<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Fortress SRM</title>
	<atom:link href="https://fortresssrmstg.wpenginepowered.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://fortresssrmstg.wpenginepowered.com/</link>
	<description>Full-Spectrum Cybersecurity Protection</description>
	<lastBuildDate>Thu, 22 Jan 2026 14:39:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>

<image>
	<url>https://fortresssrmstg.wpenginepowered.com/wp-content/uploads/2021/05/cropped-FORT_Favicon-32x32.png</url>
	<title>Fortress SRM</title>
	<link>https://fortresssrmstg.wpenginepowered.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Threat and Security Update – January, 2026</title>
		<link>https://fortresssrmstg.wpenginepowered.com/threat-and-security-update-january-2026/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Thu, 22 Jan 2026 14:39:20 +0000</pubDate>
				<category><![CDATA[Threat & Security Updates]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1811</guid>

					<description><![CDATA[<p>Stay Ahead of Threats with the Latest Vulnerability Updates for January Stay up to date on critical cyber risks, Microsoft’s January Patch Tuesday, and other notable third-party vulnerabilities. Timely patching ...</p>
<p>The post <a href="https://fortresssrmstg.wpenginepowered.com/threat-and-security-update-january-2026/">Threat and Security Update – January, 2026</a> appeared first on <a href="https://fortresssrmstg.wpenginepowered.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading"><br>Stay Ahead of Threats with the Latest Vulnerability Updates for January</h3>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Stay up to date on critical cyber risks, Microsoft’s January Patch Tuesday, and other notable third-party vulnerabilities. Timely patching is key to maintaining a strong security posture and protecting your business from threats. </p>



<h3 class="wp-block-heading">Quick Highlights</h3>



<ul class="wp-block-list">
<li><strong>Microsoft Patch Tuesday:</strong> <br>&#8211; 112 vulnerabilities disclosed<br>&#8211; 8 rated <strong>Critical</strong>, 3 are <strong>Zero-Day</strong> (1 actively exploited)  </li>
</ul>



<ul class="wp-block-list">
<li><strong>High-Severity Advisories from Major Vendors:</strong> <br>&#8211; <strong>Adobe: </strong>17 critical vulnerabilities patched across 11 products <br>&#8211; <strong>Fortinet</strong>: 1 high-severity flaws in FortiOS and FortiSwitchManager <br>&#8211; <strong>SAP</strong>: 4 critical vulnerabilities in SAP Landscape Transformation, SAP S/4HANA, and SAP Wily Introscope Enterprise Manager <br>&#8211; <strong>n8n</strong>: Fixed critical vulnerability affecting versions 1.65–1.120.4 <br>&#8211; <strong>React Server</strong>: Disclosed critical RCE vulnerability in React Server Components <br>&#8211; <strong>Veeam</strong>: Disclosed multiple critical vulnerabilities affecting Veeam Backup &amp; Replication v 13.0.1.180 and earlier   </li>
</ul>



<ul class="wp-block-list">
<li><strong>Top Threats to Watch:</strong> <br>&#8211; <strong>AI‑Powered Social Engineering &amp; Identity Attacks – </strong>Attackers are abusing OAuth device-code authorization flows, QR‑code “Quishing,” and LinkedIn comment‑reply impersonation to bypass MFA and steal credentials at scale. <br>&#8211; <strong>Supply‑Chain &amp; Developer Ecosystem Compromises – </strong>Major compromises include the Office Assistant supply‑chain attack, malicious VS Code/OpenVSX extensions (GlassWorm), and breach of Target developer systems—highlighting continued targeting of dev environments and CI/CD ecosystems. <br>&#8211; <strong>AI‑Driven Malware &amp; Botnet Expansion</strong> – GoBruteforcer campaigns leverage AI‑generated default credentials and weak configurations to compromise 50,000+ servers, especially crypto and blockchain environments. <br>&#8211; <strong>Malicious Browser Extensions Harvesting AI Chats &amp; Corporate Data – </strong>Two Chrome extensions with 900k+ installs stole ChatGPT/DeepSeek conversations and corporate browsing data, demonstrating large‑scale exfiltration from trusted browser ecosystems. <br>&#8211; <strong>Critical RCE Vulnerabilities Actively Exploited in the Wild – </strong>Active exploitation of WatchGuard Firebox (CVE‑2025‑14733), Fortinet FG‑IR‑19‑283, React Server Components (CVSS 10.0), Veeam Backup &amp; Replication, and n8n workflow vulnerabilities poses severe risk for remote code execution, config theft, and full system compromise. </li>
</ul>



<h2 class="wp-block-heading">Windows 10 Reaches End of Support</h2>



<p>As of <strong>October 14, 2025</strong>, Microsoft has officially ended support for Windows 10. This month’s Patch Tuesday was the <strong>final security update</strong> for the OS—unless your organization enrolls in the <strong>Extended Security Updates (ESU)</strong> program. </p>



<ul class="wp-block-list">
<li><strong>What This Means for Your Organization:</strong>&nbsp;<br>&#8211; No more security patches or bug fixes for Windows 10 devices&nbsp;&nbsp;<br>&#8211; Increased exposure to vulnerabilities and compliance risks&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Continued support requires either:&nbsp;&nbsp;<br>&#8211; Enrolling in Microsoft’s&nbsp;<strong>paid ESU program</strong>, or&nbsp;&nbsp;<br>&#8211; <strong><strong>Upgrading to Windows 11</strong></strong>&nbsp;</li>
</ul>



<p><strong>Need help planning your transition?</strong>&nbsp;<br>Fortress SRM can help assess your environment, prioritize upgrades, and ensure your endpoints&nbsp;remain&nbsp;patch-compliant and secure.</p>



<h2 class="wp-block-heading">Patch Tuesday Summary</h2>



<p><strong>Microsoft January 2026 Patch Tuesday</strong> <br><strong>112</strong> vulnerabilities disclosed, including <strong>8</strong> critical and<strong> 3</strong> zero-days. By category:</p>



<ul class="wp-block-list">
<li><strong>57</strong> Elevation of Privilege </li>



<li><strong>22</strong> Remote Code Execution </li>



<li><strong>22</strong> Information Disclosure </li>



<li><strong>5</strong> Spoofing </li>



<li><strong>3 </strong>Tampering </li>



<li><strong>3</strong> Security Feature Bypass </li>



<li><strong>2</strong> Denial of Service </li>
</ul>



<h2 class="wp-block-heading">Critical Common Vulnerabilities and Exposures (CVEs)</h2>



<h3 class="wp-block-heading">Windows Zero-Days</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Details</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-62221</strong></a><strong></strong>&nbsp;</td><td><strong>Elevation&nbsp;of Privilege Flaw in Windows Cloud Files Mini Filter Driver&nbsp;which&nbsp;can&nbsp;be&nbsp;used&nbsp;to&nbsp;gain SYSTEM&nbsp;privileges</strong>&nbsp;</td><td><strong>Important</strong>&nbsp;</td><td><strong>Yes</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64671" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-64671</strong></a><strong></strong>&nbsp;</td><td><strong>Remote Code Execution Vulnerability&nbsp;in GitHub Copilot for&nbsp;Jetbrains&nbsp;which can allow an attack to execute commands locally</strong>&nbsp;</td><td><strong>Important</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54100" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-54100</strong></a><strong></strong>&nbsp;</td><td><strong>Remote Code Execution Vulnerability&nbsp;in PowerShell which could allow embedded scripts to be executed if the webpage is fetched using Invoke-WebRequest</strong>&nbsp;</td><td><strong>Important</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<h3 class="wp-block-heading">Other Critical CVE&#8217;s Worth Mentioning</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Details</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><strong>CVE-2026-20957</strong>&nbsp;</td><td>Microsoft Excel Remote Code Execution Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td>No&nbsp;</td></tr><tr><td><strong>CVE-2026-20952</strong>&nbsp;</td><td>Microsoft Office Remote Code Execution Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td>No&nbsp;</td></tr><tr><td><strong>CVE-2026-20854</strong>&nbsp;</td><td>Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td>No&nbsp;</td></tr><tr><td><strong>CVE-2026-20955</strong>&nbsp;</td><td>Microsoft Excel Remote Code Execution Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td>No&nbsp;</td></tr><tr><td><strong>CVE-2026-20953</strong>&nbsp;</td><td>Microsoft Office Remote Code Execution Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td>No&nbsp;</td></tr><tr><td><strong>CVE-2026-20944</strong>&nbsp;</td><td>Microsoft Word Remote Code Execution Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td>No&nbsp;</td></tr><tr><td><strong>CVE-2026-20876</strong>&nbsp;</td><td>Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td>No&nbsp;</td></tr><tr><td><strong>CVE-2026-20822</strong>&nbsp;</td><td>Windows Graphics Component Elevation of Privilege Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td>No&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://msrc.microsoft.com/update-guide/releaseNote/2026-Jan" target="_blank" rel="noreferrer noopener"><em>Microsoft January 2026 Security Update Release</em></a></p>



<h3 class="wp-block-heading">3rd Party Critical CVE&#8217;s Worth Mentioning</h3>



<h4 class="wp-block-heading">Adobe Products *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>Affected Product</strong>&nbsp;</td><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Critical Issues</strong>&nbsp;</td><td><strong>Key Risks</strong>&nbsp;</td></tr><tr><td><strong>Adobe Dreamweaver</strong>&nbsp;</td><td>CVE-2026-21267&nbsp;CVE-2026-21268&nbsp;CVE-2026-21274&nbsp;CVE-2026-21271&nbsp;CVE-2026-21272&nbsp;</td><td><strong>5&nbsp;Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;Arbitrary file system&nbsp;write&nbsp;</td></tr><tr><td><strong>Adobe&nbsp;InDesign</strong>&nbsp;</td><td>CVE-2026-21275&nbsp;CVE-2026-21276&nbsp;CVE-2026-21277&nbsp;CVE-2026-21304&nbsp;</td><td><strong>4&nbsp;Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;</td></tr><tr><td><strong>Adobe&nbsp;Substance 3D Modeler</strong>&nbsp;</td><td>CVE-2026-21298&nbsp;CVE-2026-21299&nbsp;</td><td><strong>2&nbsp;Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;</td></tr><tr><td><strong>Adobe Illustrator</strong>&nbsp;</td><td>CVE-2026-21280&nbsp;</td><td><strong>1&nbsp;Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;</td></tr><tr><td><strong>Adobe InCopy</strong>&nbsp;</td><td>CVE-2026-21281&nbsp;</td><td><strong>1&nbsp;Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;</td></tr><tr><td><strong>Adobe Bridge</strong>&nbsp;</td><td>CVE-2026-21283&nbsp;</td><td><strong>1&nbsp;Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;</td></tr><tr><td><strong>Adobe&nbsp;Substance 3D Stager</strong>&nbsp;</td><td>CVE-2026-21287&nbsp;</td><td><strong>1&nbsp;Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;&nbsp;</td></tr><tr><td><strong>Adobe Substance 3D Painter</strong>&nbsp;</td><td>CVE-2026-21305&nbsp;</td><td><strong>1Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;&nbsp;</td></tr><tr><td><strong>Adobe Substance 3D Sampler</strong>&nbsp;</td><td>CVE-2026-21306&nbsp;<strong></strong>&nbsp;</td><td><strong>1&nbsp;Critical</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;</td></tr><tr><td><strong>Adobe ColdFusion</strong>&nbsp;</td><td>CVE-2025-66516&nbsp;</td><td><strong>0&nbsp;Critical, 1 Important</strong>&nbsp;</td><td>Arbitrary code execution&nbsp;</td></tr><tr><td><strong>Adobe Substance 3D Designer</strong>&nbsp;</td><td>CVE-2026-21308&nbsp;</td><td><strong>0&nbsp;Critical, 1 Important</strong>&nbsp;</td><td>Memory leak&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://helpx.adobe.com/security/security-bulletin.html" target="_blank" rel="noreferrer noopener"><em>Adobe Security Bulletins</em></a></p>



<h4 class="wp-block-heading">Fortinet *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>Affected Product</strong>&nbsp;</td><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td>FortiOS&nbsp;&nbsp;FortiSwitchManager<strong>&nbsp;</strong>&nbsp;<strong></strong>&nbsp;</td><td><strong>CVE-2025-25249</strong>&nbsp;</td><td>A heap-based buffer overflow vulnerability in&nbsp;cw_acd&nbsp;daemon may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests&nbsp;</td><td><strong>High</strong>&nbsp;</td><td>No&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://www.fortiguard.com/psirt" target="_blank" rel="noreferrer noopener"><em>Fortinet PSIRT Advisories</em></a></p>



<h4 class="wp-block-heading">SAP *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>Affected Component</strong>&nbsp;</td><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><strong>SAP S/4HANA (Private Cloud and&nbsp;On-Premise)</strong>&nbsp;</td><td>CVE-2026-0501&nbsp;CVE-2026-0498&nbsp;</td><td>CVE-2026-0501&nbsp;&#8211;&nbsp;Due to insufficient input validation, an authenticated user could execute crafted SQL queries to read,&nbsp;modify, and&nbsp;deletebackend database data.&nbsp;CVE-2026-0498&nbsp;&#8211;&nbsp;allows an attacker with admin privileges to exploit&nbsp;a vulnerability&nbsp;in the function module exposed via RFC.&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><strong>SAP Landscape Transformation</strong>&nbsp;</td><td>CVE-2026-0491&nbsp;</td><td>Allows&nbsp;an attacker with admin privileges to exploit&nbsp;a vulnerability&nbsp;in the function module exposed via RFC.&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><strong>SAP Wily Introscope Enterprise Manager</strong>&nbsp;</td><td>CVE-2026-0500&nbsp;</td><td>Due to the usage of vulnerable&nbsp;third party&nbsp;component, an unauthenticated attacker could create a malicious JNLP file accessible by a public facing URL.&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://support.sap.com/en/my-support/knowledge-base/security-notes-news/october-2025.html" target="_blank" rel="noreferrer noopener"><em>SAP January 2026 Security Notes</em></a></p>



<h3 class="wp-block-heading">Google Chrome</h3>



<ul class="wp-block-list">
<li><strong>Version:</strong> 144.0.7559.59/60 (Windows and Mac), 144.0.7559.59 (Linux) </li>



<li><strong>Release Date:</strong> Tuesday, January 13, 2026 </li>



<li><strong>Key Fixes:</strong> High CVE-2026-0899, High CVE-2026-0900 and High CVE-2026-0901 </li>
</ul>



<p><a href="https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_13.html" target="_blank" rel="noreferrer noopener"><em>Chrome Release Notes</em></a></p>



<h3 class="wp-block-heading">Mozilla Firefox</h3>



<ul class="wp-block-list">
<li><strong>Version:</strong> Firefox 147 </li>



<li><strong>Release Date:</strong> Tuesday, January 13, 2026 </li>



<li><strong>Key Fixes:</strong> High CVE-2026-0877/78/79/80/81/82 </li>
</ul>



<p><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/" target="_blank" rel="noreferrer noopener"><em>Mozilla Release Notes</em></a></p>



<p><em>* Not handled by Fortress SRM.</em>&nbsp;</p>



<h2 class="wp-block-heading">Threat Intelligence Trends – January 2026</h2>



<p>The following resources are grouped by threat type / category.&nbsp;</p>



<h3 class="wp-block-heading">Emerging Threats</h3>



<p><strong>SOCRadar Annual Dark Web Report 2025</strong>  <br>SOCRadar’s 2025 Annual Dark Web Report highlights a data‑driven overview of underground cybercrime, showing that data leaks dominate dark web activity, with database‑related threats making up 64.06% of observed incidents and selling posts 59.32%. The United States remains the top target, responsible for 19.91% of dark‑web mentions and over 41% of ransomware attacks, while Public Administration emerges as the most exposed sector at 12.85%. <br><a href="https://socradar.io/blog/annual-dark-web-report-2025/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a> </p>



<p><strong><strong>Silent Push Uncovers Long‑Running Magecart Skimming Campaign</strong> </strong> <br><em>Security researchers discovered a sophisticated Magecart web‑skimming network that has been active since at least 2022, targeting major payment cards including American Express, Discover, Mastercard, JCB, UnionPay, and others. </em><br><a href="https://www.silentpush.com/blog/magecart/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a></p>



<p><strong>Target’s Dev Server Taken Offline After Hackers Claim Theft of Internal Source Code</strong> <br>Hackers published samples of what they claim is stolen internal Target source code on a public Gitea instance, advertising a much larger 860GB dataset for sale and referencing internal systems, developer metadata, and private repositories. <br><a href="https://www.bleepingcomputer.com/news/security/targets-dev-server-offline-after-hackers-claim-to-steal-source-code/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a></p>



<p><strong>Trust Wallet Confirms Extension Hack Led to $7 Million Crypto Theft</strong> <br>Trust Wallet confirmed that a malicious Chrome extension update (version 2.68) published on December 24 allowed attackers to exfiltrate sensitive wallet data, resulting in approximately $7 million in stolen cryptocurrency. <br><a href="https://www.bleepingcomputer.com/news/security/trust-wallet-confirms-extension-hack-led-to-7-million-crypto-theft/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a></p>



<p><strong>Senior U.S. Officials Impersonated in Malicious Smishing &amp; Vishing Campaign</strong> <br>An IC3 Public Service Announcement warns that since at least 2023, threat actors have been impersonating senior U.S. government officials through smishing (SMS phishing) and AI‑generated vishing calls to build rapport with victims before moving conversations to encrypted apps. <br><a href="https://www.ic3.gov/PSA/2025/PSA251219" target="_blank" rel="noreferrer noopener">Read more →</a></p>



<h3 class="wp-block-heading">Ransomware &amp; Malware Deployment</h3>



<p><strong><strong>Office Assistant Supply Chain Attack Delivers Malicious Plugin</strong> </strong> <br>Security researchers uncovered a long‑running supply‑chain attack in which the popular Chinese AI‑powered Office Assistant application (version 3.1.10.1) secretly loaded a malicious downloader component that contacted C2 domains, retrieved multi‑stage payloads, and ultimately deployed the Mltab malicious browser plugin.<br><a href="https://ti.qianxin.com/blog/articles/office-assistant-supply-chain-attack-en/" target="_blank" rel="noreferrer noopener">Read more →</a></p>



<p><strong><strong><strong>GlassWorm Goes Mac: Fresh Infrastructure, New Tricks</strong> </strong></strong> <br>A new GlassWorm wave marks a major pivot from Windows to macOS, distributing malicious VS Code/OpenVSX extensions that use AES‑256‑CBC–encrypted JavaScript payloads instead of earlier invisible Unicode or Rust‑based techniques.<br><a href="https://www.koi.ai/blog/glassworm-goes-mac-fresh-infrastructure-new-tricks" target="_blank" rel="noreferrer noopener">Read more →</a></p>



<p><strong>MacSync Stealer Evolves into Code‑Signed Swift Malware</strong> <br>Security researchers discovered a new MacSync Stealer variant delivered as a code‑signed and notarized Swift application inside a disk image, allowing it to bypass Gatekeeper and avoid traditional execution‑chain indicators. <br><a href="https://www.jamf.com/blog/macsync-stealer-evolution-code-signed-swift-malware-analysis/" target="_blank" rel="noreferrer noopener">Read more →</a></p>



<p><strong>GachiLoader: Obfuscated Node.js Loader Spread via YouTube Ghost Network</strong> <br>Check Point Research identified GachiLoader, a heavily obfuscated Node.js‑based loader distributed through compromised YouTube accounts promoting fake game cheats and cracked software. <br><a href="https://research.checkpoint.com/2025/gachiloader-node-js-malware-with-api-tracing/" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<h3 class="wp-block-heading">Social Engineering Exploits</h3>



<p><strong><strong>Convincing LinkedIn Comment‑Reply Tactic Used in New Phishing Campaign</strong> </strong>  <br>A new phishing campaign is flooding LinkedIn posts with fake “reply” comments impersonating LinkedIn, falsely claiming policy violations and urging users to click external links masked with lnkd.in shorteners for added credibility. <br><a href="https://www.bleepingcomputer.com/news/security/convincing-linkedin-comment-reply-tactic-used-in-new-phishing/" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<p><strong>GRU‑Linked BlueDelta Evolves Credential‑Harvesting Tactics</strong> <br>Russia‑linked BlueDelta (APT28) expanded its credential‑harvesting campaigns throughout February–September 2025, targeting Turkish energy and nuclear researchers, a European think tank, and organizations in North Macedonia and Uzbekistan. The group used highly tailored lures, spoofed Microsoft OWA, Google, and Sophos VPN login pages. <br><a href="https://www.recordedfuture.com/research/gru-linked-bluedelta-evolves-credential-harvesting" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<p><strong>North Korean Kimsuky Actors Leverage Malicious QR Codes in Spearphishing (Quishing) Campaigns</strong> <br>A new FBI Cybersecurity Advisory warns that North Korean Kimsuky actors are increasingly using malicious QR codes (“Quishing”) in highly targeted spearphishing campaigns against U.S. think tanks, NGOs, academia, and government‑linked entities. <br><a href="https://www.ic3.gov/CSA/2026/260108.pdf" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<p><strong>DocuSign Impersonation Wave Leveraging Real‑Time LogoKit Customization</strong> <br>Security researchers  identified a growing wave of DocuSign impersonation attacks in which phishing emails mimic authentic DocuSign notifications, spoof sender domains, and address recipients by their login name to increase credibility. <br><a href="https://www.group-ib.com/blog/docusign-impersonation-logokit/" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<p><strong>Access Granted: Phishing With Device Code Authorization Enables Stealthy M365 Account Takeovers</strong> <br>Proofpoint researchers warn that multiple threat clusters—both financially motivated and state‑aligned—are now abusing Microsoft’s OAuth 2.0 device code authorization flow to trick users into granting attackers access to their Microsoft 365 accounts. <br><a href="https://www.proofpoint.com/us/blog/threat-insight/access-granted-phishing-device-code-authorization-account-takeover" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<h3 class="wp-block-heading">AI-Driven Threats</h3>



<p><strong>Inside GoBruteforcer: AI‑Generated Server Defaults, Weak Passwords, and Crypto‑Focused Campaigns</strong> <br>Check Point Research analyzed an evolved GoBruteforcer botnet variant that exploits AI‑generated server deployment examples and legacy stacks like XAMPP, which frequently include predictable default usernames and weak passwords, leaving over 50,000 internet‑facing servers vulnerable. <br><a href="https://research.checkpoint.com/2026/inside-gobruteforcer-ai-generated-server-defaults-weak-passwords-and-crypto-focused-campaigns/" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<p><strong>LLMs &amp; Ransomware: An Operational Accelerator, Not a Revolution</strong> <br>SentinelOne researchers conclude that large language models (LLMs) are accelerating ransomware operations—improving speed, scalability, multilingual phishing, tooling generation, data triage, and negotiation—without fundamentally transforming attacker tactics. <br><a href="https://www.sentinelone.com/labs/llms-ransomware-an-operational-accelerator-not-a-revolution/" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<p><strong>Chrome Extensions Impersonate AI Tools to Steal ChatGPT &amp; DeepSeek Chats</strong> <br>Security researchers report that two malicious Chrome extensions—Chat GPT for Chrome with GPT‑5, Claude Sonnet &amp; DeepSeek AI and AI Sidebar with Deepseek, ChatGPT, Claude and more—accumulated over 900,000 installs while secretly exfiltrating full ChatGPT and DeepSeek conversation data and users’ browsing activity. <br><a href="https://socradar.io/blog/chrome-extensions-steal-chatgpt-deepseek-chats/" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<h3 class="wp-block-heading"><strong>Vulnerabilities Actively Exploited</strong></h3>



<p><strong>Security Advisory: Vulnerability in n8n Versions 1.65–1.120.4</strong> <br>n8n disclosed a critical security vulnerability affecting versions 1.65–1.120.4, specifically in workflows using a Form Submission trigger with file upload and a Form Ending node returning binary data. <br><a href="https://community.n8n.io/t/security-advisory-security-vulnerability-in-n8n-versions-1-65-1-120-4/247305" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<p><strong>Vulnerabilities Resolved in Veeam Backup &amp; Replication 13.0.1.1071 (KB4792)</strong> <br>Veeam’s KB4792 advisory discloses multiple vulnerabilities affecting Veeam Backup &amp; Replication 13.0.1.180 and all earlier v13 builds, all of which were fixed in version 13.0.1.1071. <br><a href="https://www.veeam.com/kb4792" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<p><strong>Critical Security Vulnerability in React Server Components (RSC)</strong> <br>React disclosed CVE‑2025‑55182, a critical unauthenticated remote code execution (RCE) vulnerability (CVSS 10.0) affecting React Server Components, caused by unsafe deserialization of payloads sent to React Server Function endpoints. <br><a href="https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<p><strong>WatchGuard Firebox iked Out‑of‑Bounds Write Vulnerability (WGSA‑2025‑00027)</strong> <br>WatchGuard disclosed WGSA‑2025‑00027, a critical Out‑of‑Bounds Write vulnerability (CVE‑2025‑14733) in the Fireware OS ikedprocess, allowing remote unauthenticated RCE on Firebox appliances. <br><a href="https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00027" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<p><strong>Product Security Advisory &amp; Analysis: Observed Abuse of FG‑IR‑19‑283 (CVE‑2020‑12812)</strong> <br>Fortinet has confirmed active, in‑the‑wild exploitation of the long‑patched FortiGate authentication bypass vulnerability FG‑IR‑19‑283 / CVE‑2020‑12812, originally disclosed in July 2020. <br><a href="https://www.fortinet.com/blog/psirt-blogs/product-security-advisory-and-analysis-observed-abuse-of-fg-ir-19-283" target="_blank" rel="noreferrer noopener">Read more →</a> </p>



<h2 class="wp-block-heading">Recommended Actions</h2>



<h3 class="wp-block-heading">Mitigations</h3>



<ul class="wp-block-list">
<li><strong>Patch all affected systems immediately</strong>, prioritizing critical vulnerabilities in Microsoft Patch Tuesday (8 Critical, 3 Zero‑Days), Adobe products, SAP, Fortinet, and WatchGuard Fireware OS (CVE‑2025‑14733) to prevent remote code execution and active exploitation attempts. </li>



<li><strong>Upgrade or retire Windows 10 endpoints</strong> (end‑of‑support October 14, 2025) or enroll devices in Microsoft&#8217;s ESU program to maintain patch coverage. </li>



<li><strong>Harden identity infrastructure</strong> by enforcing MFA everywhere, disabling vulnerable LDAP/2FA configurations in FortiGate devices, and reviewing OAuth app permissions to defend against device‑code phishing abuses (per Proofpoint research). </li>



<li><strong>Remove malicious or suspicious browser extensions</strong>, especially AI‑related Chrome add-ons impersonating legitimate tools, and enforce extension allowlisting enterprise‑wide to prevent “prompt‑poaching” attacks. </li>



<li><strong>Apply security updates for n8n workflows</strong>, upgrading to version 1.121.0+ to fix the file‑access vulnerability in Form Submission workflows. </li>



<li><strong>Update React applications and frameworks</strong> (Next.js, Parcel/Vite RSC plugins) to patched versions addressing the CVE‑2025‑55182 RCE deserialization flaw. </li>



<li><strong>Ensure Veeam Backup &amp; Replication is updated</strong> to version 13.0.1.1071 to close RCE paths exploitable by Backup/Tape Operators or Backup Admins. </li>



<li><strong>Harden exposed servers and databases</strong> by eliminating default/AI‑generated weak credentials to reduce susceptibility to GoBruteforcer botnet campaigns. </li>
</ul>



<h3 class="wp-block-heading">Monitoring</h3>



<ul class="wp-block-list">
<li><strong>Monitor identity platforms (Azure AD/M365)</strong> for unusual OAuth device‑code authorizations, unexpected app consents, anomalous MFA‑less logins, and session‑token reuse attempts. </li>



<li><strong>Watch for VPN and firewall anomalies,</strong> including FortiGate login attempts using case‑variant usernames (e.g., Jsmith vs jsmith) and WatchGuard Firebox connections to any published Indicators of Attack (IOAs). </li>



<li><strong>Enable alerting for Chrome/Edge extension installations</strong>, especially AI sidebar/chat extensions, and track outbound connections to known attacker C2 domains associated with data‑exfiltrating browser extensions. </li>



<li><strong>Monitor for signs of n8n exploitation</strong>, such as unexpected file reads, unauthorized workflow executions, or abnormal file‑handling behavior in Form Submission workflows. </li>



<li><strong>Continuously monitor internet</strong><strong>‑</strong><strong>facing services</strong> (FTP/MySQL/PostgreSQL/phpMyAdmin) for brute‑force attempts, high‑volume authentication failures, and scanning activity consistent with GoBruteforcer botnet behavior. </li>
</ul>



<h3 class="wp-block-heading">Detection Tips</h3>



<ul class="wp-block-list">
<li><strong>Look for RCE exploitation attempts</strong> targeting WatchGuard Firebox (CVE‑2025‑14733), including unexpected outbound connections to attacker IPs, exfiltration of config files, or rapid creation of gzip archives containing credentials. </li>



<li><strong>Detect device</strong><strong>‑</strong><strong>code phishing chains</strong> by flagging user activity involving login.microsoft.com/devicelogin with suspicious timing, unexpected device codes, or unknown applications requesting access tokens. </li>



<li><strong>Identify malicious browser extensions</strong> by scanning for extensions communicating with domains such as deepaichats[.]com, chatsaigpt[.]com, or suspicious Lovable‑hosted infrastructure used in AI‑chat exfiltration campaigns. </li>



<li><strong>Check for indicators of GoBruteforcer infection</strong>, including newly dropped web shells, outbound IRC beaconing, high‑frequency scanning of public IP space, or processes using default/AI‑generated usernames (e.g., myuser, appuser). </li>



<li><strong>Hunt for React Server Component exploitation</strong> by reviewing server logs for malformed RSC payloads, unexpected POST requests to RSC/Server Function endpoints, or errors related to deserialization. </li>



<li><strong>Inspect n8n logs for anomalous access patterns</strong>, especially unauthorized POST requests to Form Submission endpoints that include unexpected file‑handling fields. </li>
</ul>



<h2 class="wp-block-heading"><strong>About Fortress SRM’s Vigilant Managed Cyber Hygiene Offering</strong>&nbsp;</h2>



<h3 class="wp-block-heading">Why Patching Matters</h3>



<p>Unpatched software is a leading cause of breaches—nearly 1 in 3 attacks exploit known vulnerabilities.&nbsp;</p>



<h3 class="wp-block-heading">Vigilant Managed Cyber Hygiene</h3>



<p> Fortress SRM’s Vigilant Managed Cyber Hygiene simplifies patch management.&nbsp;</p>



<ul class="wp-block-list">
<li>Automated updates with 97%+ success rate for Microsoft &amp; 100+ third-party applications&nbsp;</li>



<li>Critical patches, OS upgrades, and configuration updates for all devices, on/off network&nbsp;</li>



<li>24/7/365 U.S.-based monitoring and real-time reporting for full visibility&nbsp;</li>
</ul>



<h4 class="wp-block-heading">Stay Protected. Stay Proactive. </h4>



<p><a href="https://fortresssrmstg.wpenginepowered.com/managed-security/" target="_blank" rel="noreferrer noopener">Learn how Fortress SRM can enhance your cybersecurity strategy →</a>&nbsp;</p>
<p>The post <a href="https://fortresssrmstg.wpenginepowered.com/threat-and-security-update-january-2026/">Threat and Security Update – January, 2026</a> appeared first on <a href="https://fortresssrmstg.wpenginepowered.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Threat and Security Update – December, 2025</title>
		<link>https://fortresssrmstg.wpenginepowered.com/threat-and-security-update-december-2025/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Thu, 18 Dec 2025 16:04:46 +0000</pubDate>
				<category><![CDATA[Threat & Security Updates]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1806</guid>

					<description><![CDATA[<p>Stay Ahead of Threats with the Latest Vulnerability Updates for December Stay up to date on critical cyber risks, Microsoft’s December Patch Tuesday, and other notable third-party vulnerabilities. Timely patching ...</p>
<p>The post <a href="https://fortresssrmstg.wpenginepowered.com/threat-and-security-update-december-2025/">Threat and Security Update – December, 2025</a> appeared first on <a href="https://fortresssrmstg.wpenginepowered.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading"><br>Stay Ahead of Threats with the Latest Vulnerability Updates for December</h3>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Stay up to date on critical cyber risks, Microsoft’s December Patch Tuesday, and other notable third-party vulnerabilities. Timely patching is key to maintaining a strong security posture and protecting your business from threats. </p>



<h3 class="wp-block-heading">Quick Highlights</h3>



<ul class="wp-block-list">
<li><strong>Microsoft Patch Tuesday:</strong> <br>&#8211; 57 vulnerabilities disclosed <br>&#8211; 3 rated <strong>Critical</strong>, 3 are <strong>Zero-Day</strong> (1 actively exploited) </li>
</ul>



<ul class="wp-block-list">
<li><strong>Adobe Security Updates:</strong> <br>&#8211; 139 vulnerabilities patched across 5 products <br>&#8211; 14 rated <strong>Critical</strong>, affecting Creative Cloud Desktop Application, Acrobat and Reader, DNG Software Development Kit (SDK), Experience Manager, and ColdFusion</li>
</ul>



<ul class="wp-block-list">
<li><strong>High-Severity Advisories from Major Vendors:</strong> <br>&#8211; <strong>Cisco</strong>: 1 critical-severity flaws in React and Next.js Frameworks <br>&#8211; <strong>Fortinet</strong>: 1 critical and 1 high-severity flaws in FortiOS, FortiWeb, FortiProxy, FortiSwitchManager, and FortiSandbox <br>&#8211; <strong>Ivanti</strong>: 1 critical and 3 high-severity flaws in Ivanti Endpoint Manager (EPM) <br>&#8211; <strong>SAP</strong>: 3 critical vulnerabilities in SAP Solution Manager, SAP Commerce Cloud, and SAP jConnect <br>&#8211; <strong>Google: </strong>Fixed 3 security issues, one that is being actively exploited <br>&#8211; <strong>Android: </strong>Fixed<strong> </strong>2 actively exploited zero-days  </li>
</ul>



<ul class="wp-block-list">
<li><strong>Top Threats to Watch:</strong> <br>&#8211; <strong>Fortinet SSO Auth Bypass</strong> – Critical flaws allow attackers to bypass FortiCloud authentication. <br>&#8211; <strong>APT Collaboration</strong> – Gamaredon (Russia) and Lazarus (North Korea) sharing infrastructure. <br>&#8211; <strong>Insider Breach at CrowdStrike</strong> – Employee leaked internal screenshots to hackers. <br>&#8211; <strong>GlassWorm Malware</strong> – Self-propagating worm hiding malicious code in VS Code extensions. <br>&#8211; <strong>Storm-0249 Ransomware Tactics</strong> – Abuse of EDR software for stealthy persistence. <br>&#8211; <strong>Massive Phishing Campaign</strong> – 4,300+ domains targeting hotel guests and vacation planners. <br>&#8211; <strong>AI-Orchestrated Espionage</strong> – Claude AI exploited for autonomous cyber operations. <br>&#8211; <strong>FBI/CISA Alerts</strong> – Account takeover fraud, virtual kidnapping scams, and pro-Russia hacktivist attacks on critical infrastructure. </li>
</ul>



<h2 class="wp-block-heading">Windows 10 Reaches End of Support</h2>



<p>As of <strong>October 14, 2025</strong>, Microsoft has officially ended support for Windows 10. This month’s Patch Tuesday was the <strong>final security update</strong> for the OS—unless your organization enrolls in the <strong>Extended Security Updates (ESU)</strong> program. </p>



<ul class="wp-block-list">
<li><strong>What This Means for Your Organization:</strong> <br>&#8211; No more security patches or bug fixes for Windows 10 devices  <br>&#8211; Increased exposure to vulnerabilities and compliance risks  </li>
</ul>



<ul class="wp-block-list">
<li>Continued support requires either:  <br>&#8211; Enrolling in Microsoft’s <strong>paid ESU program</strong>, or  <br>&#8211; <strong><strong>Upgrading to Windows 11</strong></strong> </li>
</ul>



<p><strong>Need help planning your transition?</strong> <br>Fortress SRM can help assess your environment, prioritize upgrades, and ensure your endpoints remain patch-compliant and secure.</p>



<h2 class="wp-block-heading">Patch Tuesday Summary</h2>



<p><strong>Microsoft December 2025 Patch Tuesday</strong> <br><strong>57</strong> vulnerabilities disclosed, including <strong>3</strong> critical and <strong>3</strong> zero-days. By impact category:</p>



<ul class="wp-block-list">
<li><strong>28</strong> Elevation of Privilege </li>



<li><strong>19</strong> Remote Code Execution </li>



<li><strong>4</strong> Information Disclosure </li>



<li><strong>3</strong> Denial of Service  </li>



<li><strong>3</strong> Spoofing </li>
</ul>



<h2 class="wp-block-heading">Critical Common Vulnerabilities and Exposures (CVEs)</h2>



<h3 class="wp-block-heading">Windows Zero-Days</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Details</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62221" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-62221</strong></a><strong></strong>&nbsp;</td><td><strong>Elevation&nbsp;of Privilege Flaw in Windows Cloud Files Mini Filter Driver&nbsp;which&nbsp;can&nbsp;be&nbsp;used&nbsp;to&nbsp;gain SYSTEM&nbsp;privileges</strong>&nbsp;</td><td><strong>Important</strong>&nbsp;</td><td><strong>Yes</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64671" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-64671</strong></a><strong></strong>&nbsp;</td><td><strong>Remote Code Execution Vulnerability&nbsp;in GitHub Copilot for&nbsp;Jetbrains&nbsp;which can allow an attack to execute commands locally</strong>&nbsp;</td><td><strong>Important</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54100" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-54100</strong></a><strong></strong>&nbsp;</td><td><strong>Remote Code Execution Vulnerability&nbsp;in PowerShell which could allow embedded scripts to be executed if the webpage is fetched using Invoke-WebRequest</strong>&nbsp;</td><td><strong>Important</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<h3 class="wp-block-heading">Other Critical CVE&#8217;s Worth Mentioning</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Details</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62554" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-62554</strong></a><strong></strong>&nbsp;</td><td><strong>Microsoft Office Remote Code Execution Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62557" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-62557</strong></a><strong></strong>&nbsp;</td><td><strong>Microsoft Office Remote Code Execution Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62562" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-62562</strong></a><strong></strong>&nbsp;</td><td><strong>Microsoft Outlook Remote Code Execution Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://msrc.microsoft.com/update-guide/releaseNote/2025-Dec" target="_blank" rel="noreferrer noopener"><em>Microsoft December 2025 Security Update Release</em></a><em> </em></p>



<h3 class="wp-block-heading">3rd Party Critical CVE&#8217;s Worth Mentioning</h3>



<h4 class="wp-block-heading">Adobe Products *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Affected&nbsp;Product</strong>&nbsp;</td><td><strong>Critical Issues</strong>&nbsp;</td><td><strong>Key Risks</strong>&nbsp;</td></tr><tr><td><a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61808</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61809</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61830</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61810</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61811</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61812</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61813</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61821</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61822</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61823</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64897</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-105.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64898</strong></a><strong></strong>&nbsp;</td><td><strong>Adobe Cold Fusion</strong>&nbsp;</td><td><strong>7</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;<strong>Security feature bypass</strong>&nbsp;<strong>Arbitrary file system read/write</strong>&nbsp;<strong>Privilege&nbsp;escalation</strong>&nbsp;<strong></strong>&nbsp;</td></tr><tr><td><a href="https://helpx.adobe.com/security/products/experience-manager/apsb25-115.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64537</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/experience-manager/apsb25-115.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64539</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/experience-manager/apsb25-115.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>Full List-&gt;</strong></a><strong></strong>&nbsp;</td><td><strong>Adobe Experience Manager</strong>&nbsp;</td><td><strong>2</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;<strong>Privilege escalation</strong>&nbsp;</td></tr><tr><td><a href="https://helpx.adobe.com/security/products/dng-sdk/apsb25-118.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64783</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/dng-sdk/apsb25-118.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64784</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/dng-sdk/apsb25-118.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64893</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/dng-sdk/apsb25-118.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64894</strong></a><strong></strong>&nbsp;<strong></strong>&nbsp;</td><td><strong>Adobe DNG SDK</strong>&nbsp;</td><td><strong>3</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;<strong>Memory exposure</strong>&nbsp;<strong>Application denial-of-service</strong>&nbsp;</td></tr><tr><td><a href="https://helpx.adobe.com/security/products/acrobat/apsb25-119.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64785</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/acrobat/apsb25-119.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64899</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/acrobat/apsb25-119.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64786</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/acrobat/apsb25-119.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64787</strong></a><strong></strong>&nbsp;</td><td><strong>Adobe Acrobat Reader</strong>&nbsp;</td><td><strong>2</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;<strong>Security feature bypass</strong>&nbsp;</td></tr><tr><td><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/creative-cloud/apsb25-120.html" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-64896</strong></a><strong></strong>&nbsp;</td><td><strong>Adobe Creative Cloud Desktop</strong>&nbsp;</td><td><strong>0</strong>&nbsp;</td><td><strong>Application denial-of-service</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://helpx.adobe.com/security/security-bulletin.html" target="_blank" rel="noreferrer noopener"><em>Adobe Security Bulletins</em></a></p>



<h4 class="wp-block-heading">Cisco *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Affected Product</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-react-flight-TYw32Ddb" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-55182</strong></a><strong></strong>&nbsp;</td><td><strong>React and Next.js Frameworks</strong>&nbsp;</td><td><strong>React server that could allow an unauthenticated, remote attacker to perform remote code execution on an affected device or system.</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://sec.cloudapps.cisco.com/security/center/publicationListing.x" target="_blank" rel="noreferrer noopener"><em>Cisco Security Advisories</em></a></p>



<h4 class="wp-block-heading">Fortinet *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Affected Product</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://www.fortiguard.com/psirt/FG-IR-25-647" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59718 CVE-2025-59719</strong></a><strong></strong>&nbsp;</td><td><strong>FortiOS,&nbsp;FortiWeb,&nbsp;FortiProxy&nbsp;and&nbsp;FortiSwitchManager</strong>&nbsp;</td><td><strong>Vulnerability&nbsp;allows&nbsp;anunauthenticated attacker to bypass the&nbsp;FortiCloud&nbsp;SSO&nbsp;login&nbsp;via a crafted SAML message.</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>Yes</strong>&nbsp;</td></tr><tr><td><a href="https://www.fortiguard.com/psirt/FG-IR-25-479" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-53949</strong></a><strong></strong>&nbsp;</td><td><strong>FortiSandbox</strong>&nbsp;</td><td><strong>Vulnerability&nbsp;allows&nbsp;an authenticated attacker to execute unauthorized code on the underlying system via crafted HTTP requests.</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://www.fortiguard.com/psirt" target="_blank" rel="noreferrer noopener"><em>Fortinet PSIRT Advisories</em></a></p>



<h4 class="wp-block-heading">Ivanti *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Affected Product</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://forums.ivanti.com/s/article/Security-Advisory-EPM-December-2025-for-EPM-2024?language=en_US" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-10573</strong></a><strong>&nbsp;</strong>&nbsp;</td><td><strong>Ivanti Endpoint Manager (EPM)</strong>&nbsp;</td><td><strong>Vulnerabilityallows&nbsp;a&nbsp;remote unauthenticated attacker to execute arbitrary JavaScript in the context of an administrator session.</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://forums.ivanti.com/s/article/Security-Advisory-EPM-December-2025-for-EPM-2024?language=en_US" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-13659</strong></a><strong></strong>&nbsp;</td><td><strong>Ivanti Endpoint Manager (EPM)</strong>&nbsp;</td><td><strong>Vulnerabilityallows&nbsp;a&nbsp;remote, unauthenticated attacker to write arbitrary files on the server, potentially leading to remote code execution.</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://forums.ivanti.com/s/article/Security-Advisory-EPM-December-2025-for-EPM-2024?language=en_US" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-13661</strong></a><strong></strong>&nbsp;</td><td><strong>Ivanti Endpoint Manager (EPM)</strong>&nbsp;</td><td><strong>Vulnerabilityallows&nbsp;a&nbsp;remote authenticated attacker to write arbitrary files outside of the intended directory.</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://forums.ivanti.com/s/article/Security-Advisory-EPM-December-2025-for-EPM-2024?language=en_US" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-13662</strong></a><strong></strong>&nbsp;</td><td><strong>Ivanti Endpoint Manager (EPM)</strong>&nbsp;</td><td><strong>Vulnerabilityallows&nbsp;a remote&nbsp;unauthenticatedattacker to execute arbitrary code.</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://www.ivanti.com/blog/december-2025-security-update" target="_blank" rel="noreferrer noopener"><em>Ivanti December 2025 Security Update</em></a></p>



<h4 class="wp-block-heading">SAP *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Affected Component</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42880" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42880</strong></a><strong></strong>&nbsp;</td><td><strong>SAP Solution Manager</strong>&nbsp;</td><td><strong>Allows an authenticated attacker to insert malicious code when calling a remote-enabled function module.</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-55754" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-55754</strong></a><strong></strong>&nbsp;</td><td><strong>SAP Commerce Cloud</strong>&nbsp;</td><td><strong>Console manipulation via escape sequences in log messages</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42928" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42928</strong></a><strong></strong>&nbsp;</td><td><strong>SAP&nbsp;jConnect&nbsp;&#8211; SDK for ASE</strong>&nbsp;</td><td><strong>High privileged&nbsp;user&nbsp;could exploit a deserialization vulnerability in SAP&nbsp;jConnect&nbsp;to launch remote code execution.</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42878" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42878</strong></a><strong></strong>&nbsp;</td><td><strong>SAP Web Dispatcher and Internet Communication Manager (ICM)</strong>&nbsp;</td><td><strong>Unauthenticated attackers could exploit them to access diagnostics, send crafted requests, or disrupt services.</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42874" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42874</strong></a><strong></strong>&nbsp;</td><td><strong>SAP NetWeaver</strong>&nbsp;</td><td><strong>Allows an attacker with network access and high privileges to execute arbitrary code on the affected system due to insufficient input validation and improper handling of remote method calls.</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-48976" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-48976</strong></a><strong></strong>&nbsp;</td><td><strong>SAP Business Objects</strong>&nbsp;</td><td><strong>DoS vulnerability</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42877" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42877</strong></a><strong></strong>&nbsp;</td><td><strong>SAP Web Dispatcher, Internet Communication Manager and SAP Content Server</strong>&nbsp;</td><td><strong>Allow an unauthenticated user to exploit logical errors that lead to&nbsp;a memorycorruption vulnerability.</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42876" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42876</strong></a><strong></strong>&nbsp;</td><td><strong>SAP S/4 HANA Private Cloud</strong>&nbsp;</td><td><strong>An authenticated attacker with authorization limited to a single company code could read sensitive data and post or&nbsp;modifydocuments across all company codes.</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://support.sap.com/en/my-support/knowledge-base/security-notes-news/october-2025.html" target="_blank" rel="noreferrer noopener"><em>SAP December 2025 Security Notes</em></a></p>



<h3 class="wp-block-heading">Android</h3>



<ul class="wp-block-list">
<li><strong>Release Date:</strong> Friday, December 5, 2025  </li>



<li><strong>Key Fixes:</strong> 2 actively exploited zero-days, CVE-2025-48633 and CVE-2025-48572 involving information disclosure and elevation of privilege. </li>
</ul>



<p><a href="https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop_17.html" target="_blank" rel="noreferrer noopener"><em><a href="https://source.android.com/docs/security/bulletin/2025-12-01" target="_blank" rel="noreferrer noopener"><em>Android Security Bulletin</em></a></em></a> </p>



<h3 class="wp-block-heading">Google Chrome</h3>



<ul class="wp-block-list">
<li><strong>Version:</strong> 143.0.7499.109/.110 (Windows and Mac), 143.0.7499.109 (Linux) </li>



<li><strong>Release Date:</strong> Wednesday, December 10, 2025 </li>



<li><strong>Key Fixes:</strong> CVE-2025-14372, CVE-2025-14373, and 1 high severity actively exploited not currently classified. </li>
</ul>



<p><a href="https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html" target="_blank" rel="noreferrer noopener"><em>Chrome Release Notes</em></a></p>



<p><em>* Not handled by Fortress SRM.</em>&nbsp;</p>



<h2 class="wp-block-heading">Threat Intelligence Trends – December 2025</h2>



<p>The following resources are grouped by threat type / category.&nbsp;</p>



<h3 class="wp-block-heading">Emerging Threats</h3>



<p><strong><strong>Fortinet warns of critical FortiCloud SSO login auth bypass flaws</strong> </strong> <br>Fortinet has released security updates to address two critical vulnerabilities in FortiOS, FortiWeb, FortiProxy, and FortiSwitchManager that could allow attackers to bypass FortiCloud SSO authentication. <a href="https://www.bleepingcomputer.com/news/security/fortinet-warns-of-critical-forticloud-sso-login-auth-bypass-flaws/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em>  </p>



<p><strong>Alliances of convenience: How APTs are beginning to work together</strong> <br>New evidence uncovered suggests that two of the world’s most aggressive advanced persistent threat (APT) actors, Russia-aligned Gamaredon and North Korea’s Lazarus, may be operating on shared infrastructure. <a href="https://www.gendigital.com/blog/insights/research/apt-cyber-alliances-2025" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<p><strong>CrowdStrike Catches Insider Feeding Information to Hackers</strong> <br>American cybersecurity firm CrowdStrike has confirmed that an insider shared screenshots taken on internal systems with hackers after they were leaked on Telegram by the Scattered Lapsus$ Hunters threat actors. <a href="https://www.bleepingcomputer.com/news/security/crowdstrike-catches-insider-feeding-information-to-hackers/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<h3 class="wp-block-heading">Ransomware &amp; Malware Deployment</h3>



<p><strong>GlassWorm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace</strong> <br>GlassWorm malware targeting VS Code extensions on OpenVSX marketplace, using invisible Unicode characters that hides malicious intent in code editors. <a href="https://www.koi.ai/blog/glassworm-first-self-propagating-worm-using-invisible-code-hits-openvsx-marketplace" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<p><strong><strong>Storm-0249 Hijacks EDR Software for Ransomware Staging</strong> </strong> <br>Financially motivated initial access broker (IAB) @Storm-0249 has shifted from using broad phishing to stealthier methods of initial access and establishing persistence. To achieve this, the IAB abused trusted endpoint detection and response (EDR) processes. <a href="https://reliaquest.com/blog/threat-spotlight-storm-0249-precision-endpoint-exploitation/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<h3 class="wp-block-heading">Social Engineering Exploits</h3>



<p><strong>Thousands of Domains Target Hotel Guests in Massive Phishing Campaign</strong>  <br>A Russian-speaking threat actor operating an ongoing, mass phishing campaign targeting people who might be planning (or about to leave for) a vacation has registered more than 4,300 domain names used in the attacks since the beginning of the year. <a href="https://www.netcraft.com/blog/thousands-of-domains-target-hotel-guests-in-massive-phishing-campaign" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<h3 class="wp-block-heading">AI-Driven Threats</h3>



<p><strong>Claude AI Abused in AI-orchestrated Cyber Espionage Campaign</strong> <br>This campaign demonstrated unprecedented integration and autonomy of AI throughout the attack lifecycle, with the threat actor manipulating Claude Code to support reconnaissance, vulnerability discovery, exploitation, lateral movement, credential harvesting, data analysis, and exfiltration operations largely autonomously. <em><a href="https://assets.anthropic.com/m/ec212e6566a0d47/original/Disrupting-the-first-reported-AI-orchestrated-cyber-espionage-campaign.pdf" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </em> </p>



<h3 class="wp-block-heading"><strong>FBI/CISA Advisories</strong></h3>



<p><strong>Account Takeover Fraud via Impersonation of Financial Institution Support</strong> <br>The FBI warns of cyber criminals impersonating financial institutions to steal money or information in Account Takeover (ATO) fraud schemes. <a href="https://www.ic3.gov/PSA/2025/PSA251125" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<p><strong>Criminals Using Altered Proof-of-Life Media to Extort Victims in Virtual Kidnapping for Ransom Scams</strong> <br>The FBI warns the public about criminals altering photos found on social media or other publicly available sites to use as fake proof of life photos in virtual kidnapping for ransom scams. <a href="https://www.ic3.gov/PSA/2025/PSA251205" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> <em> </em></p>



<p><strong>Title</strong> <strong>Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure</strong> <br>The FBI, CISA, NSA, and partners release a joint advisory on Russian hacktivists targeting critical infrastructure with less sophisticated, lower impact attacks via VNC connections. <a href="https://www.ic3.gov/CSA/2025/251209.pdf" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<h2 class="wp-block-heading">Recommended Actions</h2>



<h3 class="wp-block-heading">Mitigations</h3>



<ul class="wp-block-list">
<li>Apply Microsoft December Patch Tuesday updates immediately, prioritizing critical and zero-day vulnerabilities. </li>



<li>Patch Adobe, Cisco, Fortinet, Ivanti, and SAP products to address critical flaws and prevent exploitation. </li>



<li>Upgrade or enroll in Extended Security Updates (ESU) for Windows 10 devices to maintain compliance and reduce risk. </li>



<li>Implement least privilege access and enforce MFA to reduce insider threat impact. </li>



<li>Harden EDR configurations and validate integrity to prevent abuse by ransomware actors. </li>
</ul>



<h3 class="wp-block-heading">Monitoring</h3>



<ul class="wp-block-list">
<li>Monitor for FortiCloud SSO authentication bypass attempts and unusual login patterns. </li>



<li>Track APT-related infrastructure indicators (Gamaredon, Lazarus) and insider activity anomalies. </li>



<li>Watch for GlassWorm indicators in VS Code extensions and OpenVSX marketplace downloads. </li>



<li>Monitor DNS and web traffic for phishing domains targeting travel/hospitality. </li>



<li>Observe AI-related activity for signs of automated reconnaissance or exploitation. </li>
</ul>



<h3 class="wp-block-heading">Detection Tips</h3>



<ul class="wp-block-list">
<li>Deploy rules to detect Unicode-based obfuscation in code repositories (GlassWorm). </li>



<li>Alert on unexpected EDR process manipulation or persistence techniques (Storm-0249). </li>



<li>Flag large-scale domain registrations and suspicious email campaigns linked to phishing. </li>



<li>Detect anomalous API calls or privilege escalations in Fortinet, Ivanti, and SAP environments. </li>



<li>Use behavioral analytics to identify AI-driven attack patterns and insider data exfiltration. </li>
</ul>



<h2 class="wp-block-heading"><strong>About Fortress SRM’s Vigilant Managed Cyber Hygiene Offering</strong>&nbsp;</h2>



<h3 class="wp-block-heading">Why Patching Matters</h3>



<p>Unpatched software is a leading cause of breaches—nearly 1 in 3 attacks exploit known vulnerabilities.&nbsp;</p>



<h3 class="wp-block-heading">Vigilant Managed Cyber Hygiene</h3>



<p> Fortress SRM’s Vigilant Managed Cyber Hygiene simplifies patch management.&nbsp;</p>



<ul class="wp-block-list">
<li>Automated updates with 97%+ success rate for Microsoft &amp; 100+ third-party applications&nbsp;</li>



<li>Critical patches, OS upgrades, and configuration updates for all devices, on/off network&nbsp;</li>



<li>24/7/365 U.S.-based monitoring and real-time reporting for full visibility&nbsp;</li>
</ul>



<h4 class="wp-block-heading">Stay Protected. Stay Proactive. </h4>



<p><a href="https://fortresssrmstg.wpenginepowered.com/managed-security/" target="_blank" rel="noreferrer noopener">Learn how Fortress SRM can enhance your cybersecurity strategy →</a>&nbsp;</p>
<p>The post <a href="https://fortresssrmstg.wpenginepowered.com/threat-and-security-update-december-2025/">Threat and Security Update – December, 2025</a> appeared first on <a href="https://fortresssrmstg.wpenginepowered.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Oops, Azure Did It Again: 5 Risks You Can&#8217;t Ignore</title>
		<link>https://fortresssrmstg.wpenginepowered.com/oops-azure-did-it-again-5-risks-you-cant-ignore/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Mon, 24 Nov 2025 16:41:54 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1797</guid>

					<description><![CDATA[<p>Written by: Donovan Crowley, Fortress SRM Director of Security Strategy Cloud environments aren’t just that “data center in the sky” anymore. They have become the backbone of modern enterprise IT. And ...</p>
<p>The post <a href="https://fortresssrmstg.wpenginepowered.com/oops-azure-did-it-again-5-risks-you-cant-ignore/">Oops, Azure Did It Again: 5 Risks You Can&#8217;t Ignore</a> appeared first on <a href="https://fortresssrmstg.wpenginepowered.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wp-block-post-date"><time datetime="2025-11-24T11:41:54-05:00">November 24, 2025</time></div>


<p><strong>Written by:</strong> Donovan Crowley, Fortress SRM Director of Security Strategy</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Cloud environments aren’t just that “data center in the sky” anymore. They have become the backbone of modern enterprise IT. And with hybrid and multi-cloud setups becoming the norm, Microsoft Azure is often at the center, powering it all.&nbsp;</p>



<p>But here’s the catch: with great flexibility comes great complexity… and where there’s complexity, there’s risk.&nbsp;</p>



<p>Azure’s power lies in its configurability, but that same flexibility makes misconfigurations easy to create and hard to spot. In fact, misconfigurations remain one of the leading causes of cloud breaches today, far more common than flashy exploits or headline-grabbing vulnerabilities.&nbsp;</p>



<p>Across our assessments and incident response cases, we see the same pattern: a small configuration slip, seemingly harmless, quietly escalates into serious exposure. And often, it happens without generating a single alert.&nbsp;</p>



<p>Some of the most overlooked risks we see again and again include:&nbsp;</p>



<ul class="wp-block-list">
<li>Overly permissive access rules that expose private workloads.&nbsp;</li>



<li>Local or legacy accounts bypassing MFA or Conditional Access.&nbsp;</li>



<li>Dormant identities and unused resources creating governance blind spots.&nbsp;</li>



<li>Misconfigured or missing logs that hinder threat detection.&nbsp;</li>



<li>Persistent admin privileges without PIM or just-in-time controls.&nbsp;</li>
</ul>



<p>Alone, these issues might not look like much. But in a fast-moving cloud environment, they stack up. And attackers love that hidden surface, auditors find it fast, and defenders usually spot it too late.&nbsp;</p>



<p>In this post, we’ll break down the top five Azure misconfigurations we see in the wild, why even experienced teams miss them, and how a focused Cloud Security Posture Management (CSPM) assessment can help you fix them quickly.&nbsp;</p>



<h2 class="wp-block-heading">Top 5 Azure Misconfigurations Putting You At Risk</h2>



<p>Azure makes it easy to move fast. You can deploy an entire workload in minutes, integrate it, and scale instantly. But that speed also means you can misconfigure it just as quickly.&nbsp;</p>



<p>Cloud environments never sit still. New resources spin up, identity assignments change, and hidden dependencies. As a result, the same core misconfigurations show up in almost every assessment we run, whether the organization is a small startup or a Fortune 100 enterprise.&nbsp;</p>



<p>Here are the top five issues you cannot afford to ignore.&nbsp;&nbsp;</p>



<h3 class="wp-block-heading">1. NSGs and RBAC Gone Wild: The Danger of Overly Permissive Permissions</h3>



<p><em>Too much access + too many privileges = your biggest Azure attack surface.&nbsp;&nbsp;</em></p>



<h4 class="wp-block-heading"><strong>What to Watch For (Common Symptoms)</strong></h4>



<ul class="wp-block-list">
<li>Open inbound Network Security Group (NSG) rules that allow traffic from 0.0.0.0/0, especially for RDP (port 3389) and SSH (port 22).&nbsp;</li>



<li>Excessive RBAC role assignments, where users or groups are given broad roles (e.g., Owner or Contributor) where specific, granular functional roles should be used (e.g., Reader, Virtual Machine Contributor, etc.).&nbsp;</li>



<li>“Temporary” or convenience-driven configuration access that never gets removed.</li>
</ul>



<h4 class="wp-block-heading">Why It Matters</h4>



<p>Exposed ports are top targets for brute-force and credential-stuffing attacks. Overprivileged accounts turn a minor breach into a major one. Regulatory frameworks like CIS, ISO, and NIST flag this as high-right.&nbsp;&nbsp;</p>



<h5 class="wp-block-heading">What to Check Right Now</h5>



<p>1.) <strong>Do any NSGs allow unrestricted inbound access?</strong>&nbsp;<br>2.) <strong>Do you have more than a handful of Owner/Contributor assignments?</strong>&nbsp;<br>3.) <strong>Are administrative ports directly exposed to the internet?</strong>&nbsp;</p>



<h4 class="wp-block-heading">Recommended Fixes</h4>



<p><strong>NSG Hardening</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Restrict inbound access to known IP ranges only. Use IP whitelisting for administrative protocols.</li>



<li>Remove public exposure entirely where possible and use Azure Bastion for secure admin access.&nbsp;</li>



<li>Use Azure site-to-site or point-to-point VPN to your work site or static remote sites instead of public access for resource management.&nbsp;</li>



<li>Enforce network hygiene and compliance with Azure Policy, including:&nbsp;<br>&#8211; <em>Deny Public Inbound Ports</em>&nbsp;<br>&#8211; <em>Deny Internet Facing NSG Rules</em>&nbsp;</li>
</ul>



<p><strong>RBAC Hardening</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Adopt a least-privilege roles only model.</li>



<li>Favor granular roles such as:&nbsp;<br>&#8211; Virtual Machine Contributor&nbsp;<br>&#8211; Storage Blob Data Reader&nbsp;<br>&#8211; Key Vault Reader&nbsp;</li>



<li>Audit role assignments for overprivilege regularly. Example:<br><code>az role assignment list --all --query "[?</code><br><code>roleDefinitionName=='Owner'].[principalName,scope]"</code></li>



<li>Schedule recurring RBAC and NSG reviews with resource owners and identity teams.</li>
</ul>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Pro Tip: Automate the Safety Net</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<p>To scale risk detection and remediation:&nbsp;</p>



<ul class="wp-block-list">
<li>Use Azure Defender for Cloud and your SIEM to alert on risky NSG or RBAC configurations.&nbsp;</li>



<li>Enable Just-in-Time VM Access via Defender to reduce inbound port exposure during operational windows.&nbsp;</li>
</ul>



<h3 class="wp-block-heading">2. Local Admin Accounts That Won’t Quit: The Risk of Skipping Entra ID (Azure AD) Authentication&nbsp;</h3>



<p><em>Local accounts are like leftover sushi: they might look fine, but they’re a hazard.&nbsp;</em>&nbsp;</p>



<h4 class="wp-block-heading"><strong style="white-space: normal;">What to Watch For (Common Symptoms)</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<ul class="wp-block-list">
<li>VMs or workloads accessed via local admin accounts, often shared informally among teams.&nbsp;</li>



<li>Applications or automation authenticate with static credentials embedded in code or stored insecurely.&nbsp;</li>



<li>Service accounts operating without lifecycle control, MFA, or logging.&nbsp;</li>
</ul>



<p>These shortcuts may speed things up, but they bypass every layer of modern identity security.&nbsp;</p>



<h4 class="wp-block-heading">Why It Matters</h4>



<p>Attackers love static secrets, and local accounts bypass modern identity controls. Entra ID bypass = no MFA, no audit trail, and a giant gap in zero-trust.&nbsp;&nbsp;</p>



<h5 class="wp-block-heading">What to Check Right Now</h5>



<p>1.) <strong>Are any VMs or workloads still using local admin accounts?</strong>&nbsp;<br>2.) <strong>Do any apps or scripts rely on embedded secrets?</strong>&nbsp;<br>3.) <strong>Are service accounts operating without logging or lifecycle management?</strong>&nbsp;</p>



<h4 class="wp-block-heading">Recommended Fixes</h4>



<p><strong>Enforce Entra ID Authentication First:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Enable Azure AD login for all VMs to centralize authentication and logging.&nbsp;</li>



<li>For Windows VMs, use Azure AD joined or Hybrid Join with AADLoginForWindows VM extension.&nbsp;</li>
</ul>



<p><strong>Replace Secrets with Managed Identities:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Use System-assigned or User-assigned Managed Identities for Azure resources to access other services securely.&nbsp;</li>



<li>Eliminate secrets stored in code, environment variables, or key vaults.&nbsp;</li>
</ul>



<p><strong>Secure Administrative Access&nbsp;</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Disable direct local admin access wherever possible.&nbsp;</li>



<li>Leverage Azure Bastion or Just-in-Time (JIT) VM Access for secure admin connections.&nbsp;</li>



<li>Enforce session expiry, logging, and MFA via Privileged Identity Management (PIM) or conditional access.&nbsp;</li>
</ul>



<p><strong>Audit and Cleanup Local Admin Accounts:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Inventory all local admin accounts across VM fleets. Use PowerShell or CLI to enumerate accounts:<br><code>Get-LocalGroupMember -Group "Administrators"</code></li>



<li>Regularly rotate or remove local accounts not tied to valid operational workflows.&nbsp;</li>



<li>Schedule recurring reviews to prevent “set-and-forget&#8221; accounts.&nbsp;&nbsp;</li>
</ul>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Pro Tip: Continuous Detection</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<ul class="wp-block-list">
<li>Use tools like <strong>Microsoft Defender for Cloud</strong> and <strong>Microsoft Entra ID Identity Protection</strong> for continuous detection of anomalous sign-in behavior.&nbsp;</li>



<li>Focus on accounts that haven’t yet been migrated to Entra ID.&nbsp;&nbsp;</li>
</ul>



<h3 class="wp-block-heading">3. Stale Resources and Identity Sprawl: Why Azure Cleanup Can&#8217;t Wait</h3>



<p><em>Old VMs, unused accounts, orphaned disks&#8230; clutter isn’t just messy, it’s also super risky.&nbsp;</em>&nbsp;</p>



<h4 class="wp-block-heading"><strong>What to Watch For (Common Symptoms)</strong>&nbsp;</h4>



<ul class="wp-block-list">
<li>Dormant service principals, legacy user accounts, or invalid Entra ID credentials left active.&nbsp;</li>



<li>Stopped or orphaned VMs, unattached disks, and retired resource groups still incurring cost or creating risk.&nbsp;</li>



<li>Resource sprawl caused by ad hoc deployments without naming standards, tagging, or lifecycle policies.&nbsp;</li>
</ul>



<p>Even well-managed environments accumulate this kind of “cloud waste” and unmanaged sprawl without guardrails. Not only does this create hidden risk, but it also makes audits, costs analysis, and compliance much harder than they need to be.&nbsp;&nbsp;</p>



<h4 class="wp-block-heading">Why It Matters</h4>



<p>Dormant assets = unmonitored attack surface. Plus, they inflate costs and complicate audits.&nbsp;&nbsp;</p>



<h5 class="wp-block-heading">What to Check Right Now</h5>



<p>1.) <strong>Any identities or service principals not used in 90+ days?</strong>&nbsp;<br>2.) <strong>Stopped or deallocated VMs, unattached disks, or idle load balancers?</strong>&nbsp;<br>3.) <strong>Resources missing tags or lifecycle policies?</strong>&nbsp;</p>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Recommended Fixes</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<p><strong>Audit Entra ID Objects:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Scan Entra ID users, groups, and service principals for inactivity:<br><code>(MSOL module deprecated in April): Get-<br>EntraInactiveSignInUser -LastSignInBeforeDaysAgo 90 -All</code></li>



<li>Remove or disable any identities not used in the past 90 days.&nbsp;</li>



<li>Rotate shared or service account credentials regularly.&nbsp;</li>
</ul>



<p><strong>Identify Stale Azure Resources:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Use Azure Advisor and Cost Management to detect unused resources.&nbsp;</li>



<li>Enable Azure Resource Graph Explorer to query at scale across subscriptions:&nbsp;<br><code>resources<br>| where type == 'microsoft.compute/virtualmachines'<br>| extend powerState = tostring(properties.extended.instanceView.powerState.displayStatus)&nbsp;<br>| where powerState == 'VM deallocated' or powerState == 'VM stopped'&nbsp;<br>| project name, resourceGroup, powerState, location&nbsp;<br>| order by name asc&nbsp;</code></li>
</ul>



<p><strong>Apply Naming, Tagging, and Lifecycle Standards:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Adopt consistent resource naming conventions and tagging requirements for ownership, environment, and expiration.&nbsp;</li>



<li>Automate tagging via deployment pipelines or Azure Policy for consistency.&nbsp;</li>
</ul>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Pro Tip: Automate Cleanup</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<ul class="wp-block-list">
<li>Build recurring workflows with Azure Automation runbooks or Logic Apps.</li>



<li>Flag inactive objects and notify resources owners before automatic removal.</li>
</ul>



<h3 class="wp-block-heading">4. Missing Logs = Blind Security: Missing Log Configuration on Azure Resources</h3>



<p><em>No logs = no visibility. Without proper logging, breaches, misconfigurations, or insider activity can fly under the radar.&nbsp;</em>&nbsp;</p>



<p>Logging is the backbone of cloud observability and security. Yet, in many Azure environments, critical resources are provisioned without proper diagnostic settings, leaving teams without visibility into performance, access, or potential compromise.&nbsp;</p>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Common Symptoms</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<ul class="wp-block-list">
<li>Resources like Virtual Machines, Storage Accounts, Key Vaults, Databases, and App Services do not have diagnostic logs enabled.&nbsp;</li>



<li>Logs aren’t routed to a central Log Analytics Workspace (LAW), SIEM, or secure storage.&nbsp;</li>



<li>Inconsistent or absent log retention policies across teams or subscriptions.&nbsp;&nbsp;</li>
</ul>



<p>Without logs, security teams operate blind, and incidents may only be discovered after significant damage.&nbsp;&nbsp;</p>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Why It Matters</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<p>Logs are the foundation of detection, investigation, and compliance. Without them, you’re flying blind.&nbsp;&nbsp;</p>



<h5 class="wp-block-heading">What to Check Right Now</h5>



<p>1.) <strong>Are all critical resources logging to a central destination?</strong>&nbsp;<br>2.) <strong>Are retention policies consistent and compliant?</strong>&nbsp;<br>3.) <strong>Are diagnostic settings deployed at scale for all subscriptions and management groups?</strong>&nbsp;</p>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Recommended Fixes</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<p><strong>Enforce Diagnostic Settings at Scale</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Use built-in Azure Policies to automatically audit and deploy diagnostics, such as:&nbsp;<br>&#8211; Audit Diagnostic Settings&nbsp;<br>&#8211; Deploy Diagnostic Settings for Key Vault&nbsp;<br>&#8211; Audit VMs without Monitoring Agent&nbsp;</li>



<li>Assign these policies at management group or subscription level for wide coverage.&nbsp;</li>
</ul>



<p><strong>Confirm Logging Across Resource Types</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>List diagnostic settings for resource groups or resource types using the CLI:<br>&nbsp;<br>az monitor diagnostic-settings list &#8211;resource-group &lt;resource-group-name&gt;&nbsp;<br></li>



<li>Identify gaps and generate a remediation plan based on priority.&nbsp;</li>
</ul>



<p><strong>Centralize Log Routing and Retention</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Forward logs to:&nbsp;<br>&#8211; A Log Analytics Workspace (LAW) for structured queries and alerts&nbsp;<br>&#8211; A SIEM platform (e.g., Microsoft Sentinel, Elastic, SentinelOne Singularity) for threat detection&nbsp;<br>&#8211; Or secure storage with immutable retention policies for compliance&nbsp;</li>
</ul>



<p><strong>Enable Additional Monitoring Signals</strong>&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Activity Logs: </strong>Track control-plane activity and administrative actions.&nbsp;</li>



<li><strong>VMInsights:</strong> Provide rich OS-level visibility for virtual machines.&nbsp;</li>



<li><strong>Defender for Cloud logs:</strong> Monitor workload-level vulnerability and threat detection.&nbsp;</li>
</ul>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Pro Tip: Continuous Coverage</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<ul class="wp-block-list">
<li>Build a “Log Coverage Report” with Azure Monitor Workbooks or custom Resource Graph queries.&nbsp;&nbsp;</li>



<li>Use this to continuously assess and visualize log gaps across all assets in your tenant.&nbsp;</li>
</ul>



<h3 class="wp-block-heading">5. Azure Admins Without PIM or Role Controls: A Ticking Time Bomb</h3>



<p><em>Without Just-in-Time (JIT) and Privileged Identity Management (PIM), a single compromised admin can put your entire environment at risk.</em>&nbsp;</p>



<h4 class="wp-block-heading"><strong style="white-space: normal;">What to Watch For (Common Symptoms)</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<ul class="wp-block-list">
<li>High-privilege roles (Global Admin, User Access Administrator, Owner) assigned permanently to user accounts or groups.&nbsp;</li>



<li>No guardrails in place for role assignment, expiration, or user justification.&nbsp;</li>



<li>Lack of auditing or monitoring on administrative role usage.&nbsp;</li>
</ul>



<p>Permanent admin assignments create a latent breach vector. Attackers are big fans of accounts that never expire.&nbsp;</p>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Why It Matters</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<p>Violates least privilege and zero trust. Attackers actively target standing admin roles to move laterally. Compliance frameworks demand temporary, auditable, controlled privileged access.&nbsp;&nbsp;</p>



<h5 class="wp-block-heading">What to Check Right Now</h5>



<p>1.) <strong>Which users or groups hold permanent high-privilege roles?</strong>&nbsp;<br>2.) <strong>Are there no approval workflows or time limits in place?</strong>&nbsp;<br>3.) <strong>Is JIT VM access enabled for administrative connections?</strong>&nbsp;</p>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Recommended Fixes</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<p><strong>Enable Privileged Identity Management (PIM)</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Apply PIM to all high-impact roles including:&nbsp;<br>&#8211; Global Administrator&nbsp;<br>&#8211; Security Administrator&nbsp;<br>&#8211; Owner, Contributor (for resource-level RBAC)&nbsp;</li>



<li>Enforce: <br>&#8211; Time-bound access (e.g., 4-hour windows)&nbsp;<br>&#8211; Justification and MFA for elevation&nbsp;<br>&#8211; Approval workflows for sensitive roles&nbsp;</li>
</ul>



<p><strong>Audit and Rotate Standing Privileges</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>Review all current assignments to high-privilege roles by navigating to the Azure Portal and exporting the assignment list from PIM.&nbsp;</li>



<li>Remove or transition permanent assignments to eligible assignments under PIM.&nbsp;</li>



<li>Use Continuous Access Evaluation (CAE) in Entra ID to revoke access quickly if user risk changes or session anomalies are detected.&nbsp;</li>
</ul>



<p><strong>Apply Just-In-Time Access</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>In addition to PIM for identity roles, configure Just-in-Time VM access via Defender for Cloud.&nbsp;</li>



<li>This locks down inbound RDP/SSH and only opens access upon authorized request for a limited time.&nbsp;</li>
</ul>



<h4 class="wp-block-heading"><strong style="white-space: normal;">Pro Tip: Continuous Monitoring</strong><span style="font-family: -webkit-standard; font-size: medium; font-weight: 400; white-space: normal;">&nbsp;</span></h4>



<ul class="wp-block-list">
<li>Integrate audit logs from PIM and JIT into a SIEM (e.g., Microsoft Sentinel).</li>



<li>Monitor privilege elevations to detect unusual patterns and get early warnings on potential misuse.&nbsp;&nbsp;</li>
</ul>



<h2 class="wp-block-heading">CSPM Assessment: Fast, Focused, Continuous</h2>



<p>Traditional audits provide only a snapshot in time. Azure environments evolve constantly, and point-in-time reviews cannot keep up. Cloud Security Posture Management, or CSPM, changes that. It delivers automated visibility, intelligent detection, and prioritized remediation, giving your team both immediate and ongoing security improvements. </p>



<p><strong>Bottom line:</strong> CSPM turns “Oops, Azure did it again” into “Got it covered.”</p>



<h3 class="wp-block-heading">Why CSPM Matters</h3>



<p>Even small misconfigurations can have major consequences:</p>



<ul class="wp-block-list">
<li><strong>Ransomware exposure</strong>&nbsp;– open ports and stale accounts are actively exploited.</li>



<li><strong>Compliance failures</strong>&nbsp;– HIPAA, PCI DSS, ISO 27001, and other frameworks require proper access controls and audit trails.</li>



<li><strong>Unexpected downtime</strong>&nbsp;– misconfigurations can disrupt critical workloads.</li>



<li><strong>Reputational damage</strong>&nbsp;– customers expect reliable operations, not incident disclosures.</li>
</ul>



<p>CSPM gives you continuous, automated insight into your environment. It identifies the misconfigurations that cause the most risk, including overly permissive access, stale identities, missing logs, credential misuse, and standing admin privileges. Every finding is tied to context, severity, business impact, and compliance requirements, so you know exactly what to fix first.</p>



<p>With CSPM in place, you move from reacting to incidents to preventing them. From scrambling before audits to walking in prepared. From hoping you are secure to knowing exactly where you stand.</p>



<h3 class="wp-block-heading">What You Get with a CSPM Assessment</h3>



<p>A CSPM assessment from Fortress SRM is conducted by our veteran cloud security analysts using modern tooling to deliver rapid visibility, automated detection, and actionable remediation tailored to your Azure environment.</p>



<ul class="wp-block-list">
<li><strong>Rapid visibility</strong>&nbsp;– every user, resource, and permission across your Azure tenant.</li>



<li><strong>Automated detection</strong>&nbsp;– misconfigurations and security gaps with context and priority.</li>



<li><strong>Actionable remediation</strong>&nbsp;– clear, tailored steps for your environment.</li>



<li><strong>Continuous posture improvement</strong>&nbsp;– structured, ongoing cloud security management.</li>
</ul>



<h4 class="wp-block-heading">Next Step</h4>



<p>Do not wait for an auditor or an attacker to uncover your risks. Fortress SRM provides hands-on support and continuous improvement to help you stay ahead of threats and ensure compliance.</p>



<p><strong>Contact Fortress SRM to schedule your Azure CSPM Assessment and see exactly where your risks are and how to fix them fast.</strong></p>


<script type="text/javascript">
/* <![CDATA[ */
var gform;gform||(document.addEventListener("gform_main_scripts_loaded",function(){gform.scriptsLoaded=!0}),document.addEventListener("gform/theme/scripts_loaded",function(){gform.themeScriptsLoaded=!0}),window.addEventListener("DOMContentLoaded",function(){gform.domLoaded=!0}),gform={domLoaded:!1,scriptsLoaded:!1,themeScriptsLoaded:!1,isFormEditor:()=>"function"==typeof InitializeEditor,callIfLoaded:function(o){return!(!gform.domLoaded||!gform.scriptsLoaded||!gform.themeScriptsLoaded&&!gform.isFormEditor()||(gform.isFormEditor()&&console.warn("The use of gform.initializeOnLoaded() is deprecated in the form editor context and will be removed in Gravity Forms 3.1."),o(),0))},initializeOnLoaded:function(o){gform.callIfLoaded(o)||(document.addEventListener("gform_main_scripts_loaded",()=>{gform.scriptsLoaded=!0,gform.callIfLoaded(o)}),document.addEventListener("gform/theme/scripts_loaded",()=>{gform.themeScriptsLoaded=!0,gform.callIfLoaded(o)}),window.addEventListener("DOMContentLoaded",()=>{gform.domLoaded=!0,gform.callIfLoaded(o)}))},hooks:{action:{},filter:{}},addAction:function(o,r,e,t){gform.addHook("action",o,r,e,t)},addFilter:function(o,r,e,t){gform.addHook("filter",o,r,e,t)},doAction:function(o){gform.doHook("action",o,arguments)},applyFilters:function(o){return gform.doHook("filter",o,arguments)},removeAction:function(o,r){gform.removeHook("action",o,r)},removeFilter:function(o,r,e){gform.removeHook("filter",o,r,e)},addHook:function(o,r,e,t,n){null==gform.hooks[o][r]&&(gform.hooks[o][r]=[]);var d=gform.hooks[o][r];null==n&&(n=r+"_"+d.length),gform.hooks[o][r].push({tag:n,callable:e,priority:t=null==t?10:t})},doHook:function(r,o,e){var t;if(e=Array.prototype.slice.call(e,1),null!=gform.hooks[r][o]&&((o=gform.hooks[r][o]).sort(function(o,r){return o.priority-r.priority}),o.forEach(function(o){"function"!=typeof(t=o.callable)&&(t=window[t]),"action"==r?t.apply(null,e):e[0]=t.apply(null,e)})),"filter"==r)return e[0]},removeHook:function(o,r,t,n){var e;null!=gform.hooks[o][r]&&(e=(e=gform.hooks[o][r]).filter(function(o,r,e){return!!(null!=n&&n!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][r]=e)}});
/* ]]&gt; */
</script>

                <div class='gf_browser_safari gf_browser_iphone gform_wrapper gform_legacy_markup_wrapper gform-theme--no-framework' data-form-theme='legacy' data-form-index='0' id='gform_wrapper_1' >
                        <div class='gform_heading'>
                            <h3 class="gform_title">Contact Us</h3>
                            <p class='gform_description'></p>
                        </div><form method='post' enctype='multipart/form-data'  id='gform_1'  action='/feed/' data-formid='1' novalidate>
                        <div class='gform-body gform_body'><ul id='gform_fields_1' class='gform_fields top_label form_sublabel_below description_below validation_below'><li id="field_1_8" class="gfield gfield--type-honeypot gform_validation_container field_sublabel_below gfield--has-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_8'>LinkedIn</label><div class='ginput_container'><input name='input_8' id='input_1_8' type='text' value='' autocomplete='new-password'/></div><div class='gfield_description' id='gfield_description_1_8'>This field is for validation purposes and should be left unchanged.</div></li><li id="field_1_1" class="gfield gfield--type-name gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label gfield_label_before_complex' >Name<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_complex ginput_container ginput_container--name no_prefix has_first_name no_middle_name has_last_name no_suffix gf_name_has_2 ginput_container_name gform-grid-row' id='input_1_1'>
                            
                            <span id='input_1_1_3_container' class='name_first gform-grid-col gform-grid-col--size-auto' >
                                                    <input type='text' name='input_1.3' id='input_1_1_3' value=''   aria-required='true'   placeholder='First Name'  />
                                                    <label for='input_1_1_3' class='gform-field-label gform-field-label--type-sub '>First</label>
                                                </span>
                            
                            <span id='input_1_1_6_container' class='name_last gform-grid-col gform-grid-col--size-auto' >
                                                    <input type='text' name='input_1.6' id='input_1_1_6' value=''   aria-required='true'   placeholder='Last Name'  />
                                                    <label for='input_1_1_6' class='gform-field-label gform-field-label--type-sub '>Last</label>
                                                </span>
                            
                        </div></li><li id="field_1_5" class="gfield gfield--type-text gf_left_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_5'>Company<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_text'><input name='input_5' id='input_1_5' type='text' value='' class='medium'    placeholder='Company' aria-required="true" aria-invalid="false"   /></div></li><li id="field_1_6" class="gfield gfield--type-text gf_right_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_6'>Title<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_text'><input name='input_6' id='input_1_6' type='text' value='' class='medium'    placeholder='Title' aria-required="true" aria-invalid="false"   /></div></li><li id="field_1_3" class="gfield gfield--type-phone gf_left_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_3'>Phone<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_phone'><input name='input_3' id='input_1_3' type='tel' value='' class='medium'  placeholder='Phone' aria-required="true" aria-invalid="false"   /></div></li><li id="field_1_2" class="gfield gfield--type-email gf_right_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_2'>Email<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_email'>
                            <input name='input_2' id='input_1_2' type='email' value='' class='medium'   placeholder='Email Address' aria-required="true" aria-invalid="false"  />
                        </div></li><li id="field_1_7" class="gfield gfield--type-textarea gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_7'>Where did you hear about Fortress SRM?</label><div class='ginput_container ginput_container_textarea'><textarea name='input_7' id='input_1_7' class='textarea small'      aria-invalid="false"   rows='10' cols='50'></textarea></div></li><li id="field_1_4" class="gfield gfield--type-textarea gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_4'>Message<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_textarea'><textarea name='input_4' id='input_1_4' class='textarea medium'    placeholder='Message' aria-required="true" aria-invalid="false"   rows='10' cols='50'></textarea></div></li></ul></div>
        <div class='gform-footer gform_footer top_label'> <input type='submit' id='gform_submit_button_1' class='gform_button button' onclick='gform.submission.handleButtonClick(this);' data-submission-type='submit' value='Submit'  /> 
            <input type='hidden' class='gform_hidden' name='gform_submission_method' data-js='gform_submission_method_1' value='postback' />
            <input type='hidden' class='gform_hidden' name='gform_theme' data-js='gform_theme_1' id='gform_theme_1' value='legacy' />
            <input type='hidden' class='gform_hidden' name='gform_style_settings' data-js='gform_style_settings_1' id='gform_style_settings_1' value='{&quot;inputPrimaryColor&quot;:&quot;#204ce5&quot;}' />
            <input type='hidden' class='gform_hidden' name='is_submit_1' value='1' />
            <input type='hidden' class='gform_hidden' name='gform_submit' value='1' />
            
            <input type='hidden' class='gform_hidden' name='gform_currency' data-currency='USD' value='jza2AgzpCh5BhVFW0GGmkAzdqon4v/2YsK2Pr63axae2hSjLgkgCDjp13D+2q2nHb7TQp+oxqZ/zmh0lfNQhE/7ogLby0S4sNSvLW+UnoJh7+hE=' />
            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' />
            <input type='hidden' class='gform_hidden' name='state_1' value='WyJbXSIsImU2ZDAzMWFjZGE5YzM2MzllMDNkNzAzN2VjOTBiYzczIl0=' />
            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_target_page_number_1' id='gform_target_page_number_1' value='0' />
            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_source_page_number_1' id='gform_source_page_number_1' value='1' />
            <input type='hidden' name='gform_field_values' value='' />
            
        </div>
                        <p style="display: none !important;" class="akismet-fields-container" data-prefix="ak_"><label>&#916;<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js" value="174"/><script>document.getElementById( "ak_js_1" ).setAttribute( "value", ( new Date() ).getTime() );</script></p></form>
                        </div><script type="text/javascript">
/* <![CDATA[ */
 gform.initializeOnLoaded( function() {gformInitSpinner( 1, 'https://fortresssrmstg.wpenginepowered.com/wp-content/plugins/gravityforms/images/spinner.svg', true );jQuery('#gform_ajax_frame_1').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_1');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_1').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_1').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_1').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_1').removeClass('gform_validation_error');}setTimeout( function() { /* delay the scroll by 50 milliseconds to fix a bug in chrome */  }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_1').val();gformInitSpinner( 1, 'https://fortresssrmstg.wpenginepowered.com/wp-content/plugins/gravityforms/images/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [1, current_page]);window['gf_submitting_1'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}jQuery('#gform_wrapper_1').replaceWith(confirmation_content);jQuery(document).trigger('gform_confirmation_loaded', [1]);window['gf_submitting_1'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_1').text());}else{jQuery('#gform_1').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger("gform_pre_post_render", [{ formId: "1", currentPage: "current_page", abort: function() { this.preventDefault(); } }]);        if (event && event.defaultPrevented) {                return;        }        const gformWrapperDiv = document.getElementById( "gform_wrapper_1" );        if ( gformWrapperDiv ) {            const visibilitySpan = document.createElement( "span" );            visibilitySpan.id = "gform_visibility_test_1";            gformWrapperDiv.insertAdjacentElement( "afterend", visibilitySpan );        }        const visibilityTestDiv = document.getElementById( "gform_visibility_test_1" );        let postRenderFired = false;        function triggerPostRender() {            if ( postRenderFired ) {                return;            }            postRenderFired = true;            gform.core.triggerPostRenderEvents( 1, current_page );            if ( visibilityTestDiv ) {                visibilityTestDiv.parentNode.removeChild( visibilityTestDiv );            }        }        function debounce( func, wait, immediate ) {            var timeout;            return function() {                var context = this, args = arguments;                var later = function() {                    timeout = null;                    if ( !immediate ) func.apply( context, args );                };                var callNow = immediate && !timeout;                clearTimeout( timeout );                timeout = setTimeout( later, wait );                if ( callNow ) func.apply( context, args );            };        }        const debouncedTriggerPostRender = debounce( function() {            triggerPostRender();        }, 200 );        if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) {            const observer = new MutationObserver( ( mutations ) => {                mutations.forEach( ( mutation ) => {                    if ( mutation.type === 'attributes' && visibilityTestDiv.offsetParent !== null ) {                        debouncedTriggerPostRender();                        observer.disconnect();                    }                });            });            observer.observe( document.body, {                attributes: true,                childList: false,                subtree: true,                attributeFilter: [ 'style', 'class' ],            });        } else {            triggerPostRender();        }    } );} ); 
/* ]]&gt; */
</script>
<p>The post <a href="https://fortresssrmstg.wpenginepowered.com/oops-azure-did-it-again-5-risks-you-cant-ignore/">Oops, Azure Did It Again: 5 Risks You Can&#8217;t Ignore</a> appeared first on <a href="https://fortresssrmstg.wpenginepowered.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Threat and Security Update – November, 2025</title>
		<link>https://fortresssrmstg.wpenginepowered.com/threat-and-security-update-november-2025/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Fri, 21 Nov 2025 14:42:51 +0000</pubDate>
				<category><![CDATA[Threat & Security Updates]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1795</guid>

					<description><![CDATA[<p>Stay Ahead of Threats with the Latest Vulnerability Updates for November Stay up to date on critical cyber risks, Microsoft’s November Patch Tuesday, and other notable third-party vulnerabilities. Timely patching ...</p>
<p>The post <a href="https://fortresssrmstg.wpenginepowered.com/threat-and-security-update-november-2025/">Threat and Security Update – November, 2025</a> appeared first on <a href="https://fortresssrmstg.wpenginepowered.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading"><br>Stay Ahead of Threats with the Latest Vulnerability Updates for November</h3>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Stay up to date on critical cyber risks, Microsoft’s November Patch Tuesday, and other notable third-party vulnerabilities. Timely patching is key to maintaining a strong security posture and protecting your business from threats.&nbsp;</p>



<h3 class="wp-block-heading">Quick Highlights</h3>



<ul class="wp-block-list">
<li><strong>Microsoft Patch Tuesday:</strong>&nbsp;<br>&#8211; 63&nbsp;vulnerabilities disclosed&nbsp;<br>&#8211; 4&nbsp;rated&nbsp;<strong>Critical</strong>,&nbsp;1&nbsp;<strong>Zero-Day</strong>&nbsp;(actively exploited)&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Adobe Security Updates:</strong>&nbsp;<br>&#8211; 29&nbsp;vulnerabilities patched across&nbsp;8&nbsp;products&nbsp;<br>&#8211; 23&nbsp;rated&nbsp;<strong>Critical</strong>, affecting&nbsp;InDesign,&nbsp;inCopy, Photoshop, Illustrator, Illustrator Mobile, Pass, Substance 3D Stager, and Format Plugins&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>High-Severity Advisories from Major Vendors:</strong>&nbsp;<br>&#8211; <strong>Cisco</strong>:&nbsp;3 critical-severity flaws&nbsp;and&nbsp;1&nbsp;high-severity flaws,&nbsp;in&nbsp;Unified CCX, Secure Firewall ASA,&nbsp;Secure FTD,&nbsp;IOS/IOS XE/IOS XR, ISE RADIUS&nbsp;<br>&#8211; <strong>Fortinet</strong>: 1 medium-severity flaw in&nbsp;FortiOS&nbsp;<br>&#8211; <strong>Ivanti</strong>:&nbsp;1&nbsp;high-severity flaw in&nbsp;Ivanti Endpoint Manager&nbsp;<br>&#8211; <strong>SAP</strong>:&nbsp;3&nbsp;critical vulnerabilities in&nbsp;NetWeaver AS Java, SQL Anywhere Monitor, and Solution Manager<br>&#8211; <strong>Google Chrome:</strong>&nbsp;1&nbsp;high-severity flaw&nbsp;fixed in security updates&nbsp;<br>&#8211; <strong>Mozilla Firefox:</strong>&nbsp;9 high-severity flaws&nbsp;fixed in&nbsp;security updates&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Top Threats to Watch:</strong>&nbsp;<br>&#8211; <strong>Microsoft Teams Exploitation</strong>&nbsp;– Vulnerabilities enabling impersonation, message manipulation, and spoofing in Teams&nbsp;<br>&#8211; <strong>Advanced Persistent Threat (APT) Activity</strong>&nbsp;– Increased operations by China-, Iran-, and North Korea-aligned groups&nbsp;<br>&#8211; <strong>AI-Driven Cyberattacks</strong>&nbsp;– Threat actors&nbsp;leveraging&nbsp;AI for prompt injection, social engineering, and malware&nbsp;&nbsp;<br>&#8211; <strong>Sophisticated Social Engineering Campaigns</strong>&nbsp;– Large-scale smishing, phishing kits like Quantum Route Redirect, and gift card fraud&nbsp;&nbsp;</li>
</ul>



<h2 class="wp-block-heading">Windows 10 Reaches End of Support</h2>



<p>As of&nbsp;<strong>October 14, 2025</strong>, Microsoft has officially ended support for Windows 10.&nbsp;October’s Patch Tuesday was the&nbsp;<strong>final security update</strong>&nbsp;for the OS—unless your organization enrolls in the&nbsp;<strong>Extended Security Updates (ESU)</strong>&nbsp;program.&nbsp;</p>



<ul class="wp-block-list">
<li><strong>What This Means for Your Organization:</strong>&nbsp;<br>&#8211; No more security patches or bug fixes for Windows 10 devices&nbsp;<br>&#8211; Increased exposure to vulnerabilities and compliance risks&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Continued support requires either:&nbsp;&nbsp;<br>&#8211; Enrolling in Microsoft’s&nbsp;<strong>paid ESU program</strong>, or&nbsp;<br>&#8211; <strong>Upgrading to&nbsp;Latest Version of&nbsp;Windows 11</strong>&nbsp;</li>
</ul>



<p><strong>Need help planning your transition?</strong>&nbsp;<br>Fortress SRM can help assess your environment, prioritize upgrades, and ensure your endpoints&nbsp;remain&nbsp;patch-compliant and secure.&nbsp;</p>



<h2 class="wp-block-heading">Patch Tuesday Summary</h2>



<p><strong>Microsoft November 2025 Patch Tuesday</strong>&nbsp;<br><strong>63</strong>&nbsp;<strong>vulnerabilities</strong>&nbsp;disclosed, including&nbsp;<strong>4&nbsp;critical</strong>&nbsp;and&nbsp;<strong>1&nbsp;zero-day</strong>. By category:</p>



<ul class="wp-block-list">
<li><strong>29</strong>&nbsp;Elevation of Privilege&nbsp;</li>



<li><strong>16</strong> Remote Code Execution&nbsp;</li>



<li><strong>11</strong> Information Disclosure&nbsp;</li>



<li><strong>3</strong>&nbsp;Denial of Service&nbsp;</li>



<li><strong>2</strong>&nbsp;Security Feature Bypass&nbsp;</li>



<li><strong>2</strong>&nbsp;Spoofing&nbsp;</li>
</ul>



<h2 class="wp-block-heading">Critical Common Vulnerabilities and Exposures (CVEs)</h2>



<h3 class="wp-block-heading">Windows Zero-Days</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Details</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-62215" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-62215</strong></a><strong></strong>&nbsp;</td><td><strong>Windows Kernel Elevation of Privilege Vulnerability</strong>&nbsp;</td><td><strong>Exploited Zero-Day</strong>&nbsp;</td><td><strong>Yes</strong>&nbsp;</td></tr></tbody></table></figure>



<h3 class="wp-block-heading">Other Critical CVE&#8217;s Worth Mentioning</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Details</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-62199" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-62199</strong></a><strong></strong>&nbsp;</td><td><strong>Microsoft Office Remote Code Execution Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30398" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-30398</strong></a><strong></strong>&nbsp;</td><td><strong>Nuance&nbsp;PowerScribe&nbsp;360 Information Disclosure Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-62214" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-62214</strong></a><strong></strong>&nbsp;</td><td><strong>Visual Studio Remote Code Execution Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-60716" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-60716</strong></a><strong></strong>&nbsp;</td><td><strong>DirectX Graphics Kernel Elevation of Privilege Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><em><a href="https://msrc.microsoft.com/update-guide/releaseNote/2025-Nov" target="_blank" rel="noreferrer noopener">Microsoft November 2025 Security Update Release</a></em></p>



<h3 class="wp-block-heading">3rd Party Critical CVE&#8217;s Worth Mentioning</h3>



<h4 class="wp-block-heading">Adobe Products *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Affected&nbsp;Product</strong>&nbsp;</td><td><strong>Critical Issues</strong>&nbsp;</td><td><strong>Key Risks</strong>&nbsp;</td></tr><tr><td><a href="https://helpx.adobe.com/security/products/indesign/apsb25-106.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61814</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/indesign/apsb25-106.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61815</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/indesign/apsb25-106.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61824</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/indesign/apsb25-106.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61832</strong></a><strong></strong>&nbsp;</td><td><strong>InDesign</strong>&nbsp;</td><td><strong>4 Critical</strong>&nbsp;</td><td><strong>Arbitrary Code Execution</strong>&nbsp;</td></tr><tr><td><a href="https://helpx.adobe.com/security/products/incopy/apsb25-107.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61816</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/incopy/apsb25-107.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61817</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/incopy/apsb25-107.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61818</strong></a><strong></strong>&nbsp;</td><td><strong>InCopy</strong>&nbsp;</td><td><strong>3 Critical</strong>&nbsp;</td><td><strong>Arbitrary Code Execution</strong>&nbsp;</td></tr><tr><td><a href="https://helpx.adobe.com/security/products/photoshop/apsb25-108.html" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-61819</strong></a>&nbsp;</td><td><strong>Photoshop</strong>&nbsp;</td><td><strong>1 Critical</strong>&nbsp;</td><td><strong>Arbitrary Code Execution</strong>&nbsp;</td></tr><tr><td><a href="https://helpx.adobe.com/security/products/illustrator/apsb25-109.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61820</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/illustrator/apsb25-109.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61831</strong></a><strong></strong>&nbsp;</td><td><strong>Illustrator</strong>&nbsp;</td><td><strong>2 Critical</strong>&nbsp;</td><td><strong>Arbitrary Code Execution</strong>&nbsp;</td></tr><tr><td><a href="https://helpx.adobe.com/security/products/illustrator-mobile-ios/apsb25-111.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61826</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/illustrator-mobile-ios/apsb25-111.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61827</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/illustrator-mobile-ios/apsb25-111.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61828</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/illustrator-mobile-ios/apsb25-111.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61829</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/illustrator-mobile-ios/apsb25-111.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61836</strong></a><strong></strong>&nbsp;</td><td><strong>Illustrator Mobile</strong>&nbsp;</td><td><strong>5 Critical</strong>&nbsp;</td><td><strong>Arbitrary Code Execution</strong>&nbsp;</td></tr><tr><td><a href="https://helpx.adobe.com/security/products/pass/apsb25-112.html" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-61830</strong></a><strong></strong>&nbsp;</td><td><strong>Pass</strong>&nbsp;</td><td><strong>1 Critical</strong>&nbsp;</td><td><strong>Security Feature Bypass</strong>&nbsp;</td></tr><tr><td><a href="https://helpx.adobe.com/security/products/substance3d_stager/apsb25-113.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61833</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/substance3d_stager/apsb25-113.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61834</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/substance3d_stager/apsb25-113.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-64531</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/substance3d_stager/apsb25-113.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61835</strong></a><strong></strong>&nbsp;</td><td><strong>Substance 3D Stager</strong>&nbsp;</td><td><strong>4 Critical</strong>&nbsp;</td><td><strong>Arbitrary Code Execution</strong>&nbsp;</td></tr><tr><td><a href="https://helpx.adobe.com/security/products/formatplugins/apsb25-114.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61837</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/formatplugins/apsb25-114.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61838</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/formatplugins/apsb25-114.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61839</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/formatplugins/apsb25-114.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61840</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/formatplugins/apsb25-114.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61841</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/formatplugins/apsb25-114.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61842</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/formatplugins/apsb25-114.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61843</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/formatplugins/apsb25-114.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61844</strong></a><strong></strong>&nbsp;<a href="https://helpx.adobe.com/security/products/formatplugins/apsb25-114.html" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-61845</strong></a><strong></strong>&nbsp;</td><td><strong>Format Plugins</strong>&nbsp;</td><td><strong>3 Critical</strong>&nbsp;</td><td><strong>Arbitrary Code Execution</strong>&nbsp;<strong>Memory Exposure</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://helpx.adobe.com/security/security-bulletin.html" target="_blank" rel="noreferrer noopener"><em>Adobe Security Bulletins</em></a></p>



<h3 class="wp-block-heading">Cisco *</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Affected Product</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cc-unauth-rce-QeN8h7mQ" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-20354</strong></a><strong></strong>&nbsp;<a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cc-unauth-rce-QeN8h7mQ" target="_blank" rel="noreferrer noopener"><strong></strong><strong>CVE-2025-20358</strong></a><strong></strong>&nbsp;</td><td><strong>Cisco Unified CCX</strong>&nbsp;</td><td><strong>Remote Code Execution Vulnerabilities</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-code-exec-WmfP3h3O" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-20363</strong></a><strong></strong>&nbsp;</td><td><strong>Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, Cisco Secure Firewall Threat Defense (FTD) Software, Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software</strong>&nbsp;</td><td><strong>Web Services Remote Code Execution Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-z5xP8EUB" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-20333</strong></a><strong></strong>&nbsp;</td><td><strong>Cisco Secure Firewall Adaptive Security Appliance (ASA) Software&nbsp;and&nbsp;Cisco&nbsp;Secure Firewall Threat Defense (FTD) Software</strong>&nbsp;</td><td><strong>Web Server Remote Code Execution Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>Yes</strong>&nbsp;</td></tr><tr><td><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-radsupress-dos-8YF3JThh" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-20343</strong></a><strong></strong>&nbsp;</td><td><strong>Cisco Identity Services Engine (ISE)&nbsp;RADIUS</strong>&nbsp;</td><td><strong>Denial of Service Vulnerability</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://sec.cloudapps.cisco.com/security/center/publicationListing.x" target="_blank" rel="noreferrer noopener"><em>Cisco&nbsp;Security Advisories</em></a></p>



<h3 class="wp-block-heading">Fortinet *</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Affected Product</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://fortiguard.fortinet.com/psirt/FG-IR-25-026" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-24477</strong></a><strong></strong>&nbsp;</td><td><strong>FortiOS&nbsp;cw_staddaemon</strong>&nbsp;</td><td><strong>Heap-Based Buffer Overflow Vulnerability</strong>&nbsp;</td><td><strong>Medium</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://www.fortiguard.com/psirt" target="_blank" rel="noreferrer noopener"><em>Fortinet PSIRT Advisories</em></a></p>



<h3 class="wp-block-heading">Ivanti *</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Affected Product</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2025-for-EPM-2024?language=en_US" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-10918</strong></a><strong></strong>&nbsp;</td><td><strong>Ivanti Endpoint Manager (EPM)</strong>&nbsp;</td><td><strong>Arbitrary File Write on Disk</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://www.ivanti.com/blog/november-2025-security-update" target="_blank" rel="noreferrer noopener"><em>Ivanti&nbsp;November&nbsp;2025 Security Update</em></a></p>



<h3 class="wp-block-heading">SAP *</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Affected Component</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42890" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42890</strong></a><strong></strong>&nbsp;</td><td>SQL Anywhere Monitor (Non-Gui)&nbsp;</td><td><strong>Insecure key &amp; Secret Management vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42944" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42944</strong></a><strong></strong>&nbsp;</td><td>SAP NetWeaver AS Java&nbsp;</td><td><strong>Security Hardening for Insecure Deserialization</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42887" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42887</strong></a><strong></strong>&nbsp;</td><td>SAP Solution Manager&nbsp;</td><td><strong>Code Injection vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42940" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42940</strong></a><strong></strong>&nbsp;</td><td>SAP&nbsp;CommonCryptoLib&nbsp;</td><td><strong>Memory Corruption vulnerability</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://support.sap.com/en/my-support/knowledge-base/security-notes-news/november-2025.html" target="_blank" rel="noreferrer noopener"><em>SAP&nbsp;November&nbsp;2025&nbsp;Security Notes</em></a></p>



<h3 class="wp-block-heading">Google Chrome</h3>



<ul class="wp-block-list">
<li><strong>Version:</strong>&nbsp;142.0.7444.175/.176&nbsp;(Windows and Mac),&nbsp;142.0.7444.175&nbsp;(Linux)&nbsp;</li>



<li><strong>Release Date:</strong>&nbsp;November 11, 2025&nbsp;</li>



<li><strong>Key Fixes:</strong>&nbsp;Security fix for&nbsp;CVE-2025-13223&nbsp;and&nbsp;CVE-2025-13224&nbsp;</li>
</ul>



<p><a href="https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop_17.html" target="_blank" rel="noreferrer noopener"><em>Chrome Release Notes</em></a>&nbsp;</p>



<h3 class="wp-block-heading"><strong>Mozilla Firefox</strong>&nbsp;</h3>



<ul class="wp-block-list">
<li><strong>Version:</strong>&nbsp;Firefox 145&nbsp;</li>



<li><strong>Release Date:</strong>&nbsp;November 11, 2025&nbsp;</li>



<li><strong>Key Fixes:</strong>&nbsp;Security fix for&nbsp;9&nbsp;high severity CVE’s, including&nbsp;CVE-2025-13021, CVE-2025-13022, CVE-2025-13012, CVE-2025-13023, CVE-2025-13016, CVE-2025-13024, CVE-2025-13025, CVE-2025-13026, CVE-2025-13027&nbsp;</li>
</ul>



<p><a href="https://www.mozilla.org/en-US/security/advisories/" target="_blank" rel="noreferrer noopener"><em>Firefox&nbsp;Release Notes</em></a></p>



<p><em>* Not handled by Fortress SRM.</em>&nbsp;</p>



<h2 class="wp-block-heading">Threat Intelligence Trends –&nbsp;November 2025</h2>



<p>The following resources are grouped by threat type / category.&nbsp;</p>



<h3 class="wp-block-heading">Emerging Threats</h3>



<p><strong>Exploiting Microsoft Teams: Impersonation and Spoofing Vulnerabilities Exposed</strong>&nbsp;<br>Check Point Research uncovered four vulnerabilities in Microsoft Teams that allowed attackers to impersonate executives, manipulate messages, spoof notifications, and forge identities in video and audio calls.&nbsp;<a href="https://research.checkpoint.com/2025/microsoft-teams-impersonation-and-spoofing-vulnerabilities-exposed/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a>&nbsp;</p>



<p><strong>APT Activity Report Q2 2025–Q3 2025</strong>&nbsp;<br>ESET’s APT Activity Report for Q2–Q3 2025 highlights increased operations by China-aligned groups using adversary-in-the-middle techniques, Iran-aligned actors ramping up internal&nbsp;spearphishing, and North Korea-aligned hackers expanding cryptocurrency attacks into new regions like Uzbekistan.&nbsp;<a href="https://www.welivesecurity.com/en/eset-research/eset-apt-activity-report-q2-2025-q3-2025/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a>&nbsp;</p>



<p><strong>Preparing for Threats to Come: Cybersecurity Forecast 2026</strong>&nbsp;<br>Google Cloud’s Cybersecurity Forecast 2026 predicts that threat actors will fully embrace AI-driven attacks, using techniques like prompt injection and AI-enabled social engineering, while defenders counter with AI agents and advanced identity management.&nbsp;<a href="https://cloud.google.com/blog/topics/threat-intelligence/cybersecurity-forecast-2026/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a>&nbsp;</p>



<h3 class="wp-block-heading">Ransomware &amp; Malware Deployment</h3>



<p><strong>Uncovering&nbsp;Qilin&nbsp;Attack Methods Exposed Through Multiple Cases</strong>&nbsp;<br>The&nbsp;Qilin&nbsp;ransomware group (formerly Agenda) has&nbsp;emerged&nbsp;as one of the most prolific ransomware threats, using a double-extortion model that combines file encryption with public data leaks.&nbsp;<a href="https://blog.talosintelligence.com/uncovering-qilin-attack-methods-exposed-through-multiple-cases/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a>&nbsp;</p>



<h3 class="wp-block-heading">Social Engineering Exploits</h3>



<p><strong>Jingle Thief: Inside a Cloud Based Gift Card Fraud Campaign</strong>&nbsp;<br>The Jingle Thief campaign is a cloud-based gift card fraud operation&nbsp;exploiting&nbsp;Microsoft 365 environments using phishing and smishing,&nbsp;run by financially motivated threat actors based in Morocco.&nbsp;&nbsp;<a href="https://unit42.paloaltonetworks.com/cloud-based-gift-card-fraud-campaign/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em>&nbsp;</em>&nbsp;</p>



<p><strong>The Smishing Deluge: China-Based Campaign Flooding Global Text Messages</strong>&nbsp;<br>The Smishing Deluge campaign, attributed to the Smishing Triad, is a large-scale, decentralized smishing operation using fraudulent SMS messages about toll violations and package&nbsp;misdelivery&nbsp;to steal sensitive data.&nbsp;<a href="https://unit42.paloaltonetworks.com/global-smishing-campaign/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a>&nbsp;</p>



<p><strong>Quantum Route Redirect: Anonymous Tool Streamlining Global Phishing Attack</strong>&nbsp;<br>The Quantum Route Redirect phishing kit is an advanced automation platform that streamlines global phishing campaigns targeting Microsoft 365 users, turning complex setups into simple one-click launches.&nbsp;<a href="https://blog.knowbe4.com/quantum-route-redirect-anonymous-tool-streamlining-global-phishing-attack" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a>&nbsp;</p>



<p><strong>Black Friday Scams – How to Detect the Red Flags and Protect your wallet and Data</strong>&nbsp;<br>Cybercriminals are exploiting Black Friday shopping trends with&nbsp;scams&nbsp;that use fake retail websites, phishing emails, and malicious ads to steal payment information and personal data.&nbsp;<a href="https://cybersecuritynews.com/black-friday-scams/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a>&nbsp;</p>



<h3 class="wp-block-heading">AI-Driven Threats</h3>



<p><strong>First Vulnerability in OpenAI Atlas Browser, Allowing Injection of Malicious Instructions into ChatGPT</strong>&nbsp;<br>LayerX discovered the first vulnerability in OpenAI’s ChatGPT Atlas browser, which allows attackers to inject malicious instructions into ChatGPT’s memory via a Cross-Site Request Forgery (CSRF) exploit.&nbsp;<a href="https://layerxsecurity.com/blog/layerx-identifies-vulnerability-in-new-chatgpt-atlas-browser/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em>&nbsp;</em>&nbsp;</p>



<p><strong>GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools</strong>&nbsp;<br>Google Threat Intelligence reports that threat actors have moved beyond using AI for productivity and are now deploying AI-enabled malware that dynamically generates malicious scripts and evades detection.&nbsp;<a href="https://cloud.google.com/blog/topics/threat-intelligence/threat-actor-usage-of-ai-tools" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a>&nbsp;</p>



<p><strong>HackedGPT: Novel AI Vulnerabilities Open the Door for Private Data Leakage</strong>&nbsp;<br>Tenable Research has discovered seven vulnerabilities and attack techniques in ChatGPT, including unique indirect prompt injections, exfiltration of personal user information, persistence, evasion, and bypass of safety mechanisms.&nbsp;<a href="https://www.tenable.com/blog/hackedgpt-novel-ai-vulnerabilities-open-the-door-for-private-data-leakage" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a>&nbsp;</p>



<h2 class="wp-block-heading">Recommended Actions</h2>



<h3 class="wp-block-heading">Mitigations</h3>



<ul class="wp-block-list">
<li>Apply all Microsoft November Patch Tuesday updates, prioritizing critical and zero-day CVEs (e.g., CVE-2025-62215).&nbsp;</li>



<li>Upgrade or enroll in Extended Security Updates (ESU) for Windows 10 devices to&nbsp;maintain&nbsp;compliance and reduce exposure.&nbsp;</li>



<li>Patch third-party applications promptly, especially Adobe, Cisco, and SAP products with critical vulnerabilities.&nbsp;</li>



<li>Harden email and collaboration platforms (Microsoft 365, Teams) against phishing and impersonation attacks by enabling safe links, anti-spoofing policies, and conditional access.&nbsp;</li>
</ul>



<h3 class="wp-block-heading">Monitoring</h3>



<ul class="wp-block-list">
<li>Monitor for&nbsp;signs of exploitation of zero-day vulnerabilities and critical CVEs in Microsoft and third-party products.&nbsp;</li>



<li>Track anomalous login activity, especially from new geolocations or impossible travel scenarios, to detect APT and social engineering campaigns.&nbsp;</li>



<li>Watch for large-scale smishing/phishing attempts and suspicious redirects (Quantum Route Redirect indicators).&nbsp;</li>



<li>Enable cloud app security monitoring for Microsoft 365 and Google Workspace to detect unauthorized gift card issuance or mailbox rule changes.&nbsp;</li>
</ul>



<h2 class="wp-block-heading"><strong>About Fortress SRM’s Vigilant Managed Cyber Hygiene Offering</strong>&nbsp;</h2>



<h3 class="wp-block-heading">Why Patching Matters</h3>



<p>Unpatched software is a leading cause of breaches—nearly 1 in 3 attacks exploit known vulnerabilities.&nbsp;</p>



<h3 class="wp-block-heading">Vigilant Managed Cyber Hygiene</h3>



<p> Fortress SRM’s Vigilant Managed Cyber Hygiene simplifies patch management.&nbsp;</p>



<ul class="wp-block-list">
<li>Automated updates with 97%+ success rate for Microsoft &amp; 100+ third-party applications&nbsp;</li>



<li>Critical patches, OS upgrades, and configuration updates for all devices, on/off network&nbsp;</li>



<li>24/7/365 U.S.-based monitoring and real-time reporting for full visibility&nbsp;</li>
</ul>



<h4 class="wp-block-heading">Stay Protected. Stay Proactive. </h4>



<p><a href="https://fortresssrmstg.wpenginepowered.com/managed-security/" target="_blank" rel="noreferrer noopener">Learn how Fortress SRM can enhance your cybersecurity strategy →</a>&nbsp;</p>
<p>The post <a href="https://fortresssrmstg.wpenginepowered.com/threat-and-security-update-november-2025/">Threat and Security Update – November, 2025</a> appeared first on <a href="https://fortresssrmstg.wpenginepowered.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Threat and Security Update – October, 2025</title>
		<link>https://fortresssrmstg.wpenginepowered.com/threat-and-security-update-october-2025/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Tue, 21 Oct 2025 14:53:30 +0000</pubDate>
				<category><![CDATA[Threat & Security Updates]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1782</guid>

					<description><![CDATA[<p>Stay Ahead of Threats with the Latest Vulnerability Updates for October Stay up to date on critical cyber risks, Microsoft’s October Patch Tuesday, and other notable third-party vulnerabilities. Timely patching ...</p>
<p>The post <a href="https://fortresssrmstg.wpenginepowered.com/threat-and-security-update-october-2025/">Threat and Security Update – October, 2025</a> appeared first on <a href="https://fortresssrmstg.wpenginepowered.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading"><br>Stay Ahead of Threats with the Latest Vulnerability Updates for October</h3>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Stay up to date on critical cyber risks, Microsoft’s October Patch Tuesday, and other notable third-party vulnerabilities. Timely patching is key to maintaining a strong security posture and protecting your business from threats.&nbsp;</p>



<h3 class="wp-block-heading">Quick Highlights</h3>



<ul class="wp-block-list">
<li><strong>Windows 10 End of Support</strong> <br>&#8211; Final patch released <strong>October 14</strong> <br>&#8211; No more updates unless enrolled in <strong>Extended Security Updates (ESU)</strong> or <strong>upgraded to Windows 11</strong> <br>&#8211; Now is the time to assess your upgrade path <br></li>



<li><strong>Microsoft Patch Tuesday:</strong> <br>&#8211; 175 vulnerabilities disclosed <br>&#8211; 17 rated <strong>Critical</strong>, 6 are <strong>Zero-Day</strong> (3 actively exploited) </li>
</ul>



<ul class="wp-block-list">
<li><strong>Adobe Security Updates:</strong>&nbsp;<br>&#8211; 36 vulnerabilities patched across 12 products&nbsp;<br>&#8211; 24 rated <strong>Critical</strong>, affecting Illustrator, FrameMaker, Creative Cloud, and more&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>High-Severity Advisories from Major Vendors:</strong>&nbsp;<br>&#8211; <strong>Cisco</strong>: 4 high-severity flaws, including SNMP RCE and Secure Boot bypass&nbsp;<br>&#8211; <strong>Fortinet</strong>: 2 high-severity flaws in FortiPAM and FortiOS&nbsp;<br>&#8211; <strong>SAP</strong>: 3 critical vulnerabilities in NetWeaver, Print Service, and SRM&nbsp;<br>&#8211; <strong>Ivanti</strong>: 5 high-severity flaws in EPMM and Neurons for MDM&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Top Threats to Watch:</strong>&nbsp;<br>&#8211; <strong>Crimson Collective</strong> targeting AWS with leaked keys and extortion tactics&nbsp;<br>&#8211; <strong>VMware CVE-2025-41244</strong> zero-day exploited for privilege escalation&nbsp;<br>&#8211; <strong>Quishing 2.0</strong>: QR code phishing attacks evolving in sophistication&nbsp;<br>&#8211; <strong>Ransomware Cartel</strong>: LockBit, DragonForce &amp; Qilin collaborating&nbsp;<br>&#8211; <strong>Oyster Malware</strong> via fake Microsoft Teams installers&nbsp;<br>&#8211; <strong>Weaponized DFIR Tools</strong>: Velociraptor abused in ransomware attacks&nbsp;<br>&#8211; <strong>AI-Driven Threats</strong>: ShadowLeak zero-click exploit in ChatGPT; AI-generated phishing and malware&nbsp;</li>
</ul>



<h2 class="wp-block-heading">Windows 10 Reaches End of Support</h2>



<p>As of <strong>October 14, 2025</strong>, Microsoft has officially ended support for Windows 10. This month’s Patch Tuesday was the <strong>final security update</strong> for the OS—unless your organization enrolls in the <strong>Extended Security Updates (ESU)</strong> program.&nbsp;</p>



<p><strong>What This Means for Your Organization:</strong> </p>



<ul class="wp-block-list">
<li>No more security patches or bug fixes for Windows 10 devices </li>



<li>Increased exposure to vulnerabilities and compliance risks </li>



<li>Continued support requires either:  <br>&#8211; Enrolling in Microsoft’s <strong>paid ESU program</strong>, or<br>&#8211; <strong>Upgrading to Windows 11</strong> </li>
</ul>



<p><strong>Need help planning your transition?</strong>&nbsp;<br>Fortress SRM can help assess your environment, prioritize upgrades, and ensure your endpoints remain patch-compliant and secure.&nbsp;</p>



<h2 class="wp-block-heading">Patch Tuesday Summary</h2>



<p><strong>Microsoft October 2025 Patch Tuesday</strong>&nbsp;<br>175 vulnerabilities disclosed, including 8 critical and 6 zero-days. By category:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>80</strong> Elevation of Privilege </li>



<li><strong>31</strong> Remote Code Execution</li>



<li><strong>28</strong> Information Disclosure</li>



<li><strong>11</strong> Security Feature Bypass </li>



<li><strong>11</strong> Denial of Service </li>



<li><strong>10 </strong>Spoofing </li>
</ul>



<h2 class="wp-block-heading">Critical Common Vulnerabilities and Exposures (CVEs)</h2>



<h3 class="wp-block-heading">Windows Zero-Days</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Details</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24990" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-24990</strong></a><strong></strong>&nbsp;</td><td><strong>Windows Agere Modem Driver Elevation of Privilege Vulnerability</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>Yes</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24052" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-24052</strong></a><strong></strong>&nbsp;</td><td><strong>Windows Agere Modem Driver Elevation of Privilege Vulnerability</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59230" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59230</strong></a><strong></strong>&nbsp;</td><td><strong>Windows Remote Access Connection Manager Elevation of Privilege Vulnerability</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>Yes</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-47827" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-47827</strong></a><strong></strong>&nbsp;</td><td><strong>Secure Boot bypass in IGEL OS before 11</strong>&nbsp;</td><td><strong>Medium</strong>&nbsp;</td><td><strong>Yes</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-0033" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-0033</strong></a><strong></strong>&nbsp;</td><td><strong>RMP corruption during SNP initialization in AMD Restricted Memory Page</strong>&nbsp;</td><td><strong>Medium</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-2884" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-2884</strong></a><strong></strong>&nbsp;</td><td><strong>Out-of-bounds read bug in TCG TPM2.0 reference implementation.</strong>&nbsp;</td><td><strong>Medium</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<h3 class="wp-block-heading">Other Critical CVE&#8217;s Worth Mentioning</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Details</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59287</strong></a><strong></strong>&nbsp;</td><td><strong>Windows Server Update Service (WSUS) Remote Code Execution Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59246" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59246</strong></a><strong></strong>&nbsp;<a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59218" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59218</strong></a><strong></strong>&nbsp;</td><td><strong>Azure Entra ID Elevation of Privilege Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59234" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59234</strong></a><strong></strong>&nbsp;</td><td><strong>Microsoft Office Remote Code Execution Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-49708" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-49708</strong></a><strong></strong>&nbsp;</td><td><strong>Microsoft Graphics Component Elevation of Privilege Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59291" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59291</strong></a><strong></strong>&nbsp;</td><td><strong>Elevation of Privilege Flaw in Confidential Azure Container Instances</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59292" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59292</strong></a><strong></strong>&nbsp;</td><td><strong>Elevation of Privilege Flaw in Azure Compute Gallery</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59227" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59227</strong></a><strong></strong>&nbsp;</td><td><strong>Remote Code Execution Vulnerability in Microsoft Office</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59247" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59247</strong></a><strong></strong>&nbsp;</td><td><strong>Elevation of Privilege Flaw in Azure PlayFab</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59252" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59252</strong></a><strong></strong>&nbsp;<a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59272" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59272</strong></a><strong></strong>&nbsp;<a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59286" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59286</strong></a><strong></strong>&nbsp;</td><td><strong>M365 Copilot Spoofing Vulnerability</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59271" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59271</strong></a><strong></strong>&nbsp;</td><td><strong>Elevation of Privilege Flaw in Redis Enterprise</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-55321" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-55321</strong></a><strong></strong>&nbsp;</td><td><strong>Spoofing Vulnerability in Azure Monitor Log Analytics</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59236" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-59236</strong></a><strong></strong>&nbsp;</td><td><strong>Remote Code Execution Vulnerability in Microsoft Excel</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2016-9535" target="_blank" rel="noreferrer noopener"><strong>CVE-2016-9535</strong></a><strong></strong>&nbsp;</td><td><strong>Heap Bugger Overflow in LibTIFF</strong>&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<h3 class="wp-block-heading">3rd Party Critical CVE&#8217;s Worth Mentioning</h3>



<h4 class="wp-block-heading">Adobe Products *</h4>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Affected Product</strong>&nbsp;</td><td><strong>Critical Issues</strong>&nbsp;</td><td><strong>Key Risks</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-49552</strong>&nbsp;<strong>CVE-2025-49553</strong>&nbsp;<strong>CVE-2025-54196</strong>&nbsp;</td><td><strong>Connect </strong><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287</a><strong></strong>&nbsp;</td><td><strong>2 Critical</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;<strong>Security feature bypass</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-54263</strong>&nbsp;<strong>CVE-2025-54264</strong>&nbsp;<strong>CVE-2025-54265</strong>&nbsp;<strong>CVE-2025-54266</strong>&nbsp;<strong>CVE-2025-54267</strong>&nbsp;</td><td><strong>Commerce&nbsp;</strong>&nbsp;</td><td><strong>2 Critical</strong>&nbsp;</td><td><strong>Security feature bypass</strong>&nbsp;<strong>Privilege escalation</strong>&nbsp;<strong>Arbitrary code execution</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-54271</strong>&nbsp;</td><td><strong>Creative Cloud</strong>&nbsp;</td><td><strong>0 Critical</strong>&nbsp;</td><td><strong>Arbitrary file system write</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-54268</strong>&nbsp;<strong>CVE-2025-54278</strong>&nbsp;</td><td><strong>Bridge&nbsp;</strong>&nbsp;</td><td><strong>1 Critical</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;<strong>Memory exposure</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-54279</strong>&nbsp;<strong>CVE-2025-61804</strong>&nbsp;<strong>CVE-2025-54269</strong>&nbsp;<strong>CVE-2025-54270</strong>&nbsp;</td><td><strong>Animate&nbsp;</strong>&nbsp;</td><td><strong>2 Critical</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;<strong>Memory exposure</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-54272</strong>&nbsp;<strong>CVE-2025-61796</strong>&nbsp;<strong>CVE-2025-61797</strong>&nbsp;</td><td><strong>Experience Manager Screens</strong>&nbsp;</td><td><strong>0 Critical</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-54273</strong>&nbsp;<strong>CVE-2025-54274</strong>&nbsp;<strong>CVE-2025-54280</strong>&nbsp;<strong>CVE-2025-54275</strong>&nbsp;</td><td><strong>Substance 3D Viewer</strong>&nbsp;</td><td><strong>3 Critical</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;<strong>Application DoS</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-54276</strong>&nbsp;</td><td><strong>Substance 3D Modeler</strong>&nbsp;</td><td><strong>1 Critical</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-54281</strong>&nbsp;<strong>CVE-2025-54282</strong>&nbsp;</td><td><strong>FrameMaker</strong>&nbsp;</td><td><strong>2 Critical</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-54283</strong>&nbsp;<strong>CVE-2025-54284</strong>&nbsp;</td><td><strong>Illustrator</strong>&nbsp;</td><td><strong>2 Critical</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-61798</strong>&nbsp;<strong>CVE-2025-61799</strong>&nbsp;<strong>CVE-2025-61800</strong>&nbsp;<strong>CVE-2025-61801</strong>&nbsp;</td><td><strong>Dimension&nbsp;</strong>&nbsp;</td><td><strong>4 Critical</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-61802</strong>&nbsp;<strong>CVE-2025-61803</strong>&nbsp;<strong>CVE-2025-61805</strong>&nbsp;<strong>CVE-2025-61806</strong>&nbsp;<strong>CVE-2025-61807</strong>&nbsp;</td><td><strong>Substance 3D Stager</strong>&nbsp;</td><td><strong>5 Critical</strong>&nbsp;</td><td><strong>Arbitrary code execution</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://helpx.adobe.com/security/security-bulletin.html" target="_blank" rel="noreferrer noopener"><em>Adobe Security Bulletins →</em></a><em></em>&nbsp;</p>



<h3 class="wp-block-heading">Cisco *</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Affected Product</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-phone-dos-FPyjLV7A" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-20350 CVE-2025-20351</strong></a><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287</a><strong></strong>&nbsp;</td><td><strong>Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875</strong>&nbsp;</td><td><strong>SIP software DoS vulnerabilities</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-secboot-UqFD8AvC" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-20313 CVE-2025- 20314</strong></a><strong></strong>&nbsp;</td><td><strong>Cisco IOS XE&nbsp;</strong>&nbsp;</td><td><strong>Secure Boot Bypass</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-20352</strong></a><strong></strong>&nbsp;</td><td><strong>Cisco IOS / IOS XE&nbsp;</strong>&nbsp;</td><td><strong>SNMP RCE &amp; DoS</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>Yes</strong>&nbsp;</td></tr><tr><td><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-tacacs-hdB7thJw" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-20160</strong></a><strong></strong>&nbsp;</td><td><strong>Cisco IOS and IOS XE</strong>&nbsp;</td><td><strong>TACACS+ Authentication Bypass</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://sec.cloudapps.cisco.com/security/center/publicationListing.x" target="_blank" rel="noreferrer noopener"><em>Cisco Security Advisories →</em></a><em></em>&nbsp;</p>



<h3 class="wp-block-heading">Fortinet *</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Affected Product</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://www.fortiguard.com/psirt/FG-IR-25-010" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-49201</strong></a><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287</a><strong></strong>&nbsp;</td><td><strong>FortiPAM and FortiSwitch Manager&nbsp;</strong>&nbsp;</td><td><strong>Weak authentication allows brute-force bypass</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.fortiguard.com/psirt/FG-IR-24-361" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-58325</strong></a><strong></strong>&nbsp;</td><td><strong>FortiOS&nbsp;</strong>&nbsp;</td><td><strong>Local authenticated attacker can execute system commands</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://www.fortiguard.com/psirt" target="_blank" rel="noreferrer noopener"><em>Fortinet PSIRT Advisories →</em></a><em></em>&nbsp;</p>



<h3 class="wp-block-heading">Ivanti *</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID(s)</strong>&nbsp;</td><td><strong>Affected Product</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><strong>CVE-2025-10242 </strong> <strong>CVE-2025-10243</strong> <strong>CVE-2025-10985</strong> <strong>CVE-2025-10986</strong><br><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287</a> </td><td><strong>Ivanti EPMM&nbsp;</strong>&nbsp;</td><td><strong>OS Command Injection and Path traversals via remote authenticated attacker</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><strong>CWE-862</strong>&nbsp;<strong>CWE-308</strong>&nbsp;<strong>CWE-306</strong>&nbsp;</td><td><strong>Ivanti Neurons for MDM</strong>&nbsp;</td><td><strong>Missing authentication and MFA bypass&nbsp;</strong>&nbsp;</td><td><strong>High</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://www.ivanti.com/blog/october-2025-security-update" target="_blank" rel="noreferrer noopener"><em>Ivanti October 2025 Security Update →</em></a><em></em>&nbsp;</p>



<h3 class="wp-block-heading">SAP *</h3>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td><strong>CVE-ID</strong>&nbsp;</td><td><strong>Affected Component</strong>&nbsp;</td><td><strong>Description</strong>&nbsp;</td><td><strong>Severity</strong>&nbsp;</td><td><strong>Exploited?</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42944" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42944</strong></a><br><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287" target="_blank" rel="noreferrer noopener">https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59287</a> </td><td>SAP NetWeaver AS Java&nbsp;</td><td>Insecure Deserialization&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42937" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42937</strong></a><strong></strong>&nbsp;</td><td>SAP Print Service&nbsp;</td><td>Directory Traversal Vulnerability&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr><tr><td><a href="https://www.cve.org/CVERecord?id=CVE-2025-42910" target="_blank" rel="noreferrer noopener"><strong>CVE-2025-42910</strong></a><strong></strong>&nbsp;</td><td>SAP Supplier Relationship Management&nbsp;</td><td>Unrestricted File Upload Flaw&nbsp;</td><td><strong>Critical</strong>&nbsp;</td><td><strong>No</strong>&nbsp;</td></tr></tbody></table></figure>



<p><a href="https://support.sap.com/en/my-support/knowledge-base/security-notes-news/october-2025.html" target="_blank" rel="noreferrer noopener"><em>SAP October 2025 Security Notes </em><em>→</em></a><em></em>&nbsp;</p>



<h3 class="wp-block-heading">Google Chrome</h3>



<ul class="wp-block-list">
<li><strong>Version:</strong> 141.0.7390.107/.108 (Windows and Mac), 141.0.7390.107 (Linux) </li>



<li><strong>Release Date:</strong> October 14, 2025 </li>



<li><strong>Key Fixes:</strong> Security fix for CVE-2025-11756 </li>
</ul>



<p><a href="https://chromereleases.googleblog.com/2025/10/stable-channel-update-for-desktop_14.html" target="_blank" rel="noreferrer noopener"><em>Chrome Release Notes →</em></a><em></em>&nbsp;</p>



<p><em>* Not handled by Fortress SRM.</em>&nbsp;</p>



<h2 class="wp-block-heading">Threat Intelligence Trends – October 2025</h2>



<p>The following resources are grouped by threat type / category. </p>



<h3 class="wp-block-heading">Emerging Threats</h3>



<p><strong>Crimson Collective Targeting Cloud Environments</strong>&nbsp;</p>



<p>A newly identified threat group, Crimson Collective, has been observed compromising AWS environments using leaked long-term access keys. They escalate privileges via IAM policies, exfiltrate sensitive data, and follow up with extortion attempts. <a href="https://www.rapid7.com/blog/post/tr-crimson-collective-a-new-threat-group-observed-operating-in-the-cloud/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<p><strong>Zero-Day Alert: VMware CVE-2025-41244 Privilege Escalation</strong>&nbsp;</p>



<p>NVISO Labs identified active exploitation of CVE-2025-41244, a local privilege escalation flaw in VMware’s guest service discovery. The vulnerability allows attackers to elevate privileges and potentially pivot within virtualized environments. <a href="https://blog.nviso.eu/tag/proof-of-concept/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a> </p>



<p><strong>Quishing 2.0: QR Code Phishing Evolves</strong>&nbsp;</p>



<p>Cybercriminals are refining quishing attacks using fake QR codes embedded in emails, flyers, and public spaces. These codes redirect users to phishing sites or initiate malware downloads. <a href="https://gbhackers.com/quishing-via-qr-codes-emerging-as-a-top-attack-vector/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a> </p>



<h3 class="wp-block-heading">Ransomware &amp; Malware Deployment</h3>



<p><strong>LockBit, DragonForce &amp; Qilin Form Ransomware Cartel</strong> </p>



<p>Three major ransomware groups have formed a criminal cartel to coordinate attacks and share infrastructure. <a href="https://www.csoonline.com/article/4070290/lockbit-dragonforce-and-qilin-form-a-cartel-to-dictate-ransomware-market-conditions.html" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a><em> </em> </p>



<p><strong>Malvertising Campaign: Oyster Malware via Fake Teams Installers</strong> </p>



<p>Threat actors are using SEO poisoning and malicious ads to distribute trojanized Microsoft Teams installers. These fake installers deploy Oyster (aka Broomstick), a modular backdoor that enables persistent remote access and stealthy data exfiltration. <a href="https://blackpointcyber.com/blog/malicious-teams-installers-drop-oyster-malware/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a> </p>



<p><strong>Velociraptor DFIR Tool Weaponized</strong> </p>



<p>Threat actors are abusing the legitimate Velociraptor forensic tool to deploy ransomware like LockBit and Babuk. This marks a troubling trend of security tools being repurposed for attacks. <a href="https://www.bleepingcomputer.com/news/security/hackers-now-use-velociraptor-dfir-tool-in-ransomware-attacks/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a></p>



<p><em>Group: Storm-2603 (China-based)</em>&nbsp;</p>



<p><strong>Cephalus Ransomware via DLL Sideloading</strong>&nbsp;</p>



<p>A new ransomware variant, Cephalus, uses DLL sideloading through SentinelOne binaries and RDP access without MFA. <a href="https://www.huntress.com/blog/sonicwall-sslvpn-compromise" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a> </p>



<h3 class="wp-block-heading">Cloud &amp; Infrastructure Exploits</h3>



<p><strong>SonicWall SSLVPN Exploitation</strong> </p>



<p>Akira ransomware actors are exploiting SonicWall VPNs using BYOVD techniques and clearing logs to evade detection. <a href="https://www.huntress.com/blog/sonicwall-sslvpn-compromise" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a> </p>



<p><strong>Discord Data Breach via Third-Party Vendor</strong> </p>



<p>A breach at Discord’s support vendor exposed 70,000 government ID photos and personal data. <a href="https://thecyberexpress.com/discord-data-breach/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a> </p>



<p><strong>Clop Claims Oracle E-Business Suite Data Theft</strong>&nbsp;</p>



<p>The Clop ransomware group has reportedly sent extortion emails claiming to have stolen data from Oracle E-Business Suite environments. While the full scope of the breach is unclear, the tactic aligns with Clop’s recent shift toward data-centric extortion rather than encryption. <a href="https://www.bleepingcomputer.com/news/security/clop-extortion-emails-claim-theft-of-oracle-e-business-suite-data/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a> </p>



<h3 class="wp-block-heading">AI-Driven Threats</h3>



<p><strong>AI-Powered Malware &amp; Phishing</strong> </p>



<p>Russia-linked groups are using AI to generate phishing lures and malware like WRECKSTEEL and GIFTEDCROOK. <a href="https://www.thehackernews.com/2025/10/from-phishing-to-malware-ai-becomes.html" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a> </p>



<p><strong>Zero-Click AI Exploit: ShadowLeak Vulnerability in ChatGPT</strong>&nbsp;</p>



<p>Radware disclosed ShadowLeak, a zero-click prompt injection vulnerability in ChatGPT’s enterprise integrations. Malicious emails can silently trigger data exfiltration from OpenAI’s servers without user interaction, bypassing traditional security controls. <a href="https://www.radware.com/security/threat-advisories-and-attack-reports/shadowleak/" target="_blank" rel="noreferrer noopener"><em>Read more →</em></a> </p>



<h2 class="wp-block-heading">Recommended Actions</h2>



<h3 class="wp-block-heading">Mitigations</h3>



<ul class="wp-block-list">
<li><strong>Prioritize patching</strong> all actively exploited zero-days from Microsoft and VMware.&nbsp;</li>



<li><strong>Disable unused services</strong> on Cisco IOS XE and Fortinet appliances to reduce attack surface.&nbsp;</li>



<li><strong>Enforce MFA</strong> across all cloud and identity platforms.&nbsp;</li>



<li><strong>Restrict QR code scanning</strong> on unmanaged devices to mitigate quishing attacks.&nbsp;</li>



<li><strong>Update endpoint protection</strong> to detect AI-generated malware variants.&nbsp;</li>
</ul>



<h3 class="wp-block-heading">Monitoring</h3>



<ul class="wp-block-list">
<li>Watch for <strong>suspicious authentication attempts</strong> in Azure, Fortinet, and Ivanti logs.&nbsp;</li>



<li>Monitor for <strong>unexpected outbound traffic</strong> from Teams or Office installations (possible Oyster malware).&nbsp;</li>



<li>Track <strong>file uploads and downloads</strong> in SAP SRM and Print Service environments.&nbsp;</li>



<li>Set alerts for <strong>SNMP activity spikes</strong> on Cisco devices (possible CVE-2025-20352 exploitation).&nbsp;</li>
</ul>



<h3 class="wp-block-heading">Detection Tips</h3>



<ul class="wp-block-list">
<li>Use YARA or Sigma rules to detect:  <br>&#8211; <strong>Velociraptor misuse</strong> in ransomware campaigns <br>&#8211; <strong>ShadowLeak zero-click exploit</strong> indicators in AI platforms </li>



<li>Deploy honeypots or deception tools to <strong>detect brute-force attempts</strong> on FortiPAM and Secure Boot bypass attempts on Cisco IOS XE.&nbsp;&nbsp;</li>



<li>Leverage threat intel feeds to identify <strong>Crimson Collective</strong> and <strong>LockBit cartel</strong> infrastructure. </li>
</ul>



<h2 class="wp-block-heading"><strong>About Fortress SRM’s Vigilant Managed Cyber Hygiene Offering</strong>&nbsp;</h2>



<h3 class="wp-block-heading">Why Patching Matters</h3>



<p>Unpatched software is a leading cause of breaches—nearly 1 in 3 attacks exploit known vulnerabilities.&nbsp;</p>



<h3 class="wp-block-heading">Vigilant Managed Cyber Hygiene</h3>



<p> Fortress SRM’s Vigilant Managed Cyber Hygiene simplifies patch management.&nbsp;</p>



<ul class="wp-block-list">
<li>Automated updates with 97%+ success rate for Microsoft &amp; 100+ third-party applications&nbsp;</li>



<li>Critical patches, OS upgrades, and configuration updates for all devices, on/off network&nbsp;</li>



<li>24/7/365 U.S.-based monitoring and real-time reporting for full visibility&nbsp;</li>
</ul>



<h4 class="wp-block-heading">Stay Protected. Stay Proactive. </h4>



<p><a href="https://fortresssrmstg.wpenginepowered.com/managed-security/" target="_blank" rel="noreferrer noopener">Learn how Fortress SRM can enhance your cybersecurity strategy →</a> </p>
<p>The post <a href="https://fortresssrmstg.wpenginepowered.com/threat-and-security-update-october-2025/">Threat and Security Update – October, 2025</a> appeared first on <a href="https://fortresssrmstg.wpenginepowered.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Microsoft MFA &#038; SSPR Retirement: Make Your Migration a Security Win</title>
		<link>https://fortresssrmstg.wpenginepowered.com/microsoft-mfa-sspr-retirement-make-your-migration-a-security-win/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Thu, 18 Sep 2025 20:01:36 +0000</pubDate>
				<category><![CDATA[Managed Security]]></category>
		<category><![CDATA[Security Consulting]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1776</guid>

					<description><![CDATA[<p>By September 30, 2025, Microsoft will retire the legacy Multi-Factor Authentication (MFA) and Self-Service Password Reset (SSPR) policies. If your organization is still using the legacy policies, you’ll need to ...</p>
<p>The post <a href="https://fortresssrmstg.wpenginepowered.com/microsoft-mfa-sspr-retirement-make-your-migration-a-security-win/">Microsoft MFA &amp; SSPR Retirement: Make Your Migration a Security Win</a> appeared first on <a href="https://fortresssrmstg.wpenginepowered.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>By September 30, 2025, Microsoft will retire the legacy Multi-Factor Authentication (MFA) and Self-Service Password Reset (SSPR) policies. If your organization is still using the legacy policies, you’ll need to switch over to the unified Microsoft Entra Authentication Methods policy.</p>



<p>But this isn’t just about avoiding service disruptions or checking a compliance box. It’s a chance to make authentication stronger, simplify management, and future-proof your identity security.</p>



<p>With some planning and the right tools, the migration can be smooth. At the same time, it’s a great opportunity to make your organization more secure and resilient.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">The Highlights</h3>



<p><strong>Microsoft MFA &amp; SSPR Retirement – Sept. 30, 2025</strong></p>



<ul class="wp-block-list">
<li>Legacy MFA and SSPR policies end on September 30, 2025.</li>



<li>All organizations need to migrate to Microsoft Entra Authentication Methods.</li>



<li>Risks if you don’t migrate: login failures, service disruptions, compliance gaps.</li>



<li><strong>Old methods going away: </strong>security questions, SMS, voice calls.</li>



<li><strong>Modern methods available:</strong> passkeys (FIDO2), Microsoft Authenticator, certificate-based authentication.</li>
</ul>



<p><strong>Bottom line:</strong>&nbsp;Act now. Waiting likely means broken logins and weaker security.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">What&#8217;s Changing</h2>



<p>Historically, MFA and SSPR were managed separately in older portals. After September 30, 2025, those portals retire, and everything moves under Entra ID (formerly Azure AD). That means one centralized place to manage authentication and keep things consistent.</p>



<p><strong>Specifically, key changes include: </strong></p>



<ul class="wp-block-list">
<li>Legacy MFA policies will no longer be supported&nbsp;</li>



<li>SSPR policies will be retired&nbsp;</li>



<li>Security questions will be disabled entirely
<ul class="wp-block-list">
<li>To reiterate: Security questions will no longer be an option at all for resetting passwords</li>
</ul>
</li>



<li>Out-of-band MFA methods like SMS and voice calls will be discouraged under modern security standards such as NIST&nbsp;</li>
</ul>



<p>Entra Authentication Methods consolidates all authentication management into a single framework, making it easier to enforce secure, modern practices.&nbsp;&nbsp;</p>



<h3 class="wp-block-heading">Why This Matters</h3>



<p>As a result, delaying migration could cause you to run into:&nbsp;</p>



<ul class="wp-block-list">
<li>Misaligned authentication settings&nbsp;</li>



<li>User frustration from failed logins or password resets&nbsp;</li>



<li>Service disruptions&nbsp;</li>



<li>Security gaps from outdated methods&nbsp;</li>



<li>Compliance risks with NIST and other industry standards&nbsp;</li>
</ul>



<p>Beyond just meeting the deadline, this is a chance to take a closer look at your overall authentication and access policies.</p>



<h2 class="wp-block-heading">A Strategic Moment to Reassess Identity Security</h2>



<p>The MFA and SSPR retirement is mandatory, but it’s also a good time to step back and ask:</p>



<ul class="wp-block-list">
<li>Are we enforcing strong, phishing-resistant MFA methods?&nbsp;</li>



<li>Is our user experience consistent across apps and services?&nbsp;</li>



<li>Do we still have legacy authentication enabled?&nbsp;</li>



<li>Are our policies aligned with Zero Trust principles?&nbsp;</li>
</ul>



<p>This is your chance to move from “just compliant” to confident, resilient, and future-ready.&nbsp;</p>



<h3 class="wp-block-heading">Recommended Modern Authentication Methods</h3>



<p>When you migrate, consider moving away from outdated methods and using:</p>



<ul class="wp-block-list">
<li>Passkeys (FIDO2)&nbsp;</li>



<li>Microsoft Authenticator&nbsp;</li>



<li>Certificate-Based Authentication&nbsp;</li>



<li>Email OTP (for SSPR only, and only for guest users if no other secure method is available)&nbsp;</li>
</ul>



<p>Avoid SMS, voice-based MFA, and security questions—they’re no longer recommended by NIST. And remember, security questions won’t be available at all for password resets.</p>



<h3 class="wp-block-heading">Steps to Prepare for Migration</h3>



<p>Here’s a practical roadmap to make sure things go smoothly:</p>



<ul class="wp-block-list">
<li>Assess current MFA and SSPR configurations in the legacy portals&nbsp;</li>



<li>Use Microsoft’s migration tool to import policies into Entra Authentication Methods&nbsp;</li>



<li>Test and validate new policies in a controlled group&nbsp;</li>



<li>Communicate changes and provide guidance to users&nbsp;</li>



<li>Retire old policies once the new setup is stable&nbsp;</li>
</ul>



<p><strong>Pro Tip: </strong>Enable passwordless authentication, enforce conditional access policies, and disable legacy protocols that could expose vulnerabilities.</p>



<p>For official guidance: <a href="https://learn.microsoft.com/en-us/entra/identity/authentication/how-to-authentication-methods-manage" target="_blank" rel="noreferrer noopener">How to migrate to the Authentication methods policy &#8211; Microsoft Entra ID | Microsoft Learn</a></p>



<h2 class="wp-block-heading">Modernize Your Authentication with Confidence</h2>



<p>If this feels overwhelming, don’t worry. You don’t have to tackle it alone.</p>



<p>Our team specializes in helping organizations like yours:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Audit and map legacy authentication policies</strong>&nbsp;to understand your current setup</li>



<li><strong>Design secure, scalable Entra policies</strong>&nbsp;tailored to your needs</li>



<li><strong>Enable strong MFA and passwordless experiences</strong>&nbsp;for users</li>



<li><strong>Integrate policy changes</strong> with your broader identity and access strategies&nbsp;</li>



<li><strong>Ensure a smooth, disruption-free transition&nbsp;</strong></li>
</ul>



<p>Acting early reduces risk, avoids last-minute headaches, and makes sure your authentication practices are modern, secure, and compliant.</p>



<h3 class="wp-block-heading">Don&#8217;t Just Meet the Deadline—Strengthen Your Security.</h3>



<p>The September 30, 2025 retirement of legacy MFA and SSPR is coming up fast. This is more than a compliance task. It’s a chance to build a stronger identity security foundation.</p>



<p>Whether you’re just starting or already in motion, we’ll guide you through a seamless transition and uncover ways to improve your security along the way. Let’s turn this deadline into a security win for your organization.</p>



<h4 class="wp-block-heading">Start the Conversation Today</h4>



<p><strong>Fill out the form below or connect with Kelsey on <a href="https://www.linkedin.com/in/kelseyclarkstrategic/" target="_blank" rel="noreferrer noopener">LinkedIn</a> to get started. </strong></p>



                <div class='gf_browser_safari gf_browser_iphone gform_wrapper gform_legacy_markup_wrapper gform-theme--no-framework' data-form-theme='legacy' data-form-index='0' id='gform_wrapper_1' >
                        <div class='gform_heading'>
                            <h3 class="gform_title">Contact Us</h3>
                            <p class='gform_description'></p>
                        </div><form method='post' enctype='multipart/form-data'  id='gform_1'  action='/feed/' data-formid='1' novalidate>
                        <div class='gform-body gform_body'><ul id='gform_fields_1' class='gform_fields top_label form_sublabel_below description_below validation_below'><li id="field_1_8" class="gfield gfield--type-honeypot gform_validation_container field_sublabel_below gfield--has-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_8'>Email</label><div class='ginput_container'><input name='input_8' id='input_1_8' type='text' value='' autocomplete='new-password'/></div><div class='gfield_description' id='gfield_description_1_8'>This field is for validation purposes and should be left unchanged.</div></li><li id="field_1_1" class="gfield gfield--type-name gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label gfield_label_before_complex' >Name<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_complex ginput_container ginput_container--name no_prefix has_first_name no_middle_name has_last_name no_suffix gf_name_has_2 ginput_container_name gform-grid-row' id='input_1_1'>
                            
                            <span id='input_1_1_3_container' class='name_first gform-grid-col gform-grid-col--size-auto' >
                                                    <input type='text' name='input_1.3' id='input_1_1_3' value=''   aria-required='true'   placeholder='First Name'  />
                                                    <label for='input_1_1_3' class='gform-field-label gform-field-label--type-sub '>First</label>
                                                </span>
                            
                            <span id='input_1_1_6_container' class='name_last gform-grid-col gform-grid-col--size-auto' >
                                                    <input type='text' name='input_1.6' id='input_1_1_6' value=''   aria-required='true'   placeholder='Last Name'  />
                                                    <label for='input_1_1_6' class='gform-field-label gform-field-label--type-sub '>Last</label>
                                                </span>
                            
                        </div></li><li id="field_1_5" class="gfield gfield--type-text gf_left_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_5'>Company<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_text'><input name='input_5' id='input_1_5' type='text' value='' class='medium'    placeholder='Company' aria-required="true" aria-invalid="false"   /></div></li><li id="field_1_6" class="gfield gfield--type-text gf_right_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_6'>Title<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_text'><input name='input_6' id='input_1_6' type='text' value='' class='medium'    placeholder='Title' aria-required="true" aria-invalid="false"   /></div></li><li id="field_1_3" class="gfield gfield--type-phone gf_left_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_3'>Phone<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_phone'><input name='input_3' id='input_1_3' type='tel' value='' class='medium'  placeholder='Phone' aria-required="true" aria-invalid="false"   /></div></li><li id="field_1_2" class="gfield gfield--type-email gf_right_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_2'>Email<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_email'>
                            <input name='input_2' id='input_1_2' type='email' value='' class='medium'   placeholder='Email Address' aria-required="true" aria-invalid="false"  />
                        </div></li><li id="field_1_7" class="gfield gfield--type-textarea gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_7'>Where did you hear about Fortress SRM?</label><div class='ginput_container ginput_container_textarea'><textarea name='input_7' id='input_1_7' class='textarea small'      aria-invalid="false"   rows='10' cols='50'></textarea></div></li><li id="field_1_4" class="gfield gfield--type-textarea gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_4'>Message<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_textarea'><textarea name='input_4' id='input_1_4' class='textarea medium'    placeholder='Message' aria-required="true" aria-invalid="false"   rows='10' cols='50'></textarea></div></li></ul></div>
        <div class='gform-footer gform_footer top_label'> <input type='submit' id='gform_submit_button_1' class='gform_button button' onclick='gform.submission.handleButtonClick(this);' data-submission-type='submit' value='Submit'  /> 
            <input type='hidden' class='gform_hidden' name='gform_submission_method' data-js='gform_submission_method_1' value='postback' />
            <input type='hidden' class='gform_hidden' name='gform_theme' data-js='gform_theme_1' id='gform_theme_1' value='legacy' />
            <input type='hidden' class='gform_hidden' name='gform_style_settings' data-js='gform_style_settings_1' id='gform_style_settings_1' value='{&quot;inputPrimaryColor&quot;:&quot;#204ce5&quot;}' />
            <input type='hidden' class='gform_hidden' name='is_submit_1' value='1' />
            <input type='hidden' class='gform_hidden' name='gform_submit' value='1' />
            
            <input type='hidden' class='gform_hidden' name='gform_currency' data-currency='USD' value='FEocooMDNdzYOGa/aO7XX85nzFZadEocw2zWoLLc5X3WNZrk4rbaog/nIWUjmP4BQseg2QokDqoFyh8oW1nO9YqjesZuAECOpPDaTB/7SoysxAU=' />
            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' />
            <input type='hidden' class='gform_hidden' name='state_1' value='WyJbXSIsImU2ZDAzMWFjZGE5YzM2MzllMDNkNzAzN2VjOTBiYzczIl0=' />
            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_target_page_number_1' id='gform_target_page_number_1' value='0' />
            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_source_page_number_1' id='gform_source_page_number_1' value='1' />
            <input type='hidden' name='gform_field_values' value='' />
            
        </div>
                        <p style="display: none !important;" class="akismet-fields-container" data-prefix="ak_"><label>&#916;<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_2" name="ak_js" value="13"/><script>document.getElementById( "ak_js_2" ).setAttribute( "value", ( new Date() ).getTime() );</script></p></form>
                        </div><script type="text/javascript">
/* <![CDATA[ */
 gform.initializeOnLoaded( function() {gformInitSpinner( 1, 'https://fortresssrmstg.wpenginepowered.com/wp-content/plugins/gravityforms/images/spinner.svg', true );jQuery('#gform_ajax_frame_1').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_1');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_1').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_1').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_1').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_1').removeClass('gform_validation_error');}setTimeout( function() { /* delay the scroll by 50 milliseconds to fix a bug in chrome */  }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_1').val();gformInitSpinner( 1, 'https://fortresssrmstg.wpenginepowered.com/wp-content/plugins/gravityforms/images/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [1, current_page]);window['gf_submitting_1'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}jQuery('#gform_wrapper_1').replaceWith(confirmation_content);jQuery(document).trigger('gform_confirmation_loaded', [1]);window['gf_submitting_1'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_1').text());}else{jQuery('#gform_1').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger("gform_pre_post_render", [{ formId: "1", currentPage: "current_page", abort: function() { this.preventDefault(); } }]);        if (event && event.defaultPrevented) {                return;        }        const gformWrapperDiv = document.getElementById( "gform_wrapper_1" );        if ( gformWrapperDiv ) {            const visibilitySpan = document.createElement( "span" );            visibilitySpan.id = "gform_visibility_test_1";            gformWrapperDiv.insertAdjacentElement( "afterend", visibilitySpan );        }        const visibilityTestDiv = document.getElementById( "gform_visibility_test_1" );        let postRenderFired = false;        function triggerPostRender() {            if ( postRenderFired ) {                return;            }            postRenderFired = true;            gform.core.triggerPostRenderEvents( 1, current_page );            if ( visibilityTestDiv ) {                visibilityTestDiv.parentNode.removeChild( visibilityTestDiv );            }        }        function debounce( func, wait, immediate ) {            var timeout;            return function() {                var context = this, args = arguments;                var later = function() {                    timeout = null;                    if ( !immediate ) func.apply( context, args );                };                var callNow = immediate && !timeout;                clearTimeout( timeout );                timeout = setTimeout( later, wait );                if ( callNow ) func.apply( context, args );            };        }        const debouncedTriggerPostRender = debounce( function() {            triggerPostRender();        }, 200 );        if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) {            const observer = new MutationObserver( ( mutations ) => {                mutations.forEach( ( mutation ) => {                    if ( mutation.type === 'attributes' && visibilityTestDiv.offsetParent !== null ) {                        debouncedTriggerPostRender();                        observer.disconnect();                    }                });            });            observer.observe( document.body, {                attributes: true,                childList: false,                subtree: true,                attributeFilter: [ 'style', 'class' ],            });        } else {            triggerPostRender();        }    } );} ); 
/* ]]&gt; */
</script>
<p>The post <a href="https://fortresssrmstg.wpenginepowered.com/microsoft-mfa-sspr-retirement-make-your-migration-a-security-win/">Microsoft MFA &amp; SSPR Retirement: Make Your Migration a Security Win</a> appeared first on <a href="https://fortresssrmstg.wpenginepowered.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DMARC: Strengthening Trust in Your Email Domain</title>
		<link>https://fortresssrmstg.wpenginepowered.com/dmarc-strengthening-trust-in-your-email-domain/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Thu, 28 Aug 2025 16:32:52 +0000</pubDate>
				<category><![CDATA[Managed Security]]></category>
		<category><![CDATA[Security Consulting]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1750</guid>

					<description><![CDATA[<p>Written by: Kelsey Clark, Fortress SRM Security Innovation &#38; Brand Strategy Leader The Hidden Risk Inside Your Inbox Email is the communication backbone of modern work, but it’s also a ...</p>
<p>The post <a href="https://fortresssrmstg.wpenginepowered.com/dmarc-strengthening-trust-in-your-email-domain/">DMARC: Strengthening Trust in Your Email Domain</a> appeared first on <a href="https://fortresssrmstg.wpenginepowered.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wp-block-post-date"><time datetime="2025-08-28T12:32:52-04:00">August 28, 2025</time></div>


<p><strong>Written by:</strong> <strong><a href="https://www.linkedin.com/in/kelseyclarkstrategic/" target="_blank" rel="noreferrer noopener">Kelsey Clark</a></strong>, Fortress SRM Security Innovation &amp; Brand Strategy Leader</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">The Hidden Risk Inside Your Inbox</h2>



<p>Email is the communication backbone of modern work, but it’s also a top target for attackers. </p>



<p>Phishing, spoofing, and impersonation attacks exploit the fact that email was not designed with strong identity verification. As these attacks grow in sophistication, security teams face increasing pressure to protect both their organization and their people.</p>



<p>This is where&nbsp;<strong>DMARC (Domain-based Message Authentication, Reporting, and Conformance)</strong>&nbsp;can help.</p>



<h2 class="wp-block-heading">What DMARC Does</h2>



<p>DMARC helps receiving mail servers determine whether messages claiming to come from your domain are legitimate. </p>



<p>When implemented correctly, it reduces the risk of attackers impersonating your organization, protecting your employees, customers, and brand reputation.</p>



<p>While primarily a security tool, DMARC also supports trust and compliance by:</p>



<ul class="wp-block-list">
<li>Demonstrating that your emails are legitimate.</li>



<li>Providing visibility into who is sending email on behalf of your domain.</li>



<li>Helping you meet email authentication requirements that may support regulatory compliance.</li>
</ul>



<h2 class="wp-block-heading">How DMARC Works</h2>



<p>DMARC builds on two key email authentication technologies:</p>



<ul class="wp-block-list">
<li><strong>SPF (Sender Policy Framework):</strong>&nbsp;Verifies the sending server is authorized.</li>



<li><strong>DKIM (DomainKeys Identified Mail):</strong>&nbsp;Uses cryptographic signatures to ensure integrity.</li>
</ul>



<p>On their own, SPF and DKIM are useful but incomplete. SPF can fail in forwarding scenarios, and not all senders consistently sign with DKIM. DMARC strengthens protection by requiring that at least&nbsp;<strong>one</strong>&nbsp;of these technologies passes&nbsp;<strong>and</strong>&nbsp;that the domain used aligns with the visible “From” header. This alignment check makes impersonation much harder.</p>



<ul class="wp-block-list">
<li><strong>SPF Alignment:</strong>&nbsp;Confirms the sending server is authorized and its domain matches the “From” domain.</li>



<li><strong>DKIM Alignment:</strong>&nbsp;Confirms the message signature is valid and the signing domain matches the “From” domain.</li>
</ul>



<p>If either SPF or DKIM aligns, DMARC passes. If neither aligns, DMARC applies the policy you’ve set—monitor, quarantine, or reject.</p>



<p><em>The diagram below illustrates this difference: before DKIM, DMARC relies solely on SPF alignment. After DKIM, DMARC can validate alignment with either SPF or DKIM, providing stronger, more reliable protection against spoofing.</em></p>



<div data-wp-interactive="core/file" class="wp-block-file has-white-background-color has-background"><object data-wp-bind--hidden="!state.hasPdfPreview" hidden class="wp-block-file__embed" data="https://fortresssrmstg.wpenginepowered.com/wp-content/uploads/2025/08/Email-Auth-Pipeline-Before-vs-After-DKIM.pdf" type="application/pdf" style="width:100%;height:600px" aria-label="Embed of Email Auth Pipeline Before vs After DKIM Diagram."></object><a id="wp-block-file--media-ca449678-acb1-4ab7-b236-7632b1707060" href="https://fortresssrmstg.wpenginepowered.com/wp-content/uploads/2025/08/Email-Auth-Pipeline-Before-vs-After-DKIM.pdf" target="_blank" rel="noreferrer noopener">Email Auth Pipeline Before vs After DKIM Diagram</a><a href="https://fortresssrmstg.wpenginepowered.com/wp-content/uploads/2025/08/Email-Auth-Pipeline-Before-vs-After-DKIM.pdf" class="wp-block-file__button wp-element-button" download aria-describedby="wp-block-file--media-ca449678-acb1-4ab7-b236-7632b1707060">Download</a></div>



<p>Throughout this process, DMARC also generates reports that give you visibility into who is sending emails on behalf of your domain and which messages fail authentication. This combination of verification, alignment, policy enforcement, and reporting reduces spoofing, improves trust in your emails, and gives you actionable insight into your email ecosystem.</p>



<p><em>⚠️&nbsp;<strong>Limitations:</strong>&nbsp;DMARC stops exact-domain spoofing, but not lookalike domains or compromised accounts.</em></p>



<p>It’s important to note that DMARC primarily protects against&nbsp;<strong>exact-domain spoofing</strong>. Lookalike domains, display name impersonation, and compromised accounts can still bypass these checks. For complete protection, DMARC should be implemented as part of a broader, layered email security strategy.</p>



<h2 class="wp-block-heading">Why DMARC Matters for Your Organization</h2>



<p>Email-based impersonation isn’t just an IT issue, but it’s a major business risk. </p>



<p>Without DMARC, there&#8217;s a better chance attackers can:</p>



<ul class="wp-block-list">
<li>Send fake invoices or phishing emails that put customers at risk</li>



<li>Trick employees into sharing credentials or sensitive data</li>



<li>Damage your organization&#8217;s reputation</li>
</ul>



<p>With DMARC, you gain:</p>



<ul class="wp-block-list">
<li><strong>Trustworthiness:</strong>&nbsp;Your emails are verifiable</li>



<li><strong>Visibility:</strong>&nbsp;Reports show domain usage</li>



<li><strong>Control:</strong>&nbsp;You decide how unauthorized emails are handled</li>



<li><strong>Confidence:</strong>&nbsp;Supports compliance and customer trust</li>
</ul>



<h2 class="wp-block-heading">Best Practices for Implementing DMARC</h2>



<p>Rolling out DMARC isn’t a one-click solution. A strategic, phased approach will help you protect your domain without disrupting legitimate email flow.</p>



<ol class="wp-block-list">
<li><strong>Start with Monitoring:</strong>&nbsp;Use a “none” policy to gather data without impacting delivery.</li>



<li><strong>Align SPF and DKIM:</strong>&nbsp;Ensure both are correctly configured and aligned with your “From” domain (strict vs. relaxed alignment per RFC 7489).</li>



<li><strong>Sign Outgoing Mail:</strong>&nbsp;Use DKIM on all messages to verify authenticity.</li>



<li><strong>Review Reports:</strong>&nbsp;DMARC aggregate (RUA) and forensic (RUF) reports are in XML format and difficult to read. You’ll need proper tooling to parse and act on them. Analyze who is sending emails on your behalf.</li>



<li><strong>Gradually Enforce:</strong>&nbsp;Move from “none” to “quarantine” or “reject” to actively block spoofed messages, but be cautious. Jumping too quickly to “reject” can break legitimate third-party senders (CRMs, payroll services, marketing automation).</li>



<li><strong>Include Subdomains:</strong>&nbsp;Protect all parts of your domain.</li>



<li><strong>Educate Your Team:</strong>&nbsp;Train employees on phishing risks and DMARC’s role in your policy.</li>



<li><strong>Maintain and Evolve Your Setup:</strong>&nbsp;Email infrastructure changes over time. Keep DMARC records up to date, and review policies regularly.</li>
</ol>



<h2 class="wp-block-heading">Beyond DMARC: Layered Security</h2>



<p>DMARC is powerful, but most effective when combined with broader security measures:</p>



<ul class="wp-block-list">
<li>Ongoing user awareness training, including interactive <a href="https://fortresssrmstg.wpenginepowered.com/security-consulting/">tabletop exercises</a>.</li>



<li>Regular <a href="https://fortresssrmstg.wpenginepowered.com/managed-security/">patching</a> and proactive cybersecurity measures to maintain strong cyber hygiene.&nbsp;</li>



<li><a href="https://fortresssrmstg.wpenginepowered.com/incident-response/">Incident response</a> planning to prepare your team for attacks before they happen.</li>
</ul>



<h2 class="wp-block-heading">Fortress SRM Can Help</h2>



<p>Email spoofing and phishing aren’t going away, but DMARC gives your organization a strong defense. Implementing it can be complex, but you don’t have to go it alone.</p>



<p>The Fortress Security Risk Management team provides hands-on support for DMARC and broader email security as part of a holistic cybersecurity strategy. We work alongside you to identify risks, strengthen defenses, and simplify complexity. With our co-managed services, you get the right mix of guidance and support to match your security maturity, making security clear and manageable.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">Take Action Today</h3>



<p>Request your&nbsp;<strong>Fortress SRM DMARC assessment</strong>&nbsp;and start protecting your domain, your customers, and your business.</p>



<p>Fill out the form below or connect with Kelsey on <a href="https://www.linkedin.com/in/kelseyclarkstrategic/" target="_blank" rel="noreferrer noopener">LinkedIn</a> to start the conversation.</p>



                <div class='gf_browser_safari gf_browser_iphone gform_wrapper gform_legacy_markup_wrapper gform-theme--no-framework' data-form-theme='legacy' data-form-index='0' id='gform_wrapper_1' >
                        <div class='gform_heading'>
                            <h3 class="gform_title">Contact Us</h3>
                            <p class='gform_description'></p>
                        </div><form method='post' enctype='multipart/form-data'  id='gform_1'  action='/feed/' data-formid='1' novalidate>
                        <div class='gform-body gform_body'><ul id='gform_fields_1' class='gform_fields top_label form_sublabel_below description_below validation_below'><li id="field_1_8" class="gfield gfield--type-honeypot gform_validation_container field_sublabel_below gfield--has-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_8'>Phone</label><div class='ginput_container'><input name='input_8' id='input_1_8' type='text' value='' autocomplete='new-password'/></div><div class='gfield_description' id='gfield_description_1_8'>This field is for validation purposes and should be left unchanged.</div></li><li id="field_1_1" class="gfield gfield--type-name gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label gfield_label_before_complex' >Name<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_complex ginput_container ginput_container--name no_prefix has_first_name no_middle_name has_last_name no_suffix gf_name_has_2 ginput_container_name gform-grid-row' id='input_1_1'>
                            
                            <span id='input_1_1_3_container' class='name_first gform-grid-col gform-grid-col--size-auto' >
                                                    <input type='text' name='input_1.3' id='input_1_1_3' value=''   aria-required='true'   placeholder='First Name'  />
                                                    <label for='input_1_1_3' class='gform-field-label gform-field-label--type-sub '>First</label>
                                                </span>
                            
                            <span id='input_1_1_6_container' class='name_last gform-grid-col gform-grid-col--size-auto' >
                                                    <input type='text' name='input_1.6' id='input_1_1_6' value=''   aria-required='true'   placeholder='Last Name'  />
                                                    <label for='input_1_1_6' class='gform-field-label gform-field-label--type-sub '>Last</label>
                                                </span>
                            
                        </div></li><li id="field_1_5" class="gfield gfield--type-text gf_left_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_5'>Company<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_text'><input name='input_5' id='input_1_5' type='text' value='' class='medium'    placeholder='Company' aria-required="true" aria-invalid="false"   /></div></li><li id="field_1_6" class="gfield gfield--type-text gf_right_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_6'>Title<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_text'><input name='input_6' id='input_1_6' type='text' value='' class='medium'    placeholder='Title' aria-required="true" aria-invalid="false"   /></div></li><li id="field_1_3" class="gfield gfield--type-phone gf_left_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_3'>Phone<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_phone'><input name='input_3' id='input_1_3' type='tel' value='' class='medium'  placeholder='Phone' aria-required="true" aria-invalid="false"   /></div></li><li id="field_1_2" class="gfield gfield--type-email gf_right_half gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_2'>Email<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_email'>
                            <input name='input_2' id='input_1_2' type='email' value='' class='medium'   placeholder='Email Address' aria-required="true" aria-invalid="false"  />
                        </div></li><li id="field_1_7" class="gfield gfield--type-textarea gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_7'>Where did you hear about Fortress SRM?</label><div class='ginput_container ginput_container_textarea'><textarea name='input_7' id='input_1_7' class='textarea small'      aria-invalid="false"   rows='10' cols='50'></textarea></div></li><li id="field_1_4" class="gfield gfield--type-textarea gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible"  ><label class='gfield_label gform-field-label' for='input_1_4'>Message<span class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label><div class='ginput_container ginput_container_textarea'><textarea name='input_4' id='input_1_4' class='textarea medium'    placeholder='Message' aria-required="true" aria-invalid="false"   rows='10' cols='50'></textarea></div></li></ul></div>
        <div class='gform-footer gform_footer top_label'> <input type='submit' id='gform_submit_button_1' class='gform_button button' onclick='gform.submission.handleButtonClick(this);' data-submission-type='submit' value='Submit'  /> 
            <input type='hidden' class='gform_hidden' name='gform_submission_method' data-js='gform_submission_method_1' value='postback' />
            <input type='hidden' class='gform_hidden' name='gform_theme' data-js='gform_theme_1' id='gform_theme_1' value='legacy' />
            <input type='hidden' class='gform_hidden' name='gform_style_settings' data-js='gform_style_settings_1' id='gform_style_settings_1' value='{&quot;inputPrimaryColor&quot;:&quot;#204ce5&quot;}' />
            <input type='hidden' class='gform_hidden' name='is_submit_1' value='1' />
            <input type='hidden' class='gform_hidden' name='gform_submit' value='1' />
            
            <input type='hidden' class='gform_hidden' name='gform_currency' data-currency='USD' value='JAWEjSw6a8TLyMfEYykQ/ei8iC9n1GrflFKEoutN5bwsE68Jprp/2kT0/YZhqp4eeOKmuzRuyiwst66qECicWwUkN7V91tN+GryrRm//Dn8BQAM=' />
            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' />
            <input type='hidden' class='gform_hidden' name='state_1' value='WyJbXSIsImU2ZDAzMWFjZGE5YzM2MzllMDNkNzAzN2VjOTBiYzczIl0=' />
            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_target_page_number_1' id='gform_target_page_number_1' value='0' />
            <input type='hidden' autocomplete='off' class='gform_hidden' name='gform_source_page_number_1' id='gform_source_page_number_1' value='1' />
            <input type='hidden' name='gform_field_values' value='' />
            
        </div>
                        <p style="display: none !important;" class="akismet-fields-container" data-prefix="ak_"><label>&#916;<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_3" name="ak_js" value="166"/><script>document.getElementById( "ak_js_3" ).setAttribute( "value", ( new Date() ).getTime() );</script></p></form>
                        </div><script type="text/javascript">
/* <![CDATA[ */
 gform.initializeOnLoaded( function() {gformInitSpinner( 1, 'https://fortresssrmstg.wpenginepowered.com/wp-content/plugins/gravityforms/images/spinner.svg', true );jQuery('#gform_ajax_frame_1').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_1');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_1').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_1').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_1').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_1').removeClass('gform_validation_error');}setTimeout( function() { /* delay the scroll by 50 milliseconds to fix a bug in chrome */  }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_1').val();gformInitSpinner( 1, 'https://fortresssrmstg.wpenginepowered.com/wp-content/plugins/gravityforms/images/spinner.svg', true );jQuery(document).trigger('gform_page_loaded', [1, current_page]);window['gf_submitting_1'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}jQuery('#gform_wrapper_1').replaceWith(confirmation_content);jQuery(document).trigger('gform_confirmation_loaded', [1]);window['gf_submitting_1'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_1').text());}else{jQuery('#gform_1').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger("gform_pre_post_render", [{ formId: "1", currentPage: "current_page", abort: function() { this.preventDefault(); } }]);        if (event && event.defaultPrevented) {                return;        }        const gformWrapperDiv = document.getElementById( "gform_wrapper_1" );        if ( gformWrapperDiv ) {            const visibilitySpan = document.createElement( "span" );            visibilitySpan.id = "gform_visibility_test_1";            gformWrapperDiv.insertAdjacentElement( "afterend", visibilitySpan );        }        const visibilityTestDiv = document.getElementById( "gform_visibility_test_1" );        let postRenderFired = false;        function triggerPostRender() {            if ( postRenderFired ) {                return;            }            postRenderFired = true;            gform.core.triggerPostRenderEvents( 1, current_page );            if ( visibilityTestDiv ) {                visibilityTestDiv.parentNode.removeChild( visibilityTestDiv );            }        }        function debounce( func, wait, immediate ) {            var timeout;            return function() {                var context = this, args = arguments;                var later = function() {                    timeout = null;                    if ( !immediate ) func.apply( context, args );                };                var callNow = immediate && !timeout;                clearTimeout( timeout );                timeout = setTimeout( later, wait );                if ( callNow ) func.apply( context, args );            };        }        const debouncedTriggerPostRender = debounce( function() {            triggerPostRender();        }, 200 );        if ( visibilityTestDiv && visibilityTestDiv.offsetParent === null ) {            const observer = new MutationObserver( ( mutations ) => {                mutations.forEach( ( mutation ) => {                    if ( mutation.type === 'attributes' && visibilityTestDiv.offsetParent !== null ) {                        debouncedTriggerPostRender();                        observer.disconnect();                    }                });            });            observer.observe( document.body, {                attributes: true,                childList: false,                subtree: true,                attributeFilter: [ 'style', 'class' ],            });        } else {            triggerPostRender();        }    } );} ); 
/* ]]&gt; */
</script>
<p>The post <a href="https://fortresssrmstg.wpenginepowered.com/dmarc-strengthening-trust-in-your-email-domain/">DMARC: Strengthening Trust in Your Email Domain</a> appeared first on <a href="https://fortresssrmstg.wpenginepowered.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Threat and Security Update – August, 2025</title>
		<link>https://fortresssrmstg.wpenginepowered.com/threat-and-security-update-august-2025/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Thu, 14 Aug 2025 19:13:54 +0000</pubDate>
				<category><![CDATA[Threat & Security Updates]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1740</guid>

					<description><![CDATA[<p>Stay Ahead of Threats with the Latest Vulnerability Updates for August Stay up to date on critical cyber risks, Microsoft’s August Patch Tuesday, and other notable third-party vulnerabilities. Timely patching ...</p>
<p>The post <a href="https://fortresssrmstg.wpenginepowered.com/threat-and-security-update-august-2025/">Threat and Security Update – August, 2025</a> appeared first on <a href="https://fortresssrmstg.wpenginepowered.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading"><br>Stay Ahead of Threats with the Latest Vulnerability Updates for August</h3>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Stay up to date on critical cyber risks, Microsoft’s August Patch Tuesday, and other notable third-party vulnerabilities. Timely patching is key to maintaining a strong security posture and protect your business from threats. </p>



<p>The following resources are grouped by threat type / category. </p>



<h3 class="wp-block-heading">Recent in Threat Intelligence News</h3>



<h4 class="wp-block-heading">Ransomware and AI-Enhanced Attacks</h4>



<ul class="wp-block-list">
<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Farcticwolf.com%2Fresources%2Fblog%2Farctic-wolf-observes-july-2025-uptick-in-akira-ransomware-activity-targeting-sonicwall-ssl-vpn%2F&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745179885570%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=tZ2vOWOc%2Fj%2B%2FCA0z4EsYIS8DSPFzQZpYOYIPXGvjwzM%3D&amp;reserved=0">Arctic Wolf Observes July 2025 Uptick in Akira Ransomware Activity Targeting SonicWall SSL VPN</a></u></li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.infosecurity-magazine.com%2Fnews%2Fransomware-ai-chatbot-pressure%2F&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745179964412%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=aRkQ9IM6NXBY3EuUgXsFfColewGZecA%2B%2Bf9ISw8m9R4%3D&amp;reserved=0">Ransomware Group Uses AI Chatbot to Intensify Pressure on Victims</a></u></li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.cisa.gov%2Fnews-events%2Fcybersecurity-advisories%2Faa25-203a&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180045298%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=0HFvppfY8rIwD%2B3Ul61DBT8e9q2iF2Y%2BbtcVtM2Wk6Y%3D&amp;reserved=0">#StopRansomware: Interlock | CISA</a></u></li>
</ul>



<h4 class="wp-block-heading">Vulnerabilities / Exploits</h4>



<ul class="wp-block-list">
<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsec.cloudapps.cisco.com%2Fsecurity%2Fcenter%2Fcontent%2FCiscoSecurityAdvisory%2Fcisco-sa-ise-unauth-rce-ZAd2GnJ6&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745179896774%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=ABhBrops3xoZ%2Bep3E5arNJldkHNlg5FzU7M8knoFr8U%3D&amp;reserved=0">Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities</a></u></li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fthecyberexpress.com%2Fmalcure-vulnerability-cve-2025-6043%2F&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745179939538%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=7snujyY9k%2B4YbSdLrAkWevMdPZ4Us53K%2BY3%2F6%2BtfWf0%3D&amp;reserved=0">Malcure Vulnerability (CVE-2025-6043) Risks 10,000+ Sites</a></u></li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.cisa.gov%2Fnews-events%2Falerts%2F2025%2F08%2F06%2Fmicrosoft-releases-guidance-high-severity-vulnerability-cve-2025-53786-hybrid-exchange-deployments&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745179949802%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=PRdG1op%2F4O7yCoKRtwj6x7ElWOjULCNnpQwYjNKzr2Q%3D&amp;reserved=0">Microsoft Releases Guidance on High-Severity Vulnerability (CVE-2025-53786) in Hybrid Exchange Deployments</a></u></li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.cisa.gov%2Fnews-events%2Falerts%2F2025%2F07%2F20%2Fupdate-microsoft-releases-guidance-exploitation-sharepoint-vulnerabilities&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180013153%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=0nECOJdxLwpzAhJ01VU20S8RJLO%2BbytE6r%2FPquRFdyM%3D&amp;reserved=0">UPDATE: Microsoft Releases Guidance on Exploitation of SharePoint Vulnerabilities</a></u></li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.sentinelone.com%2Fblog%2Fsharepoint-toolshell-zero-day-exploited-in-the-wild-targets-enterprise-servers%2F&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745179989979%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=NFGgsrF5plc24qnimPInZbNBHCpN2jiu4BF8qHBAKYM%3D&amp;reserved=0">SharePoint ToolShell | Zero-Day Exploited in-the-Wild Targets Enterprise Servers</a></u></li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgbhackers.com%2F1-click-oracle-cloud-code-editor-rce-flaw%2F&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180034569%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=2gmyjiv0y0KdD65ZYQXZQY8Sh5QZZGPQFK%2FZ1XFaOYE%3D&amp;reserved=0">1-Click Oracle Cloud Code Editor RCE Flaw Allows Malicious File Upload to Shell</a></u></li>
</ul>



<h4 class="wp-block-heading">Phishing and Social Engineering</h4>



<ul class="wp-block-list">
<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcyble.com%2Fblog%2Fscanception-a-qriosity-driven-phishing-campaign%2F&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745179977985%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=GU%2BFiOeYB8EyBdGqaoGGC%2FghNHnYh%2Bc7Pdri%2Fy4xlPE%3D&amp;reserved=0">Scanception: A QRiosity-Driven Phishing Campaign</a></u></li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcloud.google.com%2Fblog%2Ftopics%2Fthreat-intelligence%2Fvoice-phishing-data-extortion&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180001703%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=uOGTc0Ae95xN%2F%2B%2FK97%2BxFXgPqSH9mBiur6JSAu8lzBM%3D&amp;reserved=0">The Cost of a Call: From Voice Phishing to Data Extortion</a></u></li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgbhackers.com%2Firanian-threat-actors-use-ai-generated-emails%2F&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745179918521%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=Py3dfacmqvZ6J4HgyI7DshAH%2FU3H9VWVk367K4UebH0%3D&amp;reserved=0">Iranian Threat Actors Use AI-Generated Emails to Target Cybersecurity Researchers and Academics</a></u></li>
</ul>



<h4 class="wp-block-heading">DDoS / Network Attacks</h4>



<ul class="wp-block-list">
<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcybersecuritynews.com%2Frecord-breaking-ddos-attack-7-3-tbps%2F&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745179907747%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=pzAYVZkSbWgU7j9lqc5p7WaiURjqRgyK4dJ6ufmDHSA%3D&amp;reserved=0">Hackers Breaking Internet with 7.3 Tbps and 4.8 Billion Packets Per Second DDoS Attack</a></u></li>
</ul>



<h4 class="wp-block-heading">Malware / RATs</h4>



<ul class="wp-block-list">
<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fthedfirreport.com%2F2025%2F07%2F14%2Fkongtuke-filefix-leads-to-new-interlock-rat-variant%2F&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745179929243%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=GfjxyrQfNpbmHvqqCWuVvjqeL52sN7l5Dhji7MNUlIc%3D&amp;reserved=0">KongTuke FileFix Leads to New Interlock RAT Variant</a></u></li>
</ul>



<h4 class="wp-block-heading">Data Breaches / Trends</h4>



<ul class="wp-block-list">
<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.infosecurity-magazine.com%2Fnews%2Fus-data-breaches-record-year%2F&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180024083%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=uvJdQMV8d6SaVWjq%2FRQouj7oHF9TgiCLKg324rFqhPI%3D&amp;reserved=0">US Data Breaches Head for Another Record Year After 11% Surge</a></u></li>
</ul>



<h3 class="wp-block-heading">Patch Tuesday</h3>



<p><strong>Microsoft August 2025 Patch Tuesday</strong><br>108 vulnerabilities disclosed, including 13 critical and 1 zero-day. By category:</p>



<ul class="wp-block-list">
<li><strong>44</strong> Elevation of Privilege</li>



<li><strong>35</strong> Remote Code Execution</li>



<li><strong>18</strong> Information Disclosure</li>



<li><strong>9 </strong>Spoofing</li>



<li><strong>4</strong> Denial of Service</li>
</ul>



<h3 class="wp-block-heading">Critical Common Vulnerabilities and Exposures (CVEs)</h3>



<h4 class="wp-block-heading">Windows Zero-Day</h4>



<ul class="wp-block-list">
<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=http%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fen-US%2Fadvisory%2FCVE-2025-33053&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180056158%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=WEOpGRFM2%2Bwl%2BN8x8AzWpSC3KTVSNt6nUaw%2FsVJKiWE%3D&amp;reserved=0">CVE-2025-33053</a><a href="https://nam10.safelinks.protection.outlook.com/?url=http%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fen-US%2Fadvisory%2FCVE-2025-33053&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180066944%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=Ze8%2FTCEd3Stix9wC4BPv8Nc3s2PZVY324Jrsly8Sz%2B4%3D&amp;reserved=0">&nbsp;</a></u>– Windows Kerberos Elevation of Privilege Vulnerability</strong><br>&#8211; Windows Kerberos vulnerability allows an authenticated attacker to gain domain administrator privileges through relative path traversal. Microsoft states an attacker would need elevated access to&nbsp;<strong>msds-groupMSAMembership</strong>&nbsp;and&nbsp;<strong>mdsd-ManagedAccountPrecededByLink</strong>&nbsp;attributes to exploit the flaw.<br>&#8211; Vulnerability is publicly disclosed but is not actively being exploited in the wild.</li>
</ul>



<h4 class="wp-block-heading">Other Critical CVE&#8217;s Worth Mentioning</h4>



<ul class="wp-block-list">
<li><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-53793&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180078353%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=7U%2Bh47kWWfgTzLMInfh%2BGqTa62btfvP1IhTQd1xNm3Q%3D&amp;reserved=0"><strong>CVE-2025-53793</strong></a> – Azure Stack Hub Information Disclosure Vulnerability</li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-49707&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180093311%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=GbVHmfdi1D9SkkEXChM%2BW4IkkKtKpalWZF3B%2FREdSv8%3D&amp;reserved=0"><strong>CVE-2025-49707</strong></a></u>&nbsp;– Azure Virtual Machines Spoofing Vulnerability</li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-53781&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180108168%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=4ZL%2BRK0v0TvOGdMGCvQ5d3oeB6PjAfKCymCEc2%2BBk5s%3D&amp;reserved=0"><strong>CVE-2025-53781</strong></a></u>&nbsp;– Azure Virtual Machines Information Disclosure Vulnerability</li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-50176&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180123854%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=Dz2%2B4Sue1GaH%2BotSANZZ7LkI5JkP2%2B847frMFSRFrKc%3D&amp;reserved=0"><strong>CVE-2025-50176</strong></a></u>&nbsp;– DirectX Graphics Kernel Remote Code Execution Vulnerability</li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-50165&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180139526%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=7305TZ%2FL9QA7%2BDkWME3po%2BwTfFVcwHDakp79rfMVQjo%3D&amp;reserved=0"><strong>CVE-2025-50165</strong></a></u>&nbsp;– Windows Graphics Component Remote Code Execution Vulnerability</li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-53740&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180154947%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=Hs5qSmee%2FnkypdMJ9rppooX%2FZnuN9brLLDqRExdwSok%3D&amp;reserved=0">CVE-2025-53740</a></u>&nbsp;/&nbsp;<u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-53731&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180169444%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=P%2Fa%2F6JZXapzf8ALF%2FLlA3BHQvov8j9efaGKNi6WIMt4%3D&amp;reserved=0">53731</a></u></strong>&nbsp;– Microsoft Office Remote Code Execution Vulnerability</li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-53784&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180185312%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=Huuu4RbFuPS6FetiWek08q0P97EfNllZiXw1xmYaSn4%3D&amp;reserved=0">CVE-2025-53784</a></u>&nbsp;/&nbsp;<u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-53733&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180199856%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=f7gxMojfVfkc%2FZo4xaYZJhqt1S6l5N6IayC52pWl2NQ%3D&amp;reserved=0">53733</a></u></strong>&nbsp;– Microsoft Word Remote Code Execution Vulnerability</li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-48807&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180214611%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=62akWHUQ%2BK7Y2b%2FL98TU2QZvYOErJ86xPNUrYAO2kL0%3D&amp;reserved=0"><strong>CVE-2025-48807</strong></a></u>&nbsp;– Windows Hyper-V Remote Code Execution Vulnerability</li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-53766&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180229701%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=rvT7GfLdxHyzliiKluvECYf9P78fDgi2f2Kx4Ra15LE%3D&amp;reserved=0"><strong>CVE-2025-53766</strong></a></u>&nbsp;– GDI+ Remote Code Execution Vulnerability</li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fvulnerability%2FCVE-2025-50177&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180245126%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=jVDyNn7WardeVitV%2BxtCvGMyucRIvhPtLn%2FeCY7x23U%3D&amp;reserved=0"><strong>CVE-2025-50177</strong></a></u> – Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability</li>
</ul>



<h4 class="wp-block-heading">3rd Party Critical CVE&#8217;s Worth Mentioning</h4>



<h5 class="wp-block-heading"><strong>Adobe Products<em> *</em></strong></h5>



<p>Adobe released emergency updates for two zero-day flaws in Adobe Experiece Manager (AEM) Forms on JEE after a proof-of-concept exploit chain was disclosed that can be used for unauthenticated, remote code execution on vulnerable instances. These zero-day vulnerabilities are described below.</p>



<ul class="wp-block-list">
<li><a style="font-weight: bold; text-decoration: underline;" href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Faem-forms%2Fapsb25-82.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180272062%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=2MHq6Jpnk4bCpuHm7gLXg6Xi9S2OnYB%2FxLv08U4b16c%3D&amp;reserved=0"><strong>CVE-2025-54253</strong></a>&nbsp;– Misconfiguration allowing arbitrary code execution. Rated &#8220;Critical&#8221; with a CVSS score of 8.6.</li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Faem-forms%2Fapsb25-82.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180288679%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=mYlTZ9QRNJHI414WVp5t9xdMJyR8X%2FGfukneJPokpKI%3D&amp;reserved=0"><strong>CVE-2025-54254</strong></a></u> – Improper Restriction of XML External Entity Reference (XXE) allowing arbitrary file system read. Rated &#8220;Critical&#8221; with a maximum-severity 10.0 CVSS score.</li>
</ul>



<p>Adobe also released 13 patches covering a total of 85 vulnerabilities. Of these, 38 of the flaws are rated as critical. The flaws could lead to application Denial-of-Service, arbitrary code execution, arbitrary file system read, memory leak, privilege escalation, and security feature bypass within varying Adobe products, listed below.</p>



<ul class="wp-block-list">
<li><a style="font-weight: bold; text-decoration: underline;" href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fanimate%2Fapsb25-73.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180304268%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=146bZpqO60sE4NbTuc%2FBP7b7TFEqiB3K4sth9sGSXGA%3D&amp;reserved=0">Animate</a></li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fmagento%2Fapsb25-71.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180320530%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=DKlfxvYByrokmzEZZmqOjUqX9sEWq2IPVzGQNWjSRWk%3D&amp;reserved=0">Commerce</a></u></strong></li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fdimension%2Fapsb25-84.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180336356%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=nXMtwfJ8JApJPXr33WA9Cisbcc391VYlNRNmmu8R%2FCw%3D&amp;reserved=0">Dimension</a></u></strong></li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fframemaker%2Fapsb25-83.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180350169%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=%2Fg4AZSXAB11tsVrYVnIZV55opL7Yh9qPNH85HUGVeUA%3D&amp;reserved=0">FrameMaker</a></u></strong></li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fillustrator%2Fapsb25-74.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180361337%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=DIKgJDQdd9g5mPJQbpMZJNSOD8EEv0XZj19sz%2B6AH5Q%3D&amp;reserved=0">Illustrator</a></u></strong></li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Findesign%2Fapsb25-79.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180372106%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=ONaB6HDiZ5JXoTE3yoLCR2u%2BNArHXPAW9x3SP6mVa%2Bk%3D&amp;reserved=0">InDesign</a></u></strong></li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fincopy%2Fapsb25-80.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180383304%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=tnIDFLa7CYJIdUiOjrtAkBHE7gII76BH3ZvIEYG0Ib8%3D&amp;reserved=0">InCopy</a></u></strong></li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fphotoshop%2Fapsb25-75.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180394627%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=y4X63iDZC%2FEghT0P%2F57yaWco%2BKUE0Qup74iaHEHPCHY%3D&amp;reserved=0">Photoshop</a></u></strong></li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fsubstance3d-modeler%2Fapsb25-76.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180405759%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=6K%2BnwIVcDWG52sRBSrKBCOeDjDtL0raCUaWR%2FTlZhvI%3D&amp;reserved=0">Substance 3D Modler</a></u></strong></li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fsubstance3d_painter%2Fapsb25-77.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180416742%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=aiKeVxU%2BudNfpgzpg7slP0aBfZDgjf9dvOlWB3wpJ6s%3D&amp;reserved=0">Substance 3D Painter</a></u></strong></li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fsubstance3d-sampler%2Fapsb25-78.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180428883%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=3mXC0bthuufy6%2B7VJ%2F0iceBwxWy4o056mZZVOJIhukA%3D&amp;reserved=0">Substance 3D Sampler</a></u></strong></li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fsubstance3d_stager%2Fapsb25-64.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180443566%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=I4X8Ntbv1Iir7crZrMEtbHYTVIIqCBSy83uNSZETAYc%3D&amp;reserved=0">Substance 3D Stager</a></u></strong></li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fsubstance3d-viewer%2Fapsb25-72.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180457487%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=s4W8I2LEIlmTzPkgbPmqI9j1AwcHaEZ8aDaTRxgjiLM%3D&amp;reserved=0">Substance 3D</a><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fsubstance3d-viewer%2Fapsb25-72.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180470481%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=1gut9smyDmbwDRDI7HxnoUCFbi1SVZ0WaV10CaNiuNc%3D&amp;reserved=0">&nbsp;</a><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fhelpx.adobe.com%2Fsecurity%2Fproducts%2Fsubstance3d-viewer%2Fapsb25-72.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180485744%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=uNlf%2FxShxMMOgqQ4muzSAxy76spSOUzUpfC7%2FW61aPE%3D&amp;reserved=0">Viewer</a></u></strong></li>
</ul>



<h5 class="wp-block-heading">Android</h5>



<p><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsource.android.com%2Fdocs%2Fsecurity%2Fbulletin%2F2025-08-01%232025-08-05-security-patch-level-vulnerability-details&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180497673%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=dxOB8I4mrWP3%2B1dQy54LhNht7oopJsXjfByvUZxJki8%3D&amp;reserved=0">Google has released security patches for six vulnerabilities in Android&#8217;s August 2025 security update, including two Qualcomm flaws exploited in targeted attacks.</a></u></p>



<h5 class="wp-block-heading"><strong>Cisco <em>*</em></strong></h5>



<ul class="wp-block-list">
<li><a style="font-weight: bold; text-decoration: underline;" href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsec.cloudapps.cisco.com%2Fsecurity%2Fcenter%2Fcontent%2FCiscoSecurityAdvisory%2Fcisco-sa-ise-unauth-rce-ZAd2GnJ6&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180508105%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=V6laX9EIERFOqm7Luh8CqC4uH9oHYNjZl3X9O9tqUkE%3D&amp;reserved=0">CVE-2025-20281 / 20282 / 20337</a><strong>&nbsp;</strong>– Multiple vulnerabilities in<strong>&nbsp;Cisco Identity Services Engine (ISE)&nbsp;</strong>and<strong>&nbsp;Cisco ISE Passive Identity Connector (ISE-PIC)&nbsp;</strong>could allow an unauthenticated, remote attacker to issue commands on the underlying operating system as the root user.</li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsec.cloudapps.cisco.com%2Fsecurity%2Fcenter%2Fcontent%2FCiscoSecurityAdvisory%2Fcisco-sa-cuis-file-upload-UhNEtStm&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180519009%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=d07yNVjVJrjolXV%2FcNZJGRV4dbjQrcIlkFX8OqyTdMA%3D&amp;reserved=0">CVE-2025-20274</a></u>&nbsp;–&nbsp;</strong>A vulnerability in the web-based management interface of&nbsp;<strong>Cisco Unified Intelligence Center</strong>&nbsp;could allow an authenticated, remote attacker to upload arbitrary files to an affected device.</li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsec.cloudapps.cisco.com%2Fsecurity%2Fcenter%2Fcontent%2FCiscoSecurityAdvisory%2Fcisco-sa-20170629-snmp&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180529655%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=Cjh6IkXz%2BzH8FRcLMvAPNyYbOuDjH6mDZdogA%2FmAr8Y%3D&amp;reserved=0">CVE-2017-6736 / 6737 / 6738</a></u> – </strong>The Simple Network Management Protocol (SNMP) subsystem of<strong> Cisco IOS </strong>and<strong> IOS XE Software </strong>contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload.</li>
</ul>



<h5 class="wp-block-heading"><strong>Fortinet <em>*</em></strong></h5>



<ul class="wp-block-list">
<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.fortiguard.com%2Fpsirt%2FFG-IR-24-042&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180539911%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=4kEoep5CAf4PP1aXGcUSq9uiSl64SNEnGnIiZEmuwFM%3D&amp;reserved=0">CVE-2024-26009</a></u> </strong>– [HIGH] Weak Authentication FGFM Protocol in FortiOS, FortiProxy &amp; FortiPAM</li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.fortiguard.com%2Fpsirt%2FFG-IR-24-364&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180550404%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=a2d9LdUtt4qLKZp%2F2TrI8hyvnzBWwDbRYRhHzETcHPM%3D&amp;reserved=0">CVE-2025-25248</a></u> </strong>– [MEDIUM] Integer Overflow in FortiOS, FortiPAM and FortiProxy SSL-VPN RDP and VNC bookmarks</li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.fortiguard.com%2Fpsirt%2FFG-IR-25-173&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180560709%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=xtINXk7BsAU%2Bjsii4PvHKYo%2FwLcwsq5bP%2F%2FqdwMtpXw%3D&amp;reserved=0">CVE-2025-53744</a></u> </strong>– [MEDIUM] Incorrect Privilege Assignment in FortiOS Security Fabric</li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.fortiguard.com%2Fpsirt%2FFG-IR-23-209&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180571676%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=riEFnQauW%2FI29bkWlRouDqqCxPTRGfgh0CkFfwgP72k%3D&amp;reserved=0">CVE-2023-45584</a></u> </strong>– [MEDIUM] A double free vulnerability in FortiOS, FortiProxy &amp; FortiPAM administrative interfaces</li>



<li><strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.fortiguard.com%2Fpsirt%2FFG-IR-24-473&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180582113%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=x1y0%2Fo0vMO2CuPKIBtuuToQtzcSdQaEL5xeVAgUe6I4%3D&amp;reserved=0">CVE-2024-52964</a></u> </strong>– [MEDIUM] An Improper Limitation of a Pathname to a Restricted Directory (&#8216;Path Traversal&#8217;) vulnerability in FortiManager &amp; FortiManager Cloud</li>
</ul>



<h5 class="wp-block-heading"><strong>Google Chrome</strong></h5>



<ul class="wp-block-list">
<li>Updated Version – 139.0.7258.127/.128 for Windows, Mac and 139.0.7258.127 for Linux.</li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fchromereleases.googleblog.com%2F2025%2F08%2Fstable-channel-update-for-desktop_12.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180597093%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=gFyBfboTjVaMVKzAfNmWSksAL8NppK0crYJc2%2B2a%2BwM%3D&amp;reserved=0">Chrome Release: August 12th, 2025</a></u></li>
</ul>



<h5 class="wp-block-heading"><strong>Ivanti </strong>*</h5>



<ul class="wp-block-list">
<li>Ivanti has released updates for Ivanti Avalanche, Ivanti Virtual Application Delivery Control (vADC), and Ivanti Connect Secure, Policy Secure, ZTA Gateways and Neurons for Secure Access, which address&nbsp;<strong>3 medium severity vulnerabilities</strong>, and&nbsp;<strong>4 high severity vulnerabilities</strong>.</li>



<li><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ivanti.com%2Fblog%2Faugust-2025-security-update&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180609736%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=5%2BMajCWhr1ujMn99qryDk7qgS1FpmdCD2ZWnnIdqjcQ%3D&amp;reserved=0">August 2025 Security Update | Ivanti</a></u></li>
</ul>



<h5 class="wp-block-heading"><strong>SAP </strong>*</h5>



<p>In August 2025, SAP Security Patch Day saw the release of <strong><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.sap.com%2Fen%2Fmy-support%2Fknowledge-base%2Fsecurity-notes-news%2Faugust-2025.html&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180620303%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=yspL9ZTijQkuYkOAtL0PpKkG31iBGc2g0n3ySAMXO0o%3D&amp;reserved=0">15 new Security Notes</a></u></strong> and 4 updates to previously released Security Notes.</p>



<h5 class="wp-block-heading"><strong>TrendMicro </strong>*</h5>



<p><u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsuccess.trendmicro.com%2Fen-US%2Fsolution%2FKA-0020652&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180631952%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=C9iVNuVe4epWhLtAJeRazlriOoQjNGgmFb4RCyZJV0s%3D&amp;reserved=0">TrendMicro released a mitigation tool to protect against recently discovered command injection remote code execution (RCE) vulnerabilities on Apex One Management Console (on-premise)</a></u>.</p>



<h5 class="wp-block-heading"><strong>WinRAR</strong></h5>



<p><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.win-rar.com%2Fsinglenewsview.html%3F%26L%3D0%26tx_ttnews%255Btt_news%255D%3D283%26cHash%3Da64b4a8f662d3639dec8d65f47bc93c5&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180642470%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=Ix1g8mURq72SGfj699Al6UeQjU4xWmGDTqXlhsmKl04%3D&amp;reserved=0">WinRAR released a security update for an actively exploited path traversal bug that could lead to remote code execution</a>. </p>



<h5 class="wp-block-heading"><strong>7-Zi</strong>p</h5>



<p> <u><a href="https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fseclists.org%2Foss-sec%2F2025%2Fq3%2F82&amp;data=05%7C02%7Ckclark%40fortresssrm.com%7Cc3405ca93c624fec4e3f08dddb35885c%7Cb16ea9846943440e9b89b105948ec29d%7C0%7C0%7C638907745180652936%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=bJN4g%2BO8S4MqoFiU94sa7srGqKNGpt0%2Fu1J3gHk9Avk%3D&amp;reserved=0">7-Zip released a security update for a path traversal flaw that could lead to RCE</a></u>.</p>



<p><em>* Not handled by Fortress SRM. </em></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading">About Fortress SRM&#8217;s Vigilant Managed Cyber Hygiene Offering</h3>



<h4 class="wp-block-heading">Why Patching Matters</h4>



<p>Unpatched software is a leading cause of breaches—nearly 1 in 3 attacks exploit known vulnerabilities.</p>



<h4 class="wp-block-heading">Vigilant Managed Cyber Hygiene</h4>



<p> Fortress SRM&#8217;s Vigilant Managed Cyber Hygiene simplifies patch management. </p>



<ul class="wp-block-list">
<li>Automated updates with 97%+ success rate for Microsoft &amp; 100+ third-party applications</li>



<li>Critical patches, OS upgrades, and configuration updates for all devices, on/off network</li>



<li>24/7/365 U.S.-based monitoring and real-time reporting for full visibility</li>
</ul>



<h4 class="wp-block-heading">Stay Protected. Stay Proactive. </h4>



<p><a href="https://fortresssrmstg.wpenginepowered.com/managed-security/">Learn how Fortress SRM can enhance your cybersecurity strategy →</a></p>
<p>The post <a href="https://fortresssrmstg.wpenginepowered.com/threat-and-security-update-august-2025/">Threat and Security Update – August, 2025</a> appeared first on <a href="https://fortresssrmstg.wpenginepowered.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Security &#038; Threat Updates – July 2025</title>
		<link>https://fortresssrmstg.wpenginepowered.com/security-threat-updates-july-2025/</link>
		
		<dc:creator><![CDATA[Fortress SRM]]></dc:creator>
		<pubDate>Tue, 15 Jul 2025 15:41:38 +0000</pubDate>
				<category><![CDATA[Threat & Security Updates]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1732</guid>

					<description><![CDATA[<p>Attention Fortress SRM Patching Customers, Please see below updates on recent threat intelligence news, Microsoft’s July Patch Tuesday and other notable 3rd Party critical vulnerabilities. Recent in Threat Intelligence News: ...</p>
<p>The post <a href="https://fortresssrmstg.wpenginepowered.com/security-threat-updates-july-2025/">Security &amp; Threat Updates – July 2025</a> appeared first on <a href="https://fortresssrmstg.wpenginepowered.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Attention Fortress SRM Patching Customers,</p>



<p>Please see below updates on recent threat intelligence news, Microsoft’s July Patch Tuesday and other notable 3rd Party critical vulnerabilities.</p>



<p><strong>Recent in Threat Intelligence News:</strong></p>



<ul class="wp-block-list">
<li><strong><a href="https://www.scworld.com/brief/ai-driven-id-fraud-surges-195-globally" target="_blank" rel="noreferrer noopener">AI-driven ID fraud surges 195% globally</a></strong></li>



<li><strong><a href="https://cybersecuritynews.com/ai-tools-direct-users-phishing-sites/" target="_blank" rel="noreferrer noopener">AI Tools Like GPT Direct Users to Phishing Sites Instead of Legitimate Ones</a></strong></li>



<li><strong><a href="https://www.securityweek.com/apple-netflix-microsoft-sites-hacked-for-tech-support-scams/" target="_blank" rel="noreferrer noopener">Apple, Netflix, Microsoft Sites &#8216;Hacked&#8217; for Tech Support Scams </a></strong></li>



<li><strong><a href="https://cybersecuritynews.com/dmv-themed-phishing-attacks/" target="_blank" rel="noreferrer noopener">DMV-Themed Phishing Attacks Targeting U.S. Citizens to Steal Sensitive Data</a></strong></li>



<li><strong><a href="https://www.bleepingcomputer.com/news/security/google-warns-scattered-spider-hackers-now-target-us-insurance-companies/" target="_blank" rel="noreferrer noopener">Hackers switch to targeting U.S. insurance companies</a></strong></li>



<li><strong><a href="https://cyble.com/blog/hacktivists-launch-ddos-attacks-at-us-iran-bombings/" target="_blank" rel="noreferrer noopener">Hacktivists Launch DDoS Attacks At U.S. Following Iran Bombings</a></strong></li>



<li><strong><a href="https://www.ic3.gov/CSA/2025/250630.pdf" target="_blank" rel="noreferrer noopener">Iranian Cyber Actors May Target Vulnerable US Networks and Entities of Interest</a></strong></li>



<li><strong><a href="https://www.csoonline.com/article/4011379/iranian-cyber-threats-overhyped-but-cisos-cant-afford-to-let-down-their-guard.html" target="_blank" rel="noreferrer noopener">Iranian cyber threats overhyped, but CISOs can’t afford to let down their guard</a></strong></li>



<li><strong><a href="https://thehackernews.com/2025/06/massive-73-tbps-ddos-attack-delivers.html" target="_blank" rel="noreferrer noopener">Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider</a></strong></li>



<li><strong><a href="https://www.msspalert.com/brief/microsoft-tightens-security-defaults-for-windows-365-and-microsoft-365" target="_blank" rel="noreferrer noopener">Microsoft Tightens Security Defaults for Windows 365 and Microsoft 365</a></strong></li>



<li><strong><a href="https://blog.checkpoint.com/research/exposing-scattered-spider-new-indicators-highlight-growing-threat-to-enterprises-and-aviation/" target="_blank" rel="noreferrer noopener">Exposing Scattered Spider: New Indicators Highlight Growing Threat to Enterprises and Aviation</a></strong></li>



<li><strong><a href="https://cybernews.com/security/billions-credentials-exposed-infostealers-data-leak/" target="_blank" rel="noreferrer noopener">16 billion passwords exposed in infostealer data leak​</a></strong></li>
</ul>



<p><strong>Microsoft Vulnerabilities:</strong></p>



<p>Microsoft disclosed a total of&nbsp;<strong>137</strong>&nbsp;vulnerabilities this month affecting its current operating system, including&nbsp;<strong>14</strong>&nbsp;<strong>critical</strong>&nbsp;vulnerabilities and&nbsp;<strong>one</strong>&nbsp;<strong>zero-day</strong>&nbsp;vulnerability. June 2025 Patch Tuesday addresses vulnerabilities across multiple categories:</p>



<ul class="wp-block-list">
<li><strong>53</strong> Elevation of Privilege vulnerabilities</li>



<li><strong>41</strong> Remote Code Execution vulnerabilities</li>



<li><strong>18</strong> Information Disclosure vulnerabilities</li>



<li><strong>8</strong> Security Feature Bypass vulnerabilities</li>



<li><strong>6 </strong>Denial of Service vulnerabilities</li>



<li><strong>4</strong> Spoofing vulnerabilities</li>
</ul>



<p>The most critical Common Vulnerabilities and Exposures (CVEs) are highlighted below:</p>



<p><strong>&nbsp;&nbsp;&nbsp; Windows Zero-Days:</strong></p>



<ul class="wp-block-list">
<li><strong><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49719" target="_blank" rel="noreferrer noopener">CVE-2025-49719 </a>&#8211; Microsoft SQL Server Information Disclosure Vulnerability</strong></li>



<li>Microsoft SQL server vulnerability could allow a remote, unauthenticated attacker to access data from uninitialized memory through improper input validation.</li>



<li>Vulnerability is publicly disclosed and is not actively being exploited in the wild.</li>
</ul>



<p><strong>&nbsp;&nbsp;&nbsp; Other Critical CVE’s worth mentioning:</strong></p>



<ul class="wp-block-list">
<li><strong><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49697" target="_blank" rel="noreferrer noopener">CVE-2025-49697</a> / <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49695" target="_blank" rel="noreferrer noopener">49695</a> / <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49696" target="_blank" rel="noreferrer noopener">49696</a></strong> <strong>/ <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49702" target="_blank" rel="noreferrer noopener">49702</a></strong> <strong>– Microsoft Office Remote Code Execution Vulnerability</strong></li>



<li><strong><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49704" target="_blank" rel="noreferrer noopener">CVE-2025-49704</a></strong> <strong>– Microsoft SharePoint Remote Code Execution Vulnerability</strong></li>



<li><strong><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49717" target="_blank" rel="noreferrer noopener">CVE-2025-49717</a></strong> <strong>– Microsoft SQL Server Remote Code Execution Vulnerability</strong></li>



<li><strong><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49703" target="_blank" rel="noreferrer noopener">CVE-2025-49703</a> / <a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49698" target="_blank" rel="noreferrer noopener">49698</a></strong> <strong>– Microsoft Word Remote Code Execution Vulnerability</strong></li>



<li><strong><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-36350" target="_blank" rel="noreferrer noopener">CVE-2025-36350</a></strong> <strong>– AMD Transient Scheduler Attack in Store Queue</strong></li>



<li><strong><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-36357" target="_blank" rel="noreferrer noopener">CVE-2025-36357</a></strong> <strong>– AMD Transient Scheduler Attack in L1 Data Queue</strong></li>



<li><strong><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-47981" target="_blank" rel="noreferrer noopener">CVE-2025-47981</a></strong> <strong>– SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability</strong></li>



<li><strong><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-48822" target="_blank" rel="noreferrer noopener">CVE-2025-48822</a></strong> <strong>– Windows Hyper-V Discrete Device Assignment (DDA) Remote Code Execution Vulnerability</strong></li>



<li><strong><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-47980" target="_blank" rel="noreferrer noopener">CVE-2025-47980</a></strong> <strong>– Windows Imaging Component Information Disclosure Vulnerability</strong></li>



<li><strong><a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-49735" target="_blank" rel="noreferrer noopener">CVE-2025-49735</a></strong> <strong>– Windows KDC Proxy Service (KPSSVC) Remote Code Execution Vulnerability</strong></li>
</ul>



<p><strong>3rd&nbsp;Party Critical CVE’s worth mentioning:</strong></p>



<p><strong>Adobe Products&nbsp;<em>(not handled by FSRM)</em>:</strong></p>



<p>Adobe released 13 bulletins covering a total of 60 CVE’s. Of these, 39 of the flaws are rated as critical. The flaws could lead to arbitrary code execution, arbitrary file system read, memory leak, application Denial-of-Service, security feature bypass, and privilege escalation within varying Adobe products, listed below.</p>



<ul class="wp-block-list">
<li><strong><a href="https://helpx.adobe.com/security/products/after_effects/apsb25-49.html" target="_blank" rel="noreferrer noopener">After Effects</a></strong></li>



<li><strong><a href="https://helpx.adobe.com/security/products/substance3d-viewer/apsb25-54.html" target="_blank" rel="noreferrer noopener">Substance 3D Viewer</a></strong></li>



<li><strong><a href="https://helpx.adobe.com/security/products/audition/apsb25-56.html" target="_blank" rel="noreferrer noopener">Audition</a></strong></li>



<li><strong><a href="https://helpx.adobe.com/security/products/incopy/apsb25-59.html" target="_blank" rel="noreferrer noopener">InCopy</a></strong></li>



<li><strong><a href="https://helpx.adobe.com/security/products/indesign/apsb25-60.html" target="_blank" rel="noreferrer noopener">InDesign</a></strong></li>



<li><strong><a href="https://helpx.adobe.com/security/products/connect/apsb25-61.html" target="_blank" rel="noreferrer noopener">Connect</a></strong></li>



<li><strong><a href="https://helpx.adobe.com/security/products/dimension/apsb25-63.html" target="_blank" rel="noreferrer noopener">Dimension</a></strong></li>



<li><strong><a href="https://helpx.adobe.com/security/products/substance3d_stager/apsb25-64.html" target="_blank" rel="noreferrer noopener">Substance 3D Stager</a></strong></li>



<li><strong><a href="https://helpx.adobe.com/security/products/illustrator/apsb25-65.html" target="_blank" rel="noreferrer noopener">Illustrator</a></strong></li>



<li><strong><a href="https://helpx.adobe.com/security/products/framemaker/apsb25-66.html" target="_blank" rel="noreferrer noopener">FrameMaker</a></strong></li>



<li><strong><a href="https://helpx.adobe.com/security/products/aem-forms/apsb25-67.html" target="_blank" rel="noreferrer noopener">AEM Forms</a></strong></li>



<li><strong><a href="https://helpx.adobe.com/security/products/aem-screens/apsb25-68.html" target="_blank" rel="noreferrer noopener">AEM Screens</a></strong></li>



<li><strong><a href="https://helpx.adobe.com/security/products/coldfusion/apsb25-69.html" target="_blank" rel="noreferrer noopener">ColdFusion</a></strong></li>
</ul>



<p><strong>Cisco&nbsp;<em>(not handled by FSRM)</em>:</strong></p>



<ul class="wp-block-list">
<li><strong><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-ssh-m4UBdpE7" target="_blank" rel="noreferrer noopener">CVE-2025-20309</a></strong> <strong>– Cisco Unified Communications Manager Static SSH Credentials Vulnerability (Critical)</strong></li>



<li><strong><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6" target="_blank" rel="noreferrer noopener">CVE-2025-20281 / 20282</a> – Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities (Critical)</strong></li>
</ul>



<p><strong>Thunderbird:</strong></p>



<ul class="wp-block-list">
<li><strong><a href="https://www.mozilla.org/en-US/security/advisories/mfsa2025-54/" target="_blank" rel="noreferrer noopener">Security Vulnerabilities fixed in Thunderbird 140 — Mozilla</a></strong></li>
</ul>



<p><strong>Fortinet&nbsp;<em>(not handled by FSRM)</em>:</strong></p>



<ul class="wp-block-list">
<li><strong><a href="https://www.fortiguard.com/psirt/FG-IR-24-035" target="_blank" rel="noreferrer noopener">CVE-2024-27779</a> – Insufficient Session Expiration Vulnerability in FortiSandbox &amp; FortiIsolator</strong></li>



<li><strong><a href="https://www.fortiguard.com/psirt/FG-IR-24-511" target="_blank" rel="noreferrer noopener">CVE-2024-52965</a> – PKI via API Authentication Granted with an Invalid Certificate in FortiOS &amp; FortiProxy</strong></li>



<li><strong><a href="https://www.fortiguard.com/psirt/FG-IR-25-026" target="_blank" rel="noreferrer noopener">CVE-2025-24477</a> – Heap-based Buffer Overflow Vulnerability in FortiOS cw_stad daemon</strong></li>



<li><strong><a href="https://www.fortiguard.com/psirt/FG-IR-24-053" target="_blank" rel="noreferrer noopener">CVE-2025-55599</a> – Improperly Implemented Security Check for Standard vulnerability in FortiOS and FortiProxy</strong></li>



<li><strong><a href="https://www.fortiguard.com/psirt/FG-IR-24-437" target="_blank" rel="noreferrer noopener">CVE-2025-24474</a> – Improper Neutralization of Special Elements used in an SQL Command (&#8216;SQL Injection&#8217;) vulnerability in FortiManager and FortiAnalyzer</strong></li>
</ul>



<p><strong>Google Chrome:</strong></p>



<ul class="wp-block-list">
<li>Google released a security update to fix exploitable zero-day vulnerability – <strong><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-6554" target="_blank" rel="noreferrer noopener">CVE-2025-6554</a></strong></li>



<li>Updated version &#8211; 138.0.7204.100/.101 for Windows, Mac and 138.0.7204.100 for Linux.</li>



<li>No Android Security patches were released for July 2025.</li>



<li><strong><a href="https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop.html" target="_blank" rel="noreferrer noopener">Chrome release: July 8th, 2025</a></strong></li>
</ul>



<p><strong>Ivanti&nbsp;<em>(not handled by FSRM)</em>:</strong></p>



<ul class="wp-block-list">
<li>Ivanti has released updates for Ivanti Connect Secure (ICS), Ivanti Policy Secure (IPS), Ivanti Endpoint Manager Mobile (EPMM), and Ivanti Endpoint Manager (EPM) which address <strong>6 medium</strong> severity vulnerabilities, and <strong>5 high</strong> severity vulnerabilities.</li>



<li><strong><a href="https://www.ivanti.com/blog/july-security-update-2025" target="_blank" rel="noreferrer noopener">July 2025 Security Update | Ivanti</a></strong></li>
</ul>



<p><strong>SAP&nbsp;<em>(not handled by FSRM)</em>:</strong></p>



<ul class="wp-block-list">
<li>In July 2025, SAP Security Patch Day saw the release of <strong><a href="https://support.sap.com/en/my-support/knowledge-base/security-notes-news/july-2025.html" target="_blank" rel="noreferrer noopener">27 new Security Notes</a> </strong>and 4 updates to previously released Security Notes.</li>
</ul>



<h2 class="wp-block-heading"><strong>About Fortress SRM’s Vigilant Managed Cyber Hygiene Offering</strong></h2>



<p>Software vulnerabilities are a leading cause of cyberattacks, with nearly one-third of breaches stemming from unpatched, known flaws.</p>



<p>Maintaining secure and up-to-date operating systems and applications is a complex, time-consuming task that often strains internal IT resources. Fortress SRM’s&nbsp;<strong>Vigilant Managed Cyber Hygiene&nbsp;</strong>with 24/7/365 U.S.-based Monitoring Service&nbsp;simplifies patch management by delivering automated, high-efficacy updates (97%+ success rate) for Microsoft and over 100 third-party applications. This includes critical security patches, OS upgrades, and key configuration updates—across all devices, on or off the network.</p>



<p>Our real-time reporting console offers full visibility into patch status and activity, helping organizations maintain a strong, proactive security posture.</p>



<p><strong>Ready to strengthen your cyber hygiene?</strong></p>



<p>Contact us at&nbsp;<a href="https://fortresssrmstg.wpenginepowered.com/contact-us/" target="_blank" rel="noreferrer noopener">Contact Us | Fortress Security Risk Management</a>&nbsp;(<a href="http://fortresssrmstg.wpenginepowered.com/" target="_blank" rel="noreferrer noopener">fortresssrm.com</a>) to learn how Fortress SRM can help support and enhance your organization’s cybersecurity strategy.</p>
<p>The post <a href="https://fortresssrmstg.wpenginepowered.com/security-threat-updates-july-2025/">Security &amp; Threat Updates – July 2025</a> appeared first on <a href="https://fortresssrmstg.wpenginepowered.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber Threat Bulletin Summary: Iranian Cyber Actors Targeting U.S. Networks and Operational Technology</title>
		<link>https://fortresssrmstg.wpenginepowered.com/cyber-threat-bulletin-summary-iranian-cyber-actors-targeting-u-s-networks-and-operational-technology/</link>
		
		<dc:creator><![CDATA[kclark@fortresssrm.com]]></dc:creator>
		<pubDate>Tue, 01 Jul 2025 18:54:32 +0000</pubDate>
				<category><![CDATA[Threat & Security Updates]]></category>
		<guid isPermaLink="false">https://fortresssrmstg.wpenginepowered.com/?p=1708</guid>

					<description><![CDATA[<p>Federal cybersecurity agencies—including CISA, the FBI, DC3, and NSA—have issued a joint advisory urging U.S. organizations to remain vigilant amid increased cyber activity linked to Iranian-affiliated actors. These agencies have ...</p>
<p>The post <a href="https://fortresssrmstg.wpenginepowered.com/cyber-threat-bulletin-summary-iranian-cyber-actors-targeting-u-s-networks-and-operational-technology/">Cyber Threat Bulletin Summary: Iranian Cyber Actors Targeting U.S. Networks and Operational Technology</a> appeared first on <a href="https://fortresssrmstg.wpenginepowered.com">Fortress SRM</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Federal cybersecurity agencies—including CISA, the FBI, DC3, and NSA—have issued a joint advisory urging U.S. organizations to remain vigilant amid increased cyber activity linked to Iranian-affiliated actors. These agencies have observed incidents affecting the operational technology (OT) and industrial control systems (ICS) of critical infrastructure entities, particularly those with connections to Israeli defense or research sectors.</p>



<p>Fortress Security Risk Management has also conducted an independent Threat Intelligence assessment focused on Iranian nation-state cyber threats. The findings and analysis are detailed in Appendix A.</p>



<h2 class="wp-block-heading">Key Threats</h2>



<p>Operational Technology (OT) Vulnerabilities</p>



<ul class="wp-block-list">
<li>Internet-facing OT and ICS devices are at high risk due to weak authentication and outdated software.</li>



<li>Threat actors exploit default passwords, unpatched systems, and unsecured remote access to disrupt operations.</li>
</ul>



<p>Iranian-Affiliated Cyber Activity</p>



<ul class="wp-block-list">
<li>Likely targets include critical infrastructure and Defense Industrial Base (DIB) companies.</li>



<li>Tactics include ransomware, DDoS campaigns, data exfiltration, and attacks on OT systems such as PLCs and HMIs.</li>
</ul>



<h2 class="wp-block-heading">Recommended Mitigations</h2>



<p>For OT and ICS Environments</p>



<ul class="wp-block-list">
<li>Disconnect OT from Public Internet: Remove unnecessary internet exposure and enforce allowlist access.</li>



<li>Secure Remote Access: Use VPNs, private IPs, strong passwords, and phishing-resistant MFA.</li>



<li>Segment Networks: Separate IT and OT environments using firewalls and demilitarized zones (DMZs).</li>



<li>Patch Regularly: Apply updates to address known vulnerabilities.</li>



<li>Plan for Manual Operations: Test backups and fail-safes to maintain continuity during disruptions.</li>
</ul>



<p>For General Cyber Threats</p>



<ul class="wp-block-list">
<li>Enforce Strong Credentials: Replace default or weak passwords and enable MFA.</li>



<li>Monitor Access Logs: Track remote access and configuration changes for anomalies.</li>



<li>Develop Incident Response Plans: Ensure your team is prepared to respond and recover quickly.</li>



<li>Protect Sensitive Data: Implement controls to reduce the impact of potential leaks or breaches.</li>
</ul>



<h2 class="wp-block-heading">Helpful Resources</h2>



<ul class="wp-block-list">
<li><a href="https://www.cisa.gov/topics/cyber-threats-and-advisories/nation-state-cyber-actors/iran/publications"></a><a href="https://www.cisa.gov/topics/cyber-threats-and-advisories/advanced-persistent-threats/iran">Iran Threat Overview and Advisories | CISA</a></li>



<li><a href="https://www.cisa.gov/topics/cyber-threats-and-advisories/advanced-persistent-threats/iran">I</a><a href="https://www.cisa.gov/topics/cyber-threats-and-advisories/nation-state-cyber-actors/iran/publications">ran State-Sponsored Cyber Threat: Advisories | CISA</a></li>



<li><a href="https://www.cisa.gov/resources-tools/resources/understanding-and-responding-distributed-denial-service-attacks">Understanding and Responding to Distributed Denial-Of-Service Attacks | CISA</a></li>
</ul>



<h2 class="wp-block-heading">Report Suspicious Activity</h2>



<ul class="wp-block-list">
<li>CISA: <a href="mailto:report@cisa.gov">report@cisa.gov</a> | 888-282-0870</li>



<li>FBI: <a href="www.ic3.gov%20"><a href="https://www.ic3.gov/">Home Page &#8211; Internet Crime Complaint Center (IC3)</a></a> or contact your local field office</li>



<li>NSA: <a href="mailto:CybersecurityReports@nsa.gov"><a href="mailto:CybersecurityReports@nsa.gov">CybersecurityReports@nsa.gov</a></a></li>
</ul>



<h2 class="wp-block-heading">How Fortress SRM Can Help</h2>



<p>Fortress SRM is here to support your organization with:</p>



<ul class="wp-block-list">
<li>Vulnerability assessments</li>



<li>OT/ICS security reviews</li>



<li>Incident response planning</li>



<li>Threat monitoring and mitigation</li>
</ul>



<p>Contact us today at <a href="mailto:bettersecurity@fortresssrm.com">bettersecurity@fortresssrm.com</a> to schedule a consultation or learn more about how we can help strengthen your cybersecurity posture.</p>



<h2 class="wp-block-heading">Appendix A – Fortress Cyber Risk Management Independent Threat Intelligence Assessment</h2>



<p>Appendix A dives deeper into specific threat actors, their unique tactics, and prominent attack vectors, enabling organizations to tailor defenses against these precise threats.</p>



<h2 class="wp-block-heading">Section 1 &#8211; Key Iranian-Affiliated Threat Actors</h2>



<p><strong>APT33 (Elfin)</strong> &#8211; Targets the aerospace and energy sectors through spear-phishing campaigns and credential theft operations.</p>



<p><strong>APT34 (OilRig)</strong> &#8211; Focuses on financial, energy, and telecommunications industries; known for deploying web shell implants and phishing techniques.</p>



<p><strong>APT35 (Charming Kitten) </strong>&#8211; Engages in credential-harvesting campaigns targeting dissidents, academics, and non-governmental organizations (NGOs).</p>



<p><strong>APT42</strong> &#8211; Exploits vulnerabilities in VPN appliances and Fortinet devices to establish persistent access within targeted networks.</p>



<p><strong>Emennet Pasargad</strong> &#8211; Specializes in intrusions into Operational Technology (OT) and Industrial Control Systems (ICS), leveraging custom malware and zero-day exploits.</p>



<p><strong>MuddyWater (SeedWorm)</strong> &#8211; Conducts low-profile cyber espionage using backdoors and remote access tools.</p>



<p><strong>Pioneer Kitten</strong> &#8211; Performs reconnaissance on supply chains and deploys bespoke malware for targeted intrusions.</p>



<h2 class="wp-block-heading">Section 2 – Prominent Iranian Threat Vectors and Tactics</h2>



<ul class="wp-block-list">
<li>Spear-phishing &amp; credential harvesting</li>



<li>Watering-hole attacks</li>



<li>Exploitation of Microsoft Exchange &amp; Fortinet vulnerabilities</li>



<li>Destructive wiper malware (e.g., Shamoon)</li>



<li>ICS/OT intrusion &amp; process-disruption payloads (e.g., Triton/HatMan)</li>



<li>Ransomware &amp; distributed-denial-of-service (DDoS)</li>



<li>Remote code execution via exposed services</li>



<li>Supply-chain compromise of legitimate software</li>



<li>Illicit procurement &amp; sanctions evasion to support cyber operations</li>
</ul>


<a class="wp-block-read-more" href="https://fortresssrmstg.wpenginepowered.com/cyber-threat-bulletin-summary-iranian-cyber-actors-targeting-u-s-networks-and-operational-technology/" target="_self">Read more<span class="screen-reader-text">: Cyber Threat Bulletin Summary: Iranian Cyber Actors Targeting U.S. Networks and Operational Technology</span></a>


<div data-wp-interactive="core/file" class="wp-block-file"><object data-wp-bind--hidden="!state.hasPdfPreview" hidden class="wp-block-file__embed" data="https://fortresssrmstg.wpenginepowered.com/wp-content/uploads/2025/07/Iranian-Cyber-Actors-Advisory-June-2025.pdf" type="application/pdf" style="width:100%;height:600px" aria-label="Embed of Iranian Cyber Actors Advisory - June 2025."></object><a id="wp-block-file--media-1799900e-cee6-4c87-9c18-7ea305f944f9" href="https://fortresssrmstg.wpenginepowered.com/wp-content/uploads/2025/07/Iranian-Cyber-Actors-Advisory-June-2025.pdf">Iranian Cyber Actors Advisory &#8211; June 2025</a><a href="https://fortresssrmstg.wpenginepowered.com/wp-content/uploads/2025/07/Iranian-Cyber-Actors-Advisory-June-2025.pdf" class="wp-block-file__button wp-element-button" download aria-describedby="wp-block-file--media-1799900e-cee6-4c87-9c18-7ea305f944f9">Download</a></div>


<p>The post <a href="https://fortresssrmstg.wpenginepowered.com/cyber-threat-bulletin-summary-iranian-cyber-actors-targeting-u-s-networks-and-operational-technology/">Cyber Threat Bulletin Summary: Iranian Cyber Actors Targeting U.S. Networks and Operational Technology</a> appeared first on <a href="https://fortresssrmstg.wpenginepowered.com">Fortress SRM</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
