Deserialization&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42937" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42937</strong></a><strong></strong>&nbsp;</td><td>SAP Print Service&nbsp;</td><td>Directory Traversal Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42910" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42910</strong></a><strong></strong>&nbsp;</td><td>SAP Supplier Relationship Management&nbsp;</td><td>Unrestricted File Upload Flaw&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://support.sap.com/en/my-support/knowledge-base/security-notes-news/october-2025.html" target="_blank" rel="noreferrer noopener"><em>SAP October 2025 Security Notes </em><em>→</em></a><em></em>&nbsp;</p>



<h3 class="wp-block-heading">Google Chrome</h3>



<ul class="wp-block-list">
<li><strong>Version:</strong> 141.0.7390.107/.108 (Windows and Mac), 141.0.7390.107 (Linux) </li>



<li><strong>Release Date:</strong> October 14, 2025 </li>



<li><strong>Key Fixes:</strong> Security fix for CVE-2025-11756 </li>
</ul>



<p><a href="https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_14.html" target="_blank" rel="noreferrer noopener"><em>Chrome Release Notes →</em></a><em></em>&nbsp;</p>



<p><em>* Not handled by Fortress SRM.</em>&nbsp;</p>



<h2 class="wp-block-heading">Threat Intelligence Trends – October 2025</h2>



<p>The following resources are grouped by threat type / category. </p>



<h3 class="wp-block-heading">Emerging Threats</h3>



<p><strong>Crimson Collective Targeting Cloud Environments</strong>&nbsp;</p>



<p>A newly identified threat group, Crimson Collective, has been observed compromising AWS environments using leaked long-term access keys. They escalate privileges via IAM policies, exfiltrate sensitive data, and follow up with extortion attempts. <a href="https://www.rapid7.com/blog/post/tr-crimson-collective-a-new-threat-group-observed-operating-in-the-cloud/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<p><strong>Zero-Day Alert: VMware CVE-2025-41244 Privilege Escalation</strong>&nbsp;</p>



<p>NVISO Labs identified active exploitation of CVE-2025-41244, a local privilege escalation flaw in VMware’s guest service discovery. The vulnerability allows attackers to elevate privileges and potentially pivot within virtualized environments. <a href="https://blog.nviso.eu/tag/proof-of-concept/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a> </p>



<p><strong>Quishing 2.0: QR Code Phishing Evolves</strong>&nbsp;</p>



<p>Cybercriminals are refining quishing attacks using fake QR codes embedded in emails, flyers, and public spaces. These codes redirect users to phishing sites or initiate malware downloads. <a href="https://gbhackers.com/quishing-via-qr-codes-emerging-as-a-top-attack-vector/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a> </p>



<h3 class="wp-block-heading">Ransomware &amp; Malware Deployment</h3>



<p><strong>LockBit, DragonForce &amp; Qilin Form Ransomware Cartel</strong> </p>



<p>Three major ransomware groups have formed a criminal cartel to coordinate attacks and share infrastructure. <a href="https://www.csoonline.com/article/4070290/lockbit-dragonforce-and-qilin-form-a-cartel-to-dictate-ransomware-market-conditions.html" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<p><strong>Malvertising Campaign: Oyster Malware via Fake Teams Installers</strong> </p>



<p>Threat actors are using SEO poisoning and malicious ads to distribute trojanized Microsoft Teams installers. These fake installers deploy Oyster (aka Broomstick), a modular backdoor that enables persistent remote access and stealthy data exfiltration. <a href="https://blackpointcyber.com/blog/malicious-teams-installers-drop-oyster-malware/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a> </p>



<p><strong>Velociraptor DFIR Tool Weaponized</strong> </p>



<p>Threat actors are abusing the legitimate Velociraptor forensic tool to deploy ransomware like LockBit and Babuk. This marks a troubling trend of security tools being repurposed for attacks. <a href="https://www.bleepingcomputer.com/news/security/hackers-now-use-velociraptor-dfir-tool-in-ransomware-attacks/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a></p>



<p><em>Group: Storm-2603 (China-based)</em>&nbsp;</p>



<p><strong>Cephalus Ransomware via DLL Sideloading</strong>&nbsp;</p>



<p>A new ransomware variant, Cephalus, uses DLL sideloading through SentinelOne binaries and RDP access without MFA. <a href="https://www.huntress.com/blog/sonicwall-sslvpn-compromise" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a> </p>



<h3 class="wp-block-heading">Cloud &amp; Infrastructure Exploits</h3>



<p><strong>SonicWall SSLVPN Exploitation</strong> </p>



<p>Akira ransomware actors are exploiting SonicWall VPNs using BYOVD techniques and clearing logs to evade detection. <a href="https://www.huntress.com/blog/sonicwall-sslvpn-compromise" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a> </p>



<p><strong>Discord Data Breach via Third-Party Vendor</strong> </p>



<p>A breach at Discord’s support vendor exposed 70,000 government ID photos and personal data. <a href="https://thecyberexpress.com/discord-data-breach/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a> </p>



<p><strong>Clop Claims Oracle E-Business Suite Data Theft</strong>&nbsp;</p>



<p>The Clop ransomware group has reportedly sent extortion emails claiming to have stolen data from Oracle E-Business Suite environments. While the full scope of the breach is unclear, the tactic aligns with Clop’s recent shift toward data-centric extortion rather than encryption. <a href="https://www.bleepingcomputer.com/news/security/clop-extortion-emails-claim-theft-of-oracle-e-business-suite-data/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a> </p>



<h3 class="wp-block-heading">AI-Driven Threats</h3>



<p><strong>AI-Powered Malware &amp; Phishing</strong> </p>



<p>Russia-linked groups are using AI to generate phishing lures and malware like WRECKSTEEL and GIFTEDCROOK. <a href="https://www.thehackernews.com/2025/10/from-phishing-to-malware-ai-becomes.html" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a> </p>



<p><strong>Zero-Click AI Exploit: ShadowLeak Vulnerability in ChatGPT</strong>&nbsp;</p>



<p>Radware disclosed ShadowLeak, a zero-click prompt injection vulnerability in ChatGPT’s enterprise integrations. Malicious emails can silently trigger data exfiltration from OpenAI’s servers without user interaction, bypassing traditional security controls. <a href="https://www.radware.com/security/threat-advisories-and-attack-reports/shadowleak/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a> </p>



<h2 class="wp-block-heading">Recommended Actions</h2>



<h3 class="wp-block-heading">Mitigations</h3>



<ul class="wp-block-list">
<li><strong>Prioritize patching</strong> all actively exploited zero-days from Microsoft and VMware.&nbsp;</li>



<li><strong>Disable unused services</strong> on Cisco IOS XE and Fortinet appliances to reduce attack surface.&nbsp;</li>



<li><strong>Enforce MFA</strong> across all cloud and identity platforms.&nbsp;</li>



<li><strong>Restrict QR code scanning</strong> on unmanaged devices to mitigate quishing attacks.&nbsp;</li>



<li><strong>Update endpoint protection</strong> to detect AI-generated malware variants.&nbsp;</li>
</ul>



<h3 class="wp-block-heading">Monitoring</h3>



<ul class="wp-block-list">
<li>Watch for <strong>suspicious authentication attempts</strong> in Azure, Fortinet, and Ivanti logs.&nbsp;</li>



<li>Monitor for <strong>unexpected outbound traffic</strong> from Teams or Office installations (possible Oyster malware).&nbsp;</li>



<li>Track <strong>file uploads and downloads</strong> in SAP SRM and Print Service environments.&nbsp;</li>



<li>Set alerts for <strong>SNMP activity spikes</strong> on Cisco devices (possible CVE-2025-20352 exploitation).&nbsp;</li>
</ul>



<h3 class="wp-block-heading">Detection Tips</h3>



<ul class="wp-block-list">
<li>Use YARA or Sigma rules to detect:  <br>&#8211; <strong>Velociraptor misuse</strong> in ransomware campaigns <br>&#8211; <strong>ShadowLeak zero-click exploit</strong> indicators in AI platforms </li>



<li>Deploy honeypots or deception tools to <strong>detect brute-force attempts</strong> on FortiPAM and Secure Boot bypass attempts on Cisco IOS XE.&nbsp;&nbsp;</li>



<li>Leverage threat intel feeds to identify <strong>Crimson Collective</strong> and <strong>LockBit cartel</strong> infrastructure. </li>
</ul>



<h2 class="wp-block-heading"><strong>About Fortress SRM’s Vigilant Managed Cyber Hygiene Offering</strong>&nbsp;</h2>



<h3 class="wp-block-heading">Why Patching Matters</h3>



<p>Unpatched software is a leading cause of breaches—nearly 1 in 3 attacks exploit known vulnerabilities.&nbsp;</p>



<h3 class="wp-block-heading">Vigilant Managed Cyber Hygiene</h3>



<p> Fortress SRM’s Vigilant Managed Cyber Hygiene simplifies patch management.&nbsp;</p>



<ul class="wp-block-list">
<li>Automated updates with 97%+ success rate for Microsoft &amp; 100+ third-party applications&nbsp;</li>



<li>Critical patches, OS upgrades, and configuration updates for all devices, on/off network&nbsp;</li>



<li>24/7/365 U.S.-based monitoring and real-time reporting for full visibility&nbsp;</li>
</ul>



<h4 class="wp-block-heading">Stay Protected. Stay Proactive. </h4>



<p><a href="https://fortresssrm.com/managed-security/" target="_blank" rel="noreferrer noopener">Learn how Fortress SRM can enhance your cybersecurity strategy →</a> </p>
<p>The post <a href="https://fortresssrm.com/threat-and-security-update-october-2025/">Threat and Security Update – October, 2025</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Microsoft MFA &#038; SSPR Retirement: Make Your Migration a Security Win</title>
		<link>https://fortresssrm.com/microsoft-mfa-sspr-retirement-make-your-migration-a-security-win/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Thu, 18 Sep 2025 20:01:36 +0000</pubDate>
				<category><![CDATA[Managed Security]]></category>
		<category><![CDATA[Security Consulting]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1776</guid>

					<description><![CDATA[<p>By September 30, 2025, Microsoft will retire the legacy Multi-Factor Authentication (MFA) and Self-Service Password Reset (SSPR) policies. If your organization is still using the legacy policies, you’ll need to ...</p>
<p>The post <a href="https://fortresssrm.com/microsoft-mfa-sspr-retirement-make-your-migration-a-security-win/">Microsoft MFA &amp; SSPR Retirement: Make Your Migration a Security Win</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>By September 30, 2025, Microsoft will retire the legacy Multi-Factor Authentication (MFA) and Self-Service Password Reset (SSPR) policies. If your organization is still using the legacy policies, you’ll need to switch over to the unified Microsoft Entra Authentication Methods policy.</p>



<p>But this isn’t just about avoiding service disruptions or checking a compliance box. It’s a chance to make authentication stronger, simplify management, and future-proof your identity security.</p>



<p>With some planning and the right tools, the migration can be smooth. At the same time, it’s a great opportunity to make your organization more secure and resilient.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">The Highlights</h3>



<p><strong>Microsoft MFA &amp; SSPR Retirement – Sept. 30, 2025</strong></p>



<ul class="wp-block-list">
<li>Legacy MFA and SSPR policies end on September 30, 2025.</li>



<li>All organizations need to migrate to Microsoft Entra Authentication Methods.</li>



<li>Risks if you don’t migrate: login failures, service disruptions, compliance gaps.</li>



<li><strong>Old methods going away: </strong>security questions, SMS, voice calls.</li>



<li><strong>Modern methods available:</strong> passkeys (FIDO2), Microsoft Authenticator, certificate-based authentication.</li>
</ul>



<p><strong>Bottom line:</strong>&nbsp;Act now. Waiting likely means broken logins and weaker security.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">What&#8217;s Changing</h2>



<p>Historically, MFA and SSPR were managed separately in older portals. After September 30, 2025, those portals retire, and everything moves under Entra ID (formerly Azure AD). That means one centralized place to manage authentication and keep things consistent.</p>



<p><strong>Specifically, key changes include: </strong></p>



<ul class="wp-block-list">
<li>Legacy MFA policies will no longer be supported&nbsp;</li>



<li>SSPR policies will be retired&nbsp;</li>



<li>Security questions will be disabled entirely
<ul class="wp-block-list">
<li>To reiterate: Security questions will no longer be an option at all for resetting passwords</li>
</ul>
</li>



<li>Out-of-band MFA methods like SMS and voice calls will be discouraged under modern security standards such as NIST&nbsp;</li>
</ul>



<p>Entra Authentication Methods consolidates all authentication management into a single framework, making it easier to enforce secure, modern practices.&nbsp;&nbsp;</p>



<h3 class="wp-block-heading">Why This Matters</h3>



<p>As a result, delaying migration could cause you to run into:&nbsp;</p>



<ul class="wp-block-list">
<li>Misaligned authentication settings&nbsp;</li>



<li>User frustration from failed logins or password resets&nbsp;</li>



<li>Service disruptions&nbsp;</li>



<li>Security gaps from outdated methods&nbsp;</li>



<li>Compliance risks with NIST and other industry standards&nbsp;</li>
</ul>



<p>Beyond just meeting the deadline, this is a chance to take a closer look at your overall authentication and access policies.</p>



<h2 class="wp-block-heading">A Strategic Moment to Reassess Identity Security</h2>



<p>The MFA and SSPR retirement is mandatory, but it’s also a good time to step back and ask:</p>



<ul class="wp-block-list">
<li>Are we enforcing strong, phishing-resistant MFA methods?&nbsp;</li>



<li>Is our user experience consistent across apps and services?&nbsp;</li>



<li>Do we still have legacy authentication enabled?&nbsp;</li>



<li>Are our policies aligned with Zero Trust principles?&nbsp;</li>
</ul>



<p>This is your chance to move from “just compliant” to confident, resilient, and future-ready.&nbsp;</p>



<h3 class="wp-block-heading">Recommended Modern Authentication Methods</h3>



<p>When you migrate, consider moving away from outdated methods and using:</p>



<ul class="wp-block-list">
<li>Passkeys (FIDO2)&nbsp;</li>



<li>Microsoft Authenticator&nbsp;</li>



<li>Certificate-Based Authentication&nbsp;</li>



<li>Email OTP (for SSPR only, and only for guest users if no other secure method is available)&nbsp;</li>
</ul>



<p>Avoid SMS, voice-based MFA, and security questions—they’re no longer recommended by NIST. And remember, security questions won’t be available at all for password resets.</p>



<h3 class="wp-block-heading">Steps to Prepare for Migration</h3>



<p>Here’s a practical roadmap to make sure things go smoothly:</p>



<ul class="wp-block-list">
<li>Assess current MFA and SSPR configurations in the legacy portals&nbsp;</li>



<li>Use Microsoft’s migration tool to import policies into Entra Authentication Methods&nbsp;</li>



<li>Test and validate new policies in a controlled group&nbsp;</li>



<li>Communicate changes and provide guidance to users&nbsp;</li>



<li>Retire old policies once the new setup is stable&nbsp;</li>
</ul>



<p><strong>Pro Tip: </strong>Enable passwordless authentication, enforce conditional access policies, and disable legacy protocols that could expose vulnerabilities.</p>



<p>For official guidance: <a href="https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-authentication-methods-manage" target="_blank" rel="noreferrer noopener">How to migrate to the Authentication methods policy &#8211; Microsoft Entra ID | Microsoft Learn</a></p>



<h2 class="wp-block-heading">Modernize Your Authentication with Confidence</h2>



<p>If this feels overwhelming, don’t worry. You don’t have to tackle it alone.</p>



<p>Our team specializes in helping organizations like yours:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Audit and map legacy authentication policies</strong>&nbsp;to understand your current setup</li>



<li><strong>Design secure, scalable Entra policies</strong>&nbsp;tailored to your needs</li>



<li><strong>Enable strong MFA and passwordless experiences</strong>&nbsp;for users</li>



<li><strong>Integrate policy changes</strong> with your broader identity and access strategies&nbsp;</li>



<li><strong>Ensure a smooth, disruption-free transition&nbsp;</strong></li>
</ul>



<p>Acting early reduces risk, avoids last-minute headaches, and makes sure your authentication practices are modern, secure, and compliant.</p>



<h3 class="wp-block-heading">Don&#8217;t Just Meet the Deadline—Strengthen Your Security.</h3>



<p>The September 30, 2025 retirement of legacy MFA and SSPR is coming up fast. This is more than a compliance task. It’s a chance to build a stronger identity security foundation.</p>



<p>Whether you’re just starting or already in motion, we’ll guide you through a seamless transition and uncover ways to improve your security along the way. Let’s turn this deadline into a security win for your organization.</p>



<h4 class="wp-block-heading">Start the Conversation Today</h4>



<p><strong>Fill out the form below or connect with Kelsey on <a href="https://www.linkedin.com/in/kelseyclarkstrategic/" target="_blank" rel="noreferrer noopener">LinkedIn</a> to get started. </strong></p>



                <div class='gf_browser_unknown gform_wrapper gform_legacy_markup_wrapper gform-theme--no-framework' data-form-theme='legacy' data-form-index='0' id='gform_wrapper_1' >
                        <div class='gform_heading'>
                            <h3 class="gform_title">Contact Us</h3>
                            <p class='gform_description'></p>
                        </div><form method='post' enctype='multipart/form-data'  id='gform_1'  action='/feed/' data-formid='1' novalidate>
                        <div class='gform-body gform_body'><ul id='gform_fields_1' class='gform_fields top_label form_sublabel_below description_below validation_below'><li id="field_1_8" class="gfield gfield--type-honeypot gform_validation_container field_sublabel_below gfield--has-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_8'>Name</label><div class='ginput_container'><input name='input_8' id='input_1_8' type='text' value='' autocomplete='new-password'/></div><div class='gfield_description' id='gfield_description_1_8'>This field is for validation purposes and should be left unchanged.</div></li><li id="field_1_1" class="gfield gfield--type-name gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label gfield_label_before_complex' >Name<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_complex ginput_container ginput_container--name no_prefix has_first_name no_middle_name has_last_name no_suffix gf_name_has_2 ginput_container_name gform-grid-row' id='input_1_1'>
                            
                            <span id='input_1_1_3_container' class='name_first gform-grid-col gform-grid-col--size-auto' >
                                                    <input type='text' name='input_1.3' id='input_1_1_3' value=''   aria-required='true'   placeholder='First Name'  />
                                                    <label for='input_1_1_3' class='gform-field-label gform-field-label--type-sub '>First</label>
                                                </span>
                            
                            <span id='input_1_1_6_container' class='name_last gform-grid-col gform-grid-col--size-auto' >
                                                    <input type='text' name='input_1.6' id='input_1_1_6' value=''   aria-required='true'   placeholder='Last Name'  />
                                                    <label for='input_1_1_6' class='gform-field-label gform-field-label--type-sub '>Last</label>
                                                </span>
                            
                        </div></li><li id="field_1_5" class="gfield gfield--type-text gf_left_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_5'>Company<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_text'><input name='input_5' id='input_1_5' type='text' value='' class='medium'    placeholder='Company' aria-required="true" aria-invalid="false"   /></div></li><li id="field_1_6" class="gfield gfield--type-text gf_right_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_6'>Title<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_text'><input name='input_6' id='input_1_6' type='text' value='' class='medium'    placeholder='Title' aria-required="true" aria-invalid="false"   /></div></li><li id="field_1_3" class="gfield gfield--type-phone gf_left_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_3'>Phone<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_phone'><input name='input_3' id='input_1_3' type='tel' value='' class='medium'  placeholder='Phone' aria-required="true" aria-invalid="false"   /></div></li><li id="field_1_2" class="gfield gfield--type-email gf_right_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_2'>Email<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_email'>
                            <input name='input_2' id='input_1_2' type='email' value='' class='medium'   placeholder='Email Address' aria-required="true" aria-invalid="false"  />
                        </div></li><li id="field_1_7" class="gfield gfield--type-textarea gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_7'>Where did you hear about Fortress SRM?</label><div class='ginput_container ginput_container_textarea'><textarea name='input_7' id='input_1_7' class='textarea small'      aria-invalid="false"   rows='10' cols='50'></textarea></div></li><li id="field_1_4" class="gfield gfield--type-textarea gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_4'>Message<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_textarea'><textarea name='input_4' id='input_1_4' class='textarea medium'    placeholder='Message' aria-required="true" aria-invalid="false"   rows='10' cols='50'></textarea></div></li></ul></div>
        <div class='gform-footer gform_footer top_label'> <input type='submit' id='gform_submit_button_1' class='gform_button button' onclick='gform.submission.handleButtonClick(this);' data-submission-type='submit' value='Submit'  /> 
            <input type='hidden' class='gform_hidden' name='gform_submission_method' data-js='gform_submission_method_1' value='postback' />
            <input type='hidden' class='gform_hidden' name='gform_theme' data-js='gform_theme_1' id='gform_theme_1' value='legacy' />
            <input type='hidden' class='gform_hidden' name='gform_style_settings' data-js='gform_style_settings_1' id='gform_style_settings_1' value='{&quot;inputPrimaryColor&quot;:&quot;#204ce5&quot;}' />
            <input type='hidden' class='gform_hidden' name='is_submit_1' value='1' />
            <input type='hidden' class='gform_hidden' name='gform_submit' value='1' />
            
            <input type='hidden' class='gform_hidden' name='gform_currency' data-currency='USD' value='nkBMuVUAegxYNMZIe4jdYlZAw7RXKCfkYYjFU5EPpHCY0Wflh8n4rO8WxkBm1dFbmQnRB830tp3HFjxlRxhPwDHsM4T7rFWGK3sZeXPDo13xWK0=' />
            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' />
            <input type='hidden' class='gform_hidden' name='state_1' value='WyJbXSIsImU2ZDAzMWFjZGE5YzM2MzllMDNkNzAzN2VjOTBiYzczIl0=' />
            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_target_page_number_1' id='gform_target_page_number_1' value='0' />
            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_source_page_number_1' id='gform_source_page_number_1' value='1' />
            <input type='hidden' name='gform_field_values' value='' />
            
        </div>
                        <p style="display: none !important;" class="akismet-fields-container" data-prefix="ak_"><label>&#916;<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_2" name="ak_js" value="102"/><script>document.getElementById( "ak_js_2" ).setAttribute( "value", ( new Date() ).getTime() );</script></p></form>
                        </div><script type="text/javascript">
/* <![CDATA[ */
 gform.initializeOnLoaded( function() {gformInitSpinner( 1, 'https://fortresssrm.com/wp-content/plugins/gravityforms/images/spinner.svg', true );jQuery('#gform_ajax_frame_1').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_1');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_1').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_1').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_1').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_1').removeClass('gform_validation_error');}setTimeout( function() { /* delay the scroll by 50 milliseconds to fix a bug in chrome */  }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_1').val();gformInitSpinner( 1, 'https://fortresssrm.com/wp-content/plugins/gravityforms/images/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [1, current_page]);window['gf_submitting_1'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}jQuery('#gform_wrapper_1').replaceWith(confirmation_content);jQuery(document).trigger('gform_confirmation_loaded', [1]);window['gf_submitting_1'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_1').text());}else{jQuery('#gform_1').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger("gform_pre_post_render", [{ formId: "1", currentPage: "current_page", abort: function() { this.preventDefault(); } }]);        if (event && event.defaultPrevented) {                return;        }        const gformWrapperDiv = document.getElementById( "gform_wrapper_1" );        if ( gformWrapperDiv ) {            const visibilitySpan = document.createElement( "span" );            visibilitySpan.id = "gform_visibility_test_1";            gformWrapperDiv.insertAdjacentElement( "afterend", visibilitySpan );        }        const visibilityTestDiv = document.getElementById( "gform_visibility_test_1" );        let postRenderFired = false;        function triggerPostRender() {            if ( postRenderFired ) {                return;            }            postRenderFired = true;            gform.core.triggerPostRenderEvents( 1, current_page );            if ( visibilityTestDiv ) {                visibilityTestDiv.parentNode.removeChild( visibilityTestDiv );            }        }        function debounce( func, wait, immediate ) {            var timeout;            return function() {                var context = this, args = arguments;                var later = function() {                    timeout = null;                    if ( !immediate ) func.apply( context, args );                };                var callNow = immediate && !timeout;                clearTimeout( timeout );                timeout = setTimeout( later, wait );                if ( callNow ) func.apply( context, args );            };        }        const debouncedTriggerPostRender = debounce( function() {            triggerPostRender();        }, 200 );        if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) {            const observer = new MutationObserver( ( mutations ) => {                mutations.forEach( ( mutation ) => {                    if ( mutation.type === 'attributes' && visibilityTestDiv.offsetParent !== null ) {                        debouncedTriggerPostRender();                        observer.disconnect();                    }                });            });            observer.observe( document.body, {                attributes: true,                childList: false,                subtree: true,                attributeFilter: [ 'style', 'class' ],            });        } else {            triggerPostRender();        }    } );} ); 
/* ]]&gt; */
</script>
<p>The post <a href="https://fortresssrm.com/microsoft-mfa-sspr-retirement-make-your-migration-a-security-win/">Microsoft MFA &amp; SSPR Retirement: Make Your Migration a Security Win</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DMARC: Strengthening Trust in Your Email Domain</title>
		<link>https://fortresssrm.com/dmarc-strengthening-trust-in-your-email-domain/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Thu, 28 Aug 2025 16:32:52 +0000</pubDate>
				<category><![CDATA[Managed Security]]></category>
		<category><![CDATA[Security Consulting]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1750</guid>

					<description><![CDATA[<p>Written by: Kelsey Clark, Fortress SRM Security Innovation &#38; Brand Strategy Leader The Hidden Risk Inside Your Inbox Email is the communication backbone of modern work, but it’s also a ...</p>
<p>The post <a href="https://fortresssrm.com/dmarc-strengthening-trust-in-your-email-domain/">DMARC: Strengthening Trust in Your Email Domain</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wp-block-post-date"><time datetime="2025-08-28T12:32:52-04:00">August 28, 2025</time></div>


<p><strong>Written by:</strong> <strong><a href="https://www.linkedin.com/in/kelseyclarkstrategic/" target="_blank" rel="noreferrer noopener">Kelsey Clark</a></strong>, Fortress SRM Security Innovation &amp; Brand Strategy Leader</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">The Hidden Risk Inside Your Inbox</h2>



<p>Email is the communication backbone of modern work, but it’s also a top target for attackers. </p>



<p>Phishing, spoofing, and impersonation attacks exploit the fact that email was not designed with strong identity verification. As these attacks grow in sophistication, security teams face increasing pressure to protect both their organization and their people.</p>



<p>This is where&nbsp;<strong>DMARC (Domain-based Message Authentication, Reporting, and Conformance)</strong>&nbsp;can help.</p>



<h2 class="wp-block-heading">What DMARC Does</h2>



<p>DMARC helps receiving mail servers determine whether messages claiming to come from your domain are legitimate. </p>



<p>When implemented correctly, it reduces the risk of attackers impersonating your organization, protecting your employees, customers, and brand reputation.</p>



<p>While primarily a security tool, DMARC also supports trust and compliance by:</p>



<ul class="wp-block-list">
<li>Demonstrating that your emails are legitimate.</li>



<li>Providing visibility into who is sending email on behalf of your domain.</li>



<li>Helping you meet email authentication requirements that may support regulatory compliance.</li>
</ul>



<h2 class="wp-block-heading">How DMARC Works</h2>



<p>DMARC builds on two key email authentication technologies:</p>



<ul class="wp-block-list">
<li><strong>SPF (Sender Policy Framework):</strong>&nbsp;Verifies the sending server is authorized.</li>



<li><strong>DKIM (DomainKeys Identified Mail):</strong>&nbsp;Uses cryptographic signatures to ensure integrity.</li>
</ul>



<p>On their own, SPF and DKIM are useful but incomplete. SPF can fail in forwarding scenarios, and not all senders consistently sign with DKIM. DMARC strengthens protection by requiring that at least&nbsp;<strong>one</strong>&nbsp;of these technologies passes&nbsp;<strong>and</strong>&nbsp;that the domain used aligns with the visible “From” header. This alignment check makes impersonation much harder.</p>



<ul class="wp-block-list">
<li><strong>SPF Alignment:</strong>&nbsp;Confirms the sending server is authorized and its domain matches the “From” domain.</li>



<li><strong>DKIM Alignment:</strong>&nbsp;Confirms the message signature is valid and the signing domain matches the “From” domain.</li>
</ul>



<p>If either SPF or DKIM aligns, DMARC passes. If neither aligns, DMARC applies the policy you’ve set—monitor, quarantine, or reject.</p>



<p><em>The diagram below illustrates this difference: before DKIM, DMARC relies solely on SPF alignment. After DKIM, DMARC can validate alignment with either SPF or DKIM, providing stronger, more reliable protection against spoofing.</em></p>



<div data-wp-interactive="core/file" class="wp-block-file has-white-background-color has-background"><object data-wp-bind--hidden="!state.hasPdfPreview" hidden class="wp-block-file__embed" data="https://fortresssrm.com/wp-content/uploads/2025/08/Email-Auth-Pipeline-Before-vs-After-DKIM.pdf" type="application/pdf" style="width:100%;height:600px" aria-label="Embed of Email Auth Pipeline Before vs After DKIM Diagram."></object><a id="wp-block-file--media-ca449678-acb1-4ab7-b236-7632b1707060" href="https://fortresssrm.com/wp-content/uploads/2025/08/Email-Auth-Pipeline-Before-vs-After-DKIM.pdf" target="_blank" rel="noreferrer noopener">Email Auth Pipeline Before vs After DKIM Diagram</a><a href="https://fortresssrm.com/wp-content/uploads/2025/08/Email-Auth-Pipeline-Before-vs-After-DKIM.pdf" class="wp-block-file__button wp-element-button" download aria-describedby="wp-block-file--media-ca449678-acb1-4ab7-b236-7632b1707060">Download</a></div>



<p>Throughout this process, DMARC also generates reports that give you visibility into who is sending emails on behalf of your domain and which messages fail authentication. This combination of verification, alignment, policy enforcement, and reporting reduces spoofing, improves trust in your emails, and gives you actionable insight into your email ecosystem.</p>



<p><em>⚠️&nbsp;<strong>Limitations:</strong>&nbsp;DMARC stops exact-domain spoofing, but not lookalike domains or compromised accounts.</em></p>



<p>It’s important to note that DMARC primarily protects against&nbsp;<strong>exact-domain spoofing</strong>. Lookalike domains, display name impersonation, and compromised accounts can still bypass these checks. For complete protection, DMARC should be implemented as part of a broader, layered email security strategy.</p>



<h2 class="wp-block-heading">Why DMARC Matters for Your Organization</h2>



<p>Email-based impersonation isn’t just an IT issue, but it’s a major business risk. </p>



<p>Without DMARC, there&#8217;s a better chance attackers can:</p>



<ul class="wp-block-list">
<li>Send fake invoices or phishing emails that put customers at risk</li>



<li>Trick employees into sharing credentials or sensitive data</li>



<li>Damage your organization&#8217;s reputation</li>
</ul>



<p>With DMARC, you gain:</p>



<ul class="wp-block-list">
<li><strong>Trustworthiness:</strong>&nbsp;Your emails are verifiable</li>



<li><strong>Visibility:</strong>&nbsp;Reports show domain usage</li>



<li><strong>Control:</strong>&nbsp;You decide how unauthorized emails are handled</li>



<li><strong>Confidence:</strong>&nbsp;Supports compliance and customer trust</li>
</ul>



<h2 class="wp-block-heading">Best Practices for Implementing DMARC</h2>



<p>Rolling out DMARC isn’t a one-click solution. A strategic, phased approach will help you protect your domain without disrupting legitimate email flow.</p>



<ol class="wp-block-list">
<li><strong>Start with Monitoring:</strong>&nbsp;Use a “none” policy to gather data without impacting delivery.</li>



<li><strong>Align SPF and DKIM:</strong>&nbsp;Ensure both are correctly configured and aligned with your “From” domain (strict vs. relaxed alignment per RFC 7489).</li>



<li><strong>Sign Outgoing Mail:</strong>&nbsp;Use DKIM on all messages to verify authenticity.</li>



<li><strong>Review Reports:</strong>&nbsp;DMARC aggregate (RUA) and forensic (RUF) reports are in XML format and difficult to read. You’ll need proper tooling to parse and act on them. Analyze who is sending emails on your behalf.</li>



<li><strong>Gradually Enforce:</strong>&nbsp;Move from “none” to “quarantine” or “reject” to actively block spoofed messages, but be cautious. Jumping too quickly to “reject” can break legitimate third-party senders (CRMs, payroll services, marketing automation).</li>



<li><strong>Include Subdomains:</strong>&nbsp;Protect all parts of your domain.</li>



<li><strong>Educate Your Team:</strong>&nbsp;Train employees on phishing risks and DMARC’s role in your policy.</li>



<li><strong>Maintain and Evolve Your Setup:</strong>&nbsp;Email infrastructure changes over time. Keep DMARC records up to date, and review policies regularly.</li>
</ol>



<h2 class="wp-block-heading">Beyond DMARC: Layered Security</h2>



<p>DMARC is powerful, but most effective when combined with broader security measures:</p>



<ul class="wp-block-list">
<li>Ongoing user awareness training, including interactive <a href="https://fortresssrm.com/security-consulting/">tabletop exercises</a>.</li>



<li>Regular <a href="https://fortresssrm.com/managed-security/">patching</a> and proactive cybersecurity measures to maintain strong cyber hygiene.&nbsp;</li>



<li><a href="https://fortresssrm.com/incident-response/">Incident response</a> planning to prepare your team for attacks before they happen.</li>
</ul>



<h2 class="wp-block-heading">Fortress SRM Can Help</h2>



<p>Email spoofing and phishing aren’t going away, but DMARC gives your organization a strong defense. Implementing it can be complex, but you don’t have to go it alone.</p>



<p>The Fortress Security Risk Management team provides hands-on support for DMARC and broader email security as part of a holistic cybersecurity strategy. We work alongside you to identify risks, strengthen defenses, and simplify complexity. With our co-managed services, you get the right mix of guidance and support to match your security maturity, making security clear and manageable.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">Take Action Today</h3>



<p>Request your&nbsp;<strong>Fortress SRM DMARC assessment</strong>&nbsp;and start protecting your domain, your customers, and your business.</p>



<p>Fill out the form below or connect with Kelsey on <a href="https://www.linkedin.com/in/kelseyclarkstrategic/" target="_blank" rel="noreferrer noopener">LinkedIn</a> to start the conversation.</p>



                <div class='gf_browser_unknown gform_wrapper gform_legacy_markup_wrapper gform-theme--no-framework' data-form-theme='legacy' data-form-index='0' id='gform_wrapper_1' >
                        <div class='gform_heading'>
                            <h3 class="gform_title">Contact Us</h3>
                            <p class='gform_description'></p>
                        </div><form method='post' enctype='multipart/form-data'  id='gform_1'  action='/feed/' data-formid='1' novalidate>
                        <div class='gform-body gform_body'><ul id='gform_fields_1' class='gform_fields top_label form_sublabel_below description_below validation_below'><li id="field_1_8" class="gfield gfield--type-honeypot gform_validation_container field_sublabel_below gfield--has-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_8'>Name</label><div class='ginput_container'><input name='input_8' id='input_1_8' type='text' value='' autocomplete='new-password'/></div><div class='gfield_description' id='gfield_description_1_8'>This field is for validation purposes and should be left unchanged.</div></li><li id="field_1_1" class="gfield gfield--type-name gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label gfield_label_before_complex' >Name<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_complex ginput_container ginput_container--name no_prefix has_first_name no_middle_name has_last_name no_suffix gf_name_has_2 ginput_container_name gform-grid-row' id='input_1_1'>
                            
                            <span id='input_1_1_3_container' class='name_first gform-grid-col gform-grid-col--size-auto' >
                                                    <input type='text' name='input_1.3' id='input_1_1_3' value=''   aria-required='true'   placeholder='First Name'  />
                                                    <label for='input_1_1_3' class='gform-field-label gform-field-label--type-sub '>First</label>
                                                </span>
                            
                            <span id='input_1_1_6_container' class='name_last gform-grid-col gform-grid-col--size-auto' >
                                                    <input type='text' name='input_1.6' id='input_1_1_6' value=''   aria-required='true'   placeholder='Last Name'  />
                                                    <label for='input_1_1_6' class='gform-field-label gform-field-label--type-sub '>Last</label>
                                                </span>
                            
                        </div></li><li id="field_1_5" class="gfield gfield--type-text gf_left_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_5'>Company<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_text'><input name='input_5' id='input_1_5' type='text' value='' class='medium'    placeholder='Company' aria-required="true" aria-invalid="false"   /></div></li><li id="field_1_6" class="gfield gfield--type-text gf_right_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_6'>Title<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_text'><input name='input_6' id='input_1_6' type='text' value='' class='medium'    placeholder='Title' aria-required="true" aria-invalid="false"   /></div></li><li id="field_1_3" class="gfield gfield--type-phone gf_left_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_3'>Phone<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_phone'><input name='input_3' id='input_1_3' type='tel' value='' class='medium'  placeholder='Phone' aria-required="true" aria-invalid="false"   /></div></li><li id="field_1_2" class="gfield gfield--type-email gf_right_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_2'>Email<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_email'>
                            <input name='input_2' id='input_1_2' type='email' value='' class='medium'   placeholder='Email Address' aria-required="true" aria-invalid="false"  />
                        </div></li><li id="field_1_7" class="gfield gfield--type-textarea gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_7'>Where did you hear about Fortress SRM?</label><div class='ginput_container ginput_container_textarea'><textarea name='input_7' id='input_1_7' class='textarea small'      aria-invalid="false"   rows='10' cols='50'></textarea></div></li><li id="field_1_4" class="gfield gfield--type-textarea gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_4'>Message<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_textarea'><textarea name='input_4' id='input_1_4' class='textarea medium'    placeholder='Message' aria-required="true" aria-invalid="false"   rows='10' cols='50'></textarea></div></li></ul></div>
        <div class='gform-footer gform_footer top_label'> <input type='submit' id='gform_submit_button_1' class='gform_button button' onclick='gform.submission.handleButtonClick(this);' data-submission-type='submit' value='Submit'  /> 
            <input type='hidden' class='gform_hidden' name='gform_submission_method' data-js='gform_submission_method_1' value='postback' />
            <input type='hidden' class='gform_hidden' name='gform_theme' data-js='gform_theme_1' id='gform_theme_1' value='legacy' />
            <input type='hidden' class='gform_hidden' name='gform_style_settings' data-js='gform_style_settings_1' id='gform_style_settings_1' value='{&quot;inputPrimaryColor&quot;:&quot;#204ce5&quot;}' />
            <input type='hidden' class='gform_hidden' name='is_submit_1' value='1' />
            <input type='hidden' class='gform_hidden' name='gform_submit' value='1' />
            
            <input type='hidden' class='gform_hidden' name='gform_currency' data-currency='USD' value='kAse+EA/D8DIUbgOJoAFQWdrTTl6UHfMlSuxlDngHjwua/mRjm8PIfwJkhzoQqrkdZZTNMP2Aw1pzOqKNrpnn7ybP3E2zeO3UUcYAvE3nQfDjYk=' />
            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' />
            <input type='hidden' class='gform_hidden' name='state_1' value='WyJbXSIsImU2ZDAzMWFjZGE5YzM2MzllMDNkNzAzN2VjOTBiYzczIl0=' />
            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_target_page_number_1' id='gform_target_page_number_1' value='0' />
            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_source_page_number_1' id='gform_source_page_number_1' value='1' />
            <input type='hidden' name='gform_field_values' value='' />
            
        </div>
                        <p style="display: none !important;" class="akismet-fields-container" data-prefix="ak_"><label>&#916;<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_3" name="ak_js" value="164"/><script>document.getElementById( "ak_js_3" ).setAttribute( "value", ( new Date() ).getTime() );</script></p></form>
                        </div><script type="text/javascript">
/* <![CDATA[ */
 gform.initializeOnLoaded( function() {gformInitSpinner( 1, 'https://fortresssrm.com/wp-content/plugins/gravityforms/images/spinner.svg', true );jQuery('#gform_ajax_frame_1').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_1');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_1').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_1').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_1').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_1').removeClass('gform_validation_error');}setTimeout( function() { /* delay the scroll by 50 milliseconds to fix a bug in chrome */  }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_1').val();gformInitSpinner( 1, 'https://fortresssrm.com/wp-content/plugins/gravityforms/images/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [1, current_page]);window['gf_submitting_1'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}jQuery('#gform_wrapper_1').replaceWith(confirmation_content);jQuery(document).trigger('gform_confirmation_loaded', [1]);window['gf_submitting_1'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_1').text());}else{jQuery('#gform_1').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger("gform_pre_post_render", [{ formId: "1", currentPage: "current_page", abort: function() { this.preventDefault(); } }]);        if (event && event.defaultPrevented) {                return;        }        const gformWrapperDiv = document.getElementById( "gform_wrapper_1" );        if ( gformWrapperDiv ) {            const visibilitySpan = document.createElement( "span" );            visibilitySpan.id = "gform_visibility_test_1";            gformWrapperDiv.insertAdjacentElement( "afterend", visibilitySpan );        }        const visibilityTestDiv = document.getElementById( "gform_visibility_test_1" );        let postRenderFired = false;        function triggerPostRender() {            if ( postRenderFired ) {                return;            }            postRenderFired = true;            gform.core.triggerPostRenderEvents( 1, current_page );            if ( visibilityTestDiv ) {                visibilityTestDiv.parentNode.removeChild( visibilityTestDiv );            }        }        function debounce( func, wait, immediate ) {            var timeout;            return function() {                var context = this, args = arguments;                var later = function() {                    timeout = null;                    if ( !immediate ) func.apply( context, args );                };                var callNow = immediate && !timeout;                clearTimeout( timeout );                timeout = setTimeout( later, wait );                if ( callNow ) func.apply( context, args );            };        }        const debouncedTriggerPostRender = debounce( function() {            triggerPostRender();        }, 200 );        if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) {            const observer = new MutationObserver( ( mutations ) => {                mutations.forEach( ( mutation ) => {                    if ( mutation.type === 'attributes' && visibilityTestDiv.offsetParent !== null ) {                        debouncedTriggerPostRender();                        observer.disconnect();                    }                });            });            observer.observe( document.body, {                attributes: true,                childList: false,                subtree: true,                attributeFilter: [ 'style', 'class' ],            });        } else {            triggerPostRender();        }    } );} ); 
/* ]]&gt; */
</script>
<p>The post <a href="https://fortresssrm.com/dmarc-strengthening-trust-in-your-email-domain/">DMARC: Strengthening Trust in Your Email Domain</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Threat and Security Update – August, 2025</title>
		<link>https://fortresssrm.com/threat-and-security-update-august-2025/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Thu, 14 Aug 2025 19:13:54 +0000</pubDate>
				<category><![CDATA[Threat & Security Updates]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1740</guid>

					<description><![CDATA[<p>Stay Ahead of Threats with the Latest Vulnerability Updates for August Stay up to date on critical cyber risks, Microsoft’s August Patch Tuesday, and other notable third-party vulnerabilities. Timely patching ...</p>
<p>The post <a href="https://fortresssrm.com/threat-and-security-update-august-2025/">Threat and Security Update – August, 2025</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading"><br>Stay Ahead of Threats with the Latest Vulnerability Updates for August</h3>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Stay up to date on critical cyber risks, Microsoft’s August Patch Tuesday, and other notable third-party vulnerabilities. Timely patching is key to maintaining a strong security posture and protect your business from threats. </p>



<p>The following resources are grouped by threat type / category. </p>



<h3 class="wp-block-heading">Recent in Threat Intelligence News</h3>



<h4 class="wp-block-heading">Ransomware and AI-Enhanced Attacks</h4>



<ul class="wp-block-list">
<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Farcticwolf.com%2Fresources%2Fblog%2Farctic-wolf-observes-july-2025-uptick-in-akira-ransomware-activity-targeting-sonicwall-ssl-vpn%2F&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745179885570%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=tZ2vOWOc%2Fj%2B%2FCA0z4EsYIS8DSPFzQZpYOYIPXGvjwzM%3D&amp;reserved=0">Arctic Wolf Observes July 2025 Uptick in Akira Ransomware Activity Targeting SonicWall SSL VPN</a></u></li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.infosecurity-magazine.com%2Fnews%2Fransomware-ai-chatbot-pressure%2F&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745179964412%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=aRkQ9IM6NXBY3EuUgXsFfColewGZecA%2B%2Bf9ISw8m9R4%3D&amp;reserved=0">Ransomware Group Uses AI Chatbot to Intensify Pressure on Victims</a></u></li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.cisa.gov%2Fnews-events%2Fcybersecurity-advisories%2Faa25-203a&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180045298%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=0HFvppfY8rIwD%2B3Ul61DBT8e9q2iF2Y%2BbtcVtM2Wk6Y%3D&amp;reserved=0">#StopRansomware: Interlock | CISA</a></u></li>
</ul>



<h4 class="wp-block-heading">Vulnerabilities / Exploits</h4>



<ul class="wp-block-list">
<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsec.cloudapps.cisco.com%2Fsecurity%2Fcenter%2Fcontent%2FCiscoSecurityAdvisory%2Fcisco-sa-ise-unauth-rce-ZAd2GnJ6&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745179896774%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=ABhBrops3xoZ%2Bep3E5arNJldkHNlg5FzU7M8knoFr8U%3D&amp;reserved=0">Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities</a></u></li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fthecyberexpress.com%2Fmalcure-vulnerability-cve-2025-6043%2F&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745179939538%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=7snujyY9k%2B4YbSdLrAkWevMdPZ4Us53K%2BY3%2F6%2BtfWf0%3D&amp;reserved=0">Malcure Vulnerability (CVE-2025-6043) Risks 10,000+ Sites</a></u></li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.cisa.gov%2Fnews-events%2Falerts%2F2025%2F08%2F06%2Fmicrosoft-releases-guidance-high-severity-vulnerability-cve-2025-53786-hybrid-exchange-deployments&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745179949802%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=PRdG1op%2F4O7yCoKRtwj6x7ElWOjULCNnpQwYjNKzr2Q%3D&amp;reserved=0">Microsoft Releases Guidance on High-Severity Vulnerability (CVE-2025-53786) in Hybrid Exchange Deployments</a></u></li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.cisa.gov%2Fnews-events%2Falerts%2F2025%2F07%2F20%2Fupdate-microsoft-releases-guidance-exploitation-sharepoint-vulnerabilities&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180013153%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=0nECOJdxLwpzAhJ01VU20S8RJLO%2BbytE6r%2FPquRFdyM%3D&amp;reserved=0">UPDATE: Microsoft Releases Guidance on Exploitation of SharePoint Vulnerabilities</a></u></li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.sentinelone.com%2Fblog%2Fsharepoint-toolshell-zero-day-exploited-in-the-wild-targets-enterprise-servers%2F&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745179989979%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=NFGgsrF5plc24qnimPInZbNBHCpN2jiu4BF8qHBAKYM%3D&amp;reserved=0">SharePoint ToolShell | Zero-Day Exploited in-the-Wild Targets Enterprise Servers</a></u></li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgbhackers.com%2F1-click-oracle-cloud-code-editor-rce-flaw%2F&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180034569%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=2gmyjiv0y0KdD65ZYQXZQY8Sh5QZZGPQFK%2FZ1XFaOYE%3D&amp;reserved=0">1-Click Oracle Cloud Code Editor RCE Flaw Allows Malicious File Upload to Shell</a></u></li>
</ul>



<h4 class="wp-block-heading">Phishing and Social Engineering</h4>



<ul class="wp-block-list">
<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcyble.com%2Fblog%2Fscanception-a-qriosity-driven-phishing-campaign%2F&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745179977985%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=GU%2BFiOeYB8EyBdGqaoGGC%2FghNHnYh%2Bc7Pdri%2Fy4xlPE%3D&amp;reserved=0">Scanception: A QRiosity-Driven Phishing Campaign</a></u></li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcloud.google.com%2Fblog%2Ftopics%2Fthreat-intelligence%2Fvoice-phishing-data-extortion&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180001703%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=uOGTc0Ae95xN%2F%2B%2FK97%2BxFXgPqSH9mBiur6JSAu8lzBM%3D&amp;reserved=0">The Cost of a Call: From Voice Phishing to Data Extortion</a></u></li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgbhackers.com%2Firanian-threat-actors-use-ai-generated-emails%2F&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745179918521%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=Py3dfacmqvZ6J4HgyI7DshAH%2FU3H9VWVk367K4UebH0%3D&amp;reserved=0">Iranian Threat Actors Use AI-Generated Emails to Target Cybersecurity Researchers and Academics</a></u></li>
</ul>



<h4 class="wp-block-heading">DDoS / Network Attacks</h4>



<ul class="wp-block-list">
<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcybersecuritynews.com%2Frecord-breaking-ddos-attack-7-3-tbps%2F&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745179907747%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=pzAYVZkSbWgU7j9lqc5p7WaiURjqRgyK4dJ6ufmDHSA%3D&amp;reserved=0">Hackers Breaking Internet with 7.3 Tbps and 4.8 Billion Packets Per Second DDoS Attack</a></u></li>
</ul>



<h4 class="wp-block-heading">Malware / RATs</h4>



<ul class="wp-block-list">
<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fthedfirreport.com%2F2025%2F07%2F14%2Fkongtuke-filefix-leads-to-new-interlock-rat-variant%2F&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745179929243%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=GfjxyrQfNpbmHvqqCWuVvjqeL52sN7l5Dhji7MNUlIc%3D&amp;reserved=0">KongTuke FileFix Leads to New Interlock RAT Variant</a></u></li>
</ul>



<h4 class="wp-block-heading">Data Breaches / Trends</h4>



<ul class="wp-block-list">
<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.infosecurity-magazine.com%2Fnews%2Fus-data-breaches-record-year%2F&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180024083%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=uvJdQMV8d6SaVWjq%2FRQouj7oHF9TgiCLKg324rFqhPI%3D&amp;reserved=0">US Data Breaches Head for Another Record Year After 11% Surge</a></u></li>
</ul>



<h3 class="wp-block-heading">Patch Tuesday</h3>



<p><strong>Microsoft August 2025 Patch Tuesday</strong><br>108 vulnerabilities disclosed, including 13 critical and 1 zero-day. By category:</p>



<ul class="wp-block-list">
<li><strong>44</strong> Elevation of Privilege</li>



<li><strong>35</strong> Remote Code Execution</li>



<li><strong>18</strong> Information Disclosure</li>



<li><strong>9 </strong>Spoofing</li>



<li><strong>4</strong> Denial of Service</li>
</ul>



<h3 class="wp-block-heading">Critical Common Vulnerabilities and Exposures (CVEs)</h3>



<h4 class="wp-block-heading">Windows Zero-Day</h4>



<ul class="wp-block-list">
<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=http%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fen-US%2Fadvisory%2FCVE-2025-33053&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180056158%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=WEOpGRFM2%2Bwl%2BN8x8AzWpSC3KTVSNt6nUaw%2FsVJKiWE%3D&amp;reserved=0">CVE-2025-33053</a><a href="https://nam10.safelinks.protection.outlook.com/?url=http%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fen-US%2Fadvisory%2FCVE-2025-33053&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180066944%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=Ze8%2FTCEd3Stix9wC4BPv8Nc3s2PZVY324Jrsly8Sz%2B4%3D&amp;reserved=0">&nbsp;</a></u>– Windows Kerberos Elevation of Privilege Vulnerability</strong><br>&#8211; Windows Kerberos vulnerability allows an authenticated attacker to gain domain administrator privileges through relative path traversal. Microsoft states an attacker would need elevated access to&nbsp;<strong>msds-groupMSAMembership</strong>&nbsp;and&nbsp;<strong>mdsd-ManagedAccountPrecededByLink</strong>&nbsp;attributes to exploit the flaw.<br>&#8211; Vulnerability is publicly disclosed but is not actively being exploited in the wild.</li>
</ul>



<h4 class="wp-block-heading">Other Critical CVE&#8217;s Worth Mentioning</h4>



<ul class="wp-block-list">
<li><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-53793&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180078353%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=7U%2Bh47kWWfgTzLMInfh%2BGqTa62btfvP1IhTQd1xNm3Q%3D&amp;reserved=0"><strong>CVE-2025-53793</strong></a> – Azure Stack Hub Information Disclosure Vulnerability</li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-49707&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180093311%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=GbVHmfdi1D9SkkEXChM%2BW4IkkKtKpalWZF3B%2FREdSv8%3D&amp;reserved=0"><strong>CVE-2025-49707</strong></a></u>&nbsp;– Azure Virtual Machines Spoofing Vulnerability</li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-53781&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180108168%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=4ZL%2BRK0v0TvOGdMGCvQ5d3oeB6PjAfKCymCEc2%2BBk5s%3D&amp;reserved=0"><strong>CVE-2025-53781</strong></a></u>&nbsp;– Azure Virtual Machines Information Disclosure Vulnerability</li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-50176&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180123854%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=Dz2%2B4Sue1GaH%2BotSANZZ7LkI5JkP2%2B847frMFSRFrKc%3D&amp;reserved=0"><strong>CVE-2025-50176</strong></a></u>&nbsp;– DirectX Graphics Kernel Remote Code Execution Vulnerability</li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-50165&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180139526%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=7305TZ%2FL9QA7%2BDkWME3po%2BwTfFVcwHDakp79rfMVQjo%3D&amp;reserved=0"><strong>CVE-2025-50165</strong></a></u>&nbsp;– Windows Graphics Component Remote Code Execution Vulnerability</li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-53740&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180154947%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=Hs5qSmee%2FnkypdMJ9rppooX%2FZnuN9brLLDqRExdwSok%3D&amp;reserved=0">CVE-2025-53740</a></u>&nbsp;/&nbsp;<u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-53731&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180169444%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=P%2Fa%2F6JZXapzf8ALF%2FLlA3BHQvov8j9efaGKNi6WIMt4%3D&amp;reserved=0">53731</a></u></strong>&nbsp;– Microsoft Office Remote Code Execution Vulnerability</li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-53784&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180185312%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=Huuu4RbFuPS6FetiWek08q0P97EfNllZiXw1xmYaSn4%3D&amp;reserved=0">CVE-2025-53784</a></u>&nbsp;/&nbsp;<u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-53733&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180199856%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=f7gxMojfVfkc%2FZo4xaYZJhqt1S6l5N6IayC52pWl2NQ%3D&amp;reserved=0">53733</a></u></strong>&nbsp;– Microsoft Word Remote Code Execution Vulnerability</li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-48807&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180214611%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=62akWHUQ%2BK7Y2b%2FL98TU2QZvYOErJ86xPNUrYAO2kL0%3D&amp;reserved=0"><strong>CVE-2025-48807</strong></a></u>&nbsp;– Windows Hyper-V Remote Code Execution Vulnerability</li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-53766&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180229701%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=rvT7GfLdxHyzliiKluvECYf9P78fDgi2f2Kx4Ra15LE%3D&amp;reserved=0"><strong>CVE-2025-53766</strong></a></u>&nbsp;– GDI+ Remote Code Execution Vulnerability</li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-50177&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180245126%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=jVDyNn7WardeVitV%2BxtCvGMyucRIvhPtLn%2FeCY7x23U%3D&amp;reserved=0"><strong>CVE-2025-50177</strong></a></u> – Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability</li>
</ul>



<h4 class="wp-block-heading">3rd Party Critical CVE&#8217;s Worth Mentioning</h4>



<h5 class="wp-block-heading"><strong>Adobe Products<em> *</em></strong></h5>



<p>Adobe released emergency updates for two zero-day flaws in Adobe Experiece Manager (AEM) Forms on JEE after a proof-of-concept exploit chain was disclosed that can be used for unauthenticated, remote code execution on vulnerable instances. These zero-day vulnerabilities are described below.</p>



<ul class="wp-block-list">
<li><a style="font-weight: bold; text-decoration: underline;" href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Faem-forms%2Fapsb25-82.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180272062%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=2MHq6Jpnk4bCpuHm7gLXg6Xi9S2OnYB%2FxLv08U4b16c%3D&amp;reserved=0"><strong>CVE-2025-54253</strong></a>&nbsp;– Misconfiguration allowing arbitrary code execution. Rated &#8220;Critical&#8221; with a CVSS score of 8.6.</li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Faem-forms%2Fapsb25-82.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180288679%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=mYlTZ9QRNJHI414WVp5t9xdMJyR8X%2FGfukneJPokpKI%3D&amp;reserved=0"><strong>CVE-2025-54254</strong></a></u> – Improper Restriction of XML External Entity Reference (XXE) allowing arbitrary file system read. Rated &#8220;Critical&#8221; with a maximum-severity 10.0 CVSS score.</li>
</ul>



<p>Adobe also released 13 patches covering a total of 85 vulnerabilities. Of these, 38 of the flaws are rated as critical. The flaws could lead to application Denial-of-Service, arbitrary code execution, arbitrary file system read, memory leak, privilege escalation, and security feature bypass within varying Adobe products, listed below.</p>



<ul class="wp-block-list">
<li><a style="font-weight: bold; text-decoration: underline;" href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fanimate%2Fapsb25-73.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180304268%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=146bZpqO60sE4NbTuc%2FBP7b7TFEqiB3K4sth9sGSXGA%3D&amp;reserved=0">Animate</a></li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fmagento%2Fapsb25-71.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180320530%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=DKlfxvYByrokmzEZZmqOjUqX9sEWq2IPVzGQNWjSRWk%3D&amp;reserved=0">Commerce</a></u></strong></li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fdimension%2Fapsb25-84.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180336356%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=nXMtwfJ8JApJPXr33WA9Cisbcc391VYlNRNmmu8R%2FCw%3D&amp;reserved=0">Dimension</a></u></strong></li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fframemaker%2Fapsb25-83.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180350169%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=%2Fg4AZSXAB11tsVrYVnIZV55opL7Yh9qPNH85HUGVeUA%3D&amp;reserved=0">FrameMaker</a></u></strong></li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fillustrator%2Fapsb25-74.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180361337%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=DIKgJDQdd9g5mPJQbpMZJNSOD8EEv0XZj19sz%2B6AH5Q%3D&amp;reserved=0">Illustrator</a></u></strong></li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Findesign%2Fapsb25-79.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180372106%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=ONaB6HDiZ5JXoTE3yoLCR2u%2BNArHXPAW9x3SP6mVa%2Bk%3D&amp;reserved=0">InDesign</a></u></strong></li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fincopy%2Fapsb25-80.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180383304%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=tnIDFLa7CYJIdUiOjrtAkBHE7gII76BH3ZvIEYG0Ib8%3D&amp;reserved=0">InCopy</a></u></strong></li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fphotoshop%2Fapsb25-75.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180394627%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=y4X63iDZC%2FEghT0P%2F57yaWco%2BKUE0Qup74iaHEHPCHY%3D&amp;reserved=0">Photoshop</a></u></strong></li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fsubstance3d-modeler%2Fapsb25-76.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180405759%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=6K%2BnwIVcDWG52sRBSrKBCOeDjDtL0raCUaWR%2FTlZhvI%3D&amp;reserved=0">Substance 3D Modler</a></u></strong></li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fsubstance3d_painter%2Fapsb25-77.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180416742%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=aiKeVxU%2BudNfpgzpg7slP0aBfZDgjf9dvOlWB3wpJ6s%3D&amp;reserved=0">Substance 3D Painter</a></u></strong></li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fsubstance3d-sampler%2Fapsb25-78.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180428883%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=3mXC0bthuufy6%2B7VJ%2F0iceBwxWy4o056mZZVOJIhukA%3D&amp;reserved=0">Substance 3D Sampler</a></u></strong></li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fsubstance3d_stager%2Fapsb25-64.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180443566%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=I4X8Ntbv1Iir7crZrMEtbHYTVIIqCBSy83uNSZETAYc%3D&amp;reserved=0">Substance 3D Stager</a></u></strong></li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fsubstance3d-viewer%2Fapsb25-72.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180457487%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=s4W8I2LEIlmTzPkgbPmqI9j1AwcHaEZ8aDaTRxgjiLM%3D&amp;reserved=0">Substance 3D</a><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fsubstance3d-viewer%2Fapsb25-72.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180470481%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=1gut9smyDmbwDRDI7HxnoUCFbi1SVZ0WaV10CaNiuNc%3D&amp;reserved=0">&nbsp;</a><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fsubstance3d-viewer%2Fapsb25-72.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180485744%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=uNlf%2FxShxMMOgqQ4muzSAxy76spSOUzUpfC7%2FW61aPE%3D&amp;reserved=0">Viewer</a></u></strong></li>
</ul>



<h5 class="wp-block-heading">Android</h5>



<p><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsource.android.com%2Fdocs%2Fsecurity%2Fbulletin%2F2025-08-01%232025-08-05-security-patch-level-vulnerability-details&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180497673%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=dxOB8I4mrWP3%2B1dQy54LhNht7oopJsXjfByvUZxJki8%3D&amp;reserved=0">Google has released security patches for six vulnerabilities in Android&#8217;s August 2025 security update, including two Qualcomm flaws exploited in targeted attacks.</a></u></p>



<h5 class="wp-block-heading"><strong>Cisco <em>*</em></strong></h5>



<ul class="wp-block-list">
<li><a style="font-weight: bold; text-decoration: underline;" href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsec.cloudapps.cisco.com%2Fsecurity%2Fcenter%2Fcontent%2FCiscoSecurityAdvisory%2Fcisco-sa-ise-unauth-rce-ZAd2GnJ6&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180508105%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=V6laX9EIERFOqm7Luh8CqC4uH9oHYNjZl3X9O9tqUkE%3D&amp;reserved=0">CVE-2025-20281 / 20282 / 20337</a><strong>&nbsp;</strong>– Multiple vulnerabilities in<strong>&nbsp;Cisco Identity Services Engine (ISE)&nbsp;</strong>and<strong>&nbsp;Cisco ISE Passive Identity Connector (ISE-PIC)&nbsp;</strong>could allow an unauthenticated, remote attacker to issue commands on the underlying operating system as the root user.</li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsec.cloudapps.cisco.com%2Fsecurity%2Fcenter%2Fcontent%2FCiscoSecurityAdvisory%2Fcisco-sa-cuis-file-upload-UhNEtStm&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180519009%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=d07yNVjVJrjolXV%2FcNZJGRV4dbjQrcIlkFX8OqyTdMA%3D&amp;reserved=0">CVE-2025-20274</a></u>&nbsp;–&nbsp;</strong>A vulnerability in the web-based management interface of&nbsp;<strong>Cisco Unified Intelligence Center</strong>&nbsp;could allow an authenticated, remote attacker to upload arbitrary files to an affected device.</li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsec.cloudapps.cisco.com%2Fsecurity%2Fcenter%2Fcontent%2FCiscoSecurityAdvisory%2Fcisco-sa-20170629-snmp&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180529655%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=Cjh6IkXz%2BzH8FRcLMvAPNyYbOuDjH6mDZdogA%2FmAr8Y%3D&amp;reserved=0">CVE-2017-6736 / 6737 / 6738</a></u> – </strong>The Simple Network Management Protocol (SNMP) subsystem of<strong> Cisco IOS </strong>and<strong> IOS XE Software </strong>contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload.</li>
</ul>



<h5 class="wp-block-heading"><strong>Fortinet <em>*</em></strong></h5>



<ul class="wp-block-list">
<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.fortiguard.com%2Fpsirt%2FFG-IR-24-042&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180539911%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=4kEoep5CAf4PP1aXGcUSq9uiSl64SNEnGnIiZEmuwFM%3D&amp;reserved=0">CVE-2024-26009</a></u> </strong>– [HIGH] Weak Authentication FGFM Protocol in FortiOS, FortiProxy &amp; FortiPAM</li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.fortiguard.com%2Fpsirt%2FFG-IR-24-364&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180550404%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=a2d9LdUtt4qLKZp%2F2TrI8hyvnzBWwDbRYRhHzETcHPM%3D&amp;reserved=0">CVE-2025-25248</a></u> </strong>– [MEDIUM] Integer Overflow in FortiOS, FortiPAM and FortiProxy SSL-VPN RDP and VNC bookmarks</li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.fortiguard.com%2Fpsirt%2FFG-IR-25-173&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180560709%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=xtINXk7BsAU%2Bjsii4PvHKYo%2FwLcwsq5bP%2F%2FqdwMtpXw%3D&amp;reserved=0">CVE-2025-53744</a></u> </strong>– [MEDIUM] Incorrect Privilege Assignment in FortiOS Security Fabric</li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.fortiguard.com%2Fpsirt%2FFG-IR-23-209&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180571676%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=riEFnQauW%2FI29bkWlRouDqqCxPTRGfgh0CkFfwgP72k%3D&amp;reserved=0">CVE-2023-45584</a></u> </strong>– [MEDIUM] A double free vulnerability in FortiOS, FortiProxy &amp; FortiPAM administrative interfaces</li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.fortiguard.com%2Fpsirt%2FFG-IR-24-473&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180582113%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=x1y0%2Fo0vMO2CuPKIBtuuToQtzcSdQaEL5xeVAgUe6I4%3D&amp;reserved=0">CVE-2024-52964</a></u> </strong>– [MEDIUM] An Improper Limitation of a Pathname to a Restricted Directory (&#8216;Path Traversal&#8217;) vulnerability in FortiManager &amp; FortiManager Cloud</li>
</ul>



<h5 class="wp-block-heading"><strong>Google Chrome</strong></h5>



<ul class="wp-block-list">
<li>Updated Version – 139.0.7258.127/.128 for Windows, Mac and 139.0.7258.127 for Linux.</li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fchromereleases.googleblog.com%2F2025%2F08%2Fstable-channel-update-for-desktop_12.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180597093%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=gFyBfboTjVaMVKzAfNmWSksAL8NppK0crYJc2%2B2a%2BwM%3D&amp;reserved=0">Chrome Release: August 12th, 2025</a></u></li>
</ul>



<h5 class="wp-block-heading"><strong>Ivanti </strong>*</h5>



<ul class="wp-block-list">
<li>Ivanti has released updates for Ivanti Avalanche, Ivanti Virtual Application Delivery Control (vADC), and Ivanti Connect Secure, Policy Secure, ZTA Gateways and Neurons for Secure Access, which address&nbsp;<strong>3 medium severity vulnerabilities</strong>, and&nbsp;<strong>4 high severity vulnerabilities</strong>.</li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ivanti.com%2Fblog%2Faugust-2025-security-update&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180609736%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=5%2BMajCWhr1ujMn99qryDk7qgS1FpmdCD2ZWnnIdqjcQ%3D&amp;reserved=0">August 2025 Security Update | Ivanti</a></u></li>
</ul>



<h5 class="wp-block-heading"><strong>SAP </strong>*</h5>



<p>In August 2025, SAP Security Patch Day saw the release of <strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.sap.com%2Fen%2Fmy-support%2Fknowledge-base%2Fsecurity-notes-news%2Faugust-2025.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180620303%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=yspL9ZTijQkuYkOAtL0PpKkG31iBGc2g0n3ySAMXO0o%3D&amp;reserved=0">15 new Security Notes</a></u></strong> and 4 updates to previously released Security Notes.</p>



<h5 class="wp-block-heading"><strong>TrendMicro </strong>*</h5>



<p><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsuccess.trendmicro.com%2Fen-US%2Fsolution%2FKA-0020652&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180631952%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=C9iVNuVe4epWhLtAJeRazlriOoQjNGgmFb4RCyZJV0s%3D&amp;reserved=0">TrendMicro released a mitigation tool to protect against recently discovered command injection remote code execution (RCE) vulnerabilities on Apex One Management Console (on-premise)</a></u>.</p>



<h5 class="wp-block-heading"><strong>WinRAR</strong></h5>



<p><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.win-rar.com%2Fsinglenewsview.html%3F%26L%3D0%26tx_ttnews%255Btt_news%255D%3D283%26cHash%3Da64b4a8f662d3639dec8d65f47bc93c5&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180642470%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=Ix1g8mURq72SGfj699Al6UeQjU4xWmGDTqXlhsmKl04%3D&amp;reserved=0">WinRAR released a security update for an actively exploited path traversal bug that could lead to remote code execution</a>. </p>



<h5 class="wp-block-heading"><strong>7-Zi</strong>p</h5>



<p> <u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fseclists.org%2Foss-sec%2F2025%2Fq3%2F82&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180652936%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=bJN4g%2BO8S4MqoFiU94sa7srGqKNGpt0%2Fu1J3gHk9Avk%3D&amp;reserved=0">7-Zip released a security update for a path traversal flaw that could lead to RCE</a></u>.</p>



<p><em>* Not handled by Fortress SRM. </em></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">About Fortress SRM&#8217;s Vigilant Managed Cyber Hygiene Offering</h3>



<h4 class="wp-block-heading">Why Patching Matters</h4>



<p>Unpatched software is a leading cause of breaches—nearly 1 in 3 attacks exploit known vulnerabilities.</p>



<h4 class="wp-block-heading">Vigilant Managed Cyber Hygiene</h4>



<p> Fortress SRM&#8217;s Vigilant Managed Cyber Hygiene simplifies patch management. </p>



<ul class="wp-block-list">
<li>Automated updates with 97%+ success rate for Microsoft &amp; 100+ third-party applications</li>



<li>Critical patches, OS upgrades, and configuration updates for all devices, on/off network</li>



<li>24/7/365 U.S.-based monitoring and real-time reporting for full visibility</li>
</ul>



<h4 class="wp-block-heading">Stay Protected. Stay Proactive. </h4>



<p><a href="https://fortresssrm.com/managed-security/">Learn how Fortress SRM can enhance your cybersecurity strategy →</a></p>
<p>The post <a href="https://fortresssrm.com/threat-and-security-update-august-2025/">Threat and Security Update – August, 2025</a> appeared first on <a href="https://fortresssrm.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
