Operations | Monitoring | ITSM | DevOps | Cloud

New Feature - Vulnerable System Drivers Monitoring

Vulnerable system drivers continue to be a vector exploited by attackers to compromise systems. In eG Enterprise version 7.5 we added a number of periodic security checks to assist administrators proactively identify weaknesses, including vulnerable system drivers monitoring.This new capability is supported for a Windows OS, when using a VM agent for inside view monitoring and / or when monitoring an Azure Virtual Desktop session host.

Tutorial: How to Remediate Vulnerabilities with Puppet Enterprise Advanced Patching

The rate at which vulnerabilities are being exploited is on the rise. The VulnCheck company, which specializes in vulnerability intelligence, found that in Q1 2025, 28.3% of vulnerabilities were exploited within 1 day of CVE disclosure. Keeping your systems up to date is more important than ever. The reality is that many security teams are running scans and then exporting to giant spreadsheets, which are “tossed over the wall” to the Operations team with little context.

Mastering Risk-Based Vulnerability Management with Ivanti Neurons

Mastering Risk-Based Vulnerability Management with Ivanti Neurons Ivanti Neurons enhances risk-based vulnerability management by focusing on aggregation prioritization. It collects data from various sources, integrates with over 70 IT service management systems, and emphasizes the importance of contextual risk assessment. A prioritization dashboard helps security teams address critical findings, while automation through playbooks streamlines the remediation process. The content also covers scoring metrics and a knowledge base for trending vulnerabilities.

Enhancing Vulnerability Management Through Exposure Management

Exposure management improves vulnerability management by integrating various attack surfaces and enhancing asset visibility. It promotes a proactive approach to continuously manage threats and exposures. Organizations define their risk appetite for quicker decision-making on vulnerabilities. A zero day response strategy enables swift action on critical vulnerabilities. Ivanti's approach includes strong asset discovery and prioritization, utilizing threat intelligence for effective risk management.

What's the Difference Between a Vulnerability Scan and a Penetration Test?

You want to secure your systems, that's a good first step. But then you're told you need a vulnerability scan. Or maybe a pen test. Maybe both? They sound similar, but they aren't the same thing. In fact, they serve very different purposes. Understanding the difference could save your team from false confidence, wasted money, or security gaps you never saw coming. If you're trying to figure out what's right for your business, this breakdown should help. And once you're running tests, tools likepentest reporting at Cyver Core help your team stay organized and actually fix what matters.

HAProxy Enterprise WAF protects against Microsoft SharePoint CVE-2025-53770 / CVE-2025-53771

Critical vulnerabilities in Microsoft SharePoint (CVE-2025-53770 and CVE-2025-53771) are currently being exploited in the wild. Disclosed on July 19, 2025, these vulnerabilities have CVSS scores of 9.8 and 7.1 respectively, indicating severe and high risk. CVE-2025-53770 affects on-premises Microsoft SharePoint Servers, allowing unauthorized attackers to execute code over a network. CVE-2025-53771 affects Microsoft Office SharePoint, allowing authorized attackers to perform spoofing over a network.

How to monitor your Laravel app for critical vulnerabilities using Oh Dear

A critical security vulnerability was recently discovered in Livewire v3 that allows remote code execution, as Stephen Rees-Carter reported on Securing Laravel. While patches are released quickly, many applications remain vulnerable because developers simply don't know about the issue yet. Oh Dear's Application Health monitoring solves this by continuously checking your production environment for security vulnerabilities and immediately notifying you when issues are detected.

OWASP CI/CD Part 9: Improper Artifact Integrity Validation

Improper artifact integrity validation is a critical vulnerability in CI/CD pipelines characterised by insufficient mechanisms to cryptographically verify the authenticity and integrity of code and build artifacts traversing the pipeline. When these controls are weak or absent, adversaries with access to any pipeline stage can inject malicious or tampered artifacts that appear legitimate, enabling undetected propagation through the pipeline and eventual deployment into production environments.

Critical RCE Vulnerability in mcp-remote: CVE-2025-6514 Threatens LLM Clients

The JFrog Security Research team has recently discovered and disclosed CVE-2025-6514 – a critical (CVSS 9.6) security vulnerability in the mcp-remote project – a popular tool used by Model Context Protocol clients. The vulnerability allows attackers to trigger arbitrary OS command execution on the machine running mcp-remote when it initiates a connection to an untrusted MCP server, posing a significant risk to users – a full system compromise.