Technology News from Around the World, Instantly on Oracnoos!

Zimbra Releases Security Updates for SQL Injection, Stored XSS, and SSRF Vulnerabilities - Related to leader’s, custom, security, injection,, sql

A Cybersecurity Leader’s Guide to SecVal in 2025

A Cybersecurity Leader’s Guide to SecVal in 2025

For many security leaders security validation has become a top priority. After the introduction of the Continuous Threat Exposure Management (CTEM) framework by Gartner™ in 2022, security validation is well on its way to becoming mainstream.

As attack surfaces expanded and threats grew more complex, vulnerability management alone became insufficient for effective security posture management. Since 2015, solutions like BAS, RBVM, EASM, and automated penetration testing have stepped in to address these gaps.

These technologies assess an environment’s security by analyzing the attack surface, simulating realistic attacks, or leveraging threat intelligence. The result? A prioritized roadmap of mitigation steps based on exploitability risk and business impact.

Put simply, SecVal is a "battle test" of your defenses.

Today, the landscape has advanced further with agentless, user-friendly adversarial validation tools. Below are three impactful ways to leverage them for improved security.

Imagine this, your CEO walks into your office and tells you he heard about the latest wave of LockBit and the devastation that it’s caused. Then he asks the ever-looming question “Would we be okay?”.

Not an easy one to answer. Inevitably it's going to start with “It depends…” and that’s not the reassurance he’s seeking. This is where validating your environment against ransomware comes in handy.

It’s possible to keep a proactive stance against ransomware by emulating strains—such as LockBit, REvil, Maze, or Conti — to assess how effectively defenses detect, contain, and neutralize these threats.

Breaches often stem from anomalies—one naive user, one un-updated endpoint, or a single misconfigured firewall.

Automated security validation ensures comprehensive coverage by testing every endpoint, pinpointing vulnerabilities or exceptions that could allow ransomware to infiltrate and spread.

Did you know that 31% of breaches and 77% of web application attacks involved stolen credentials?? (Verizon’s 2024 DBIR).

Leaked credentials are what enabled the Colonial Pipeline attack in 2021. The attackers gained access through a compromised VPN account that was no longer in active use.

The password for this account was part of a batch of leaked credentials found on the dark web.

Organizations are proactively testing for leaked, harvested, or weak credentials, where they can spot and de-activate exposed credentials before attackers get the chance to use them. This involves scanning the dark web for leaked credentials, simulating credential-stuffing attacks, checking for reused or easily guessed passwords, and flagging gaps in password policies.

Security validation ensures that credential-based defenses, like MFA, SSO, and account lockout mechanisms, function as intended. By safely validating the use of compromised credentials, organizations can assess credential-based defenses, closing the loop on a vital layer of security.

You’ve been tasked with urgently patching the latest critical CVE, you rush to download the latest software enhancement, install it, and then what? Do you know with certainty that it works or hasn’t inadvertently created another back door?

Security validation can be used to ensure that patches are not just deployed but effective.

A prime example is the infamous Equifax data breach, where failure to patch a known vulnerability in Apache Struts led to the exposure of sensitive data from 147 million individuals.

A routine validation after patching would have avoided this by confirming the patch was applied correctly and any residual gaps it may inadvertently have caused.

Security validation doesn’t stop at uncovering critical vulnerabilities—it should provide a clear path to resolution. By mapping the entire kill chain, security teams can prioritize the most critical fixes, steering clear of the inefficient "patch everything" approach.

This targeted precision minimizes remediation delays and empowers teams to act swiftly and effectively.

Security validation not only identifies gaps but also confirms what’s working. There’s greater confidence in knowing your defenses can handle real-world threats rather than simply hoping they will. Unlike traditional metrics, security validation evaluates your posture through emulated attacks, providing a clearer, action-oriented perspective on progress—one that should have been the benchmark all along.

Position Yourself From Reactive to Proactive.

Hardened resilience goes beyond installing defenses—it requires actively challenging them. Organizations can transition from reactive to proactive security management by safely emulating real-world attacks in live production IT environments.

Test whether security controls effectively detect, block, and respond to malicious activities before damage occurs.

Security leaders who have adopted validation have effectively positioned themselves for long-term success. They’re not waiting for the next breach - they’re validating, remediating, and doing it on repeat.

Get the GOAT Guide to learn how to start validating, start defending, and start winning.

Aviv Cohen, a seasoned Chief Marketing Officer, is a speaker, cartoonist, and author with over 20 years of experience in product and marketing management. He joined Pentera in its very early days, shepherding its growth into a global brand and market leader. Before Pentera, Aviv developed Earnix’s brand and founded its Excelerate Insurance Summit and CEO Forum andheld significant product and marketing roles at Nvidia (NASDAQ: NVDA), and Amdocs (NASDAQ: DOX). Aviv holds a [website] in Electronics and Computer Science and an MBA.

Threat actors have been observed targeting Internet Information Services (IIS) servers in Asia as part of a search engine optimization (SEO) manipulat......

Mehr-Faktor-Authentifizierung (MFA) liefert besseren Schutz vor Phishing oder der direkten Nutzung von Zugangsdaten aus Datenlecks. Google hat im Nove......

Im Workshop Beyond Bits: Physische Sicherheit in der IT – von Angriffsmethoden zu Schutzstrategien erfahren Sie, warum es wichtig ist, IT-Landschaften......

Brave now lets you inject custom JavaScript to tweak websites

Brave now lets you inject custom JavaScript to tweak websites

Brave Browser is getting a new feature called 'custom scriptlets' that lets advanced customers inject their own JavaScript into websites, allowing deep customization and control over their browsing experience.

The new feature is coming in Brave Browser version [website] for the desktop and is very similar to the popular TamperMonkey and GreaseMonkey browser extensions, which allow consumers to create "user scripts" that modify the functionality of specific websites.

"Starting with desktop version [website], advanced Brave customers will be able to write and inject their own scriptlets into a page, allowing for improved control over their browsing experience," explained Brave in the announcement.

Brave says that the feature was initially created to debug the browser's adblock feature but felt it was too valuable not to share with clients.

Brave's custom scriptlets feature can be used to modify webpages for a wide variety of privacy, security, and usability purposes.

For privacy-related changes, consumers write scripts that block JavaScript-based trackers, randomize fingerprinting APIs, and substitute Google Analytics scripts with a dummy version.

In terms of customization and accessibility, the scriptlets could be used for hiding sidebars, pop-ups, floating ads, or annoying widgets, force dark mode even on sites that don't support it, expand content areas, force infinite scrolling, adjust text colors and font size, and auto-expand hidden content.

For example, the script below will remove sidebars from a particular website.

The possible actions achievable by injected JavaScript snippets are virtually endless. However, caution is advised, as running untrusted custom scriptlets may cause issues or even introduce some risk.

Brave says the scriptlets are powerful tools in the hands of knowledgeable customers. At the same time, there's a risk that custom JavaScript can cause website problems.

For this reason, it has placed the new feature behind a Developer mode flag in Shields > Content filtering.

A box will appear warning the user they should not paste code they don't understand as this could result in privacy risks.

Brave's custom scriptlet feature follows filter rule syntax similar to ad-blocking rules in uBlock Origin or AdGuard. For more information on that, check here.

Those interested in experimenting with Brave's new feature should only use their own code or those of people they trust, strictly avoiding anything that hasn't been thoroughly scrutinized.

Today, an Alabama man pleaded guilty to hijacking the [website] Securities and Exchange Commission (SEC) account on X in a January 2024 SIM swapping attack......

Die Lup-Kliniken im Landkreis Ludwigslust-Parchim sind von einem Cyberangriff betroffen. Wie der Landkreis mitteilte, sind die Klinikstandorte Hagenow......

Given Okta's role as a critical part of identity infrastructure, strengthening Okta security is essential. This article covers six key Okta security s......

Zimbra Releases Security Updates for SQL Injection, Stored XSS, and SSRF Vulnerabilities

Zimbra Releases Security Updates for SQL Injection, Stored XSS, and SSRF Vulnerabilities

Zimbra has released software updates to address critical security flaws in its Collaboration software that, if successfully exploited, could result in information disclosure under certain conditions.

The vulnerability, tracked as CVE-2025-25064, carries a CVSS score of [website] out of a maximum of [website] It has been described as an SQL injection bug in the ZimbraSync Service SOAP endpoint affecting versions prior to [website] and [website].

Stemming from a lack of adequate sanitization of a user-supplied parameter, the shortcoming could be weaponized by authenticated attackers to inject arbitrary SQL queries that could retrieve email metadata by "manipulating a specific parameter in the request."

Zimbra also mentioned it addressed another critical vulnerability related to stored cross-site scripting (XSS) in the Zimbra Classic Web Client. The flaw is yet to be assigned a CVE identifier.

"The fix strengthens input sanitization and enhances security," the firm noted in an advisory, adding the issue has been fixed in versions [website] Patch 44, [website], and [website].

Another vulnerability addressed by Zimbra is CVE-2025-25065 (CVSS score: [website], a medium-severity server-side request forgery (SSRF) flaw in the RSS feed parser component that allows for unauthorized redirection to internal network endpoints.

The security defect has been patched in versions [website] Patch 43, [website], and [website] consumers are advised to upgrade to the latest versions of Zimbra Collaboration for optimal protection.

Given Okta's role as a critical part of identity infrastructure, strengthening Okta security is essential. This article covers six key Okta security s......

Apple has released emergency security updates to patch a zero-day vulnerability that the firm says was exploited in targeted and.

Today, an Alabama man pleaded guilty to hijacking the [website] Securities and Exchange Commission (SEC) account on X in a January 2024 SIM swapping attack......

Market Impact Analysis

Market Growth Trend

2018201920202021202220232024
8.7%10.5%11.0%12.2%12.9%13.3%13.4%
8.7%10.5%11.0%12.2%12.9%13.3%13.4% 2018201920202021202220232024

Quarterly Growth Rate

Q1 2024 Q2 2024 Q3 2024 Q4 2024
12.5% 12.9% 13.2% 13.4%
12.5% Q1 12.9% Q2 13.2% Q3 13.4% Q4

Market Segments and Growth Drivers

Segment Market Share Growth Rate
Network Security26%10.8%
Cloud Security23%17.6%
Identity Management19%15.3%
Endpoint Security17%13.9%
Other Security Solutions15%12.4%
Network Security26.0%Cloud Security23.0%Identity Management19.0%Endpoint Security17.0%Other Security Solutions15.0%

Technology Maturity Curve

Different technologies within the ecosystem are at varying stages of maturity:

Innovation Trigger Peak of Inflated Expectations Trough of Disillusionment Slope of Enlightenment Plateau of Productivity AI/ML Blockchain VR/AR Cloud Mobile

Competitive Landscape Analysis

Company Market Share
Palo Alto Networks14.2%
Cisco Security12.8%
Crowdstrike9.3%
Fortinet7.6%
Microsoft Security7.1%

Future Outlook and Predictions

The Cybersecurity Leader Guide landscape is evolving rapidly, driven by technological advancements, changing threat vectors, and shifting business requirements. Based on current trends and expert analyses, we can anticipate several significant developments across different time horizons:

Year-by-Year Technology Evolution

Based on current trajectory and expert analyses, we can project the following development timeline:

2024Early adopters begin implementing specialized solutions with measurable results
2025Industry standards emerging to facilitate broader adoption and integration
2026Mainstream adoption begins as technical barriers are addressed
2027Integration with adjacent technologies creates new capabilities
2028Business models transform as capabilities mature
2029Technology becomes embedded in core infrastructure and processes
2030New paradigms emerge as the technology reaches full maturity

Technology Maturity Curve

Different technologies within the ecosystem are at varying stages of maturity, influencing adoption timelines and investment priorities:

Time / Development Stage Adoption / Maturity Innovation Early Adoption Growth Maturity Decline/Legacy Emerging Tech Current Focus Established Tech Mature Solutions (Interactive diagram available in full report)

Innovation Trigger

  • Generative AI for specialized domains
  • Blockchain for supply chain verification

Peak of Inflated Expectations

  • Digital twins for business processes
  • Quantum-resistant cryptography

Trough of Disillusionment

  • Consumer AR/VR applications
  • General-purpose blockchain

Slope of Enlightenment

  • AI-driven analytics
  • Edge computing

Plateau of Productivity

  • Cloud infrastructure
  • Mobile applications

Technology Evolution Timeline

1-2 Years
  • Technology adoption accelerating across industries
  • digital transformation initiatives becoming mainstream
3-5 Years
  • Significant transformation of business processes through advanced technologies
  • new digital business models emerging
5+ Years
  • Fundamental shifts in how technology integrates with business and society
  • emergence of new technology paradigms

Expert Perspectives

Leading experts in the cyber security sector provide diverse perspectives on how the landscape will evolve over the coming years:

"Technology transformation will continue to accelerate, creating both challenges and opportunities."

— Industry Expert

"Organizations must balance innovation with practical implementation to achieve meaningful results."

— Technology Analyst

"The most successful adopters will focus on business outcomes rather than technology for its own sake."

— Research Director

Areas of Expert Consensus

  • Acceleration of Innovation: The pace of technological evolution will continue to increase
  • Practical Integration: Focus will shift from proof-of-concept to operational deployment
  • Human-Technology Partnership: Most effective implementations will optimize human-machine collaboration
  • Regulatory Influence: Regulatory frameworks will increasingly shape technology development

Short-Term Outlook (1-2 Years)

In the immediate future, organizations will focus on implementing and optimizing currently available technologies to address pressing cyber security challenges:

  • Technology adoption accelerating across industries
  • digital transformation initiatives becoming mainstream

These developments will be characterized by incremental improvements to existing frameworks rather than revolutionary changes, with emphasis on practical deployment and measurable outcomes.

Mid-Term Outlook (3-5 Years)

As technologies mature and organizations adapt, more substantial transformations will emerge in how security is approached and implemented:

  • Significant transformation of business processes through advanced technologies
  • new digital business models emerging

This period will see significant changes in security architecture and operational models, with increasing automation and integration between previously siloed security functions. Organizations will shift from reactive to proactive security postures.

Long-Term Outlook (5+ Years)

Looking further ahead, more fundamental shifts will reshape how cybersecurity is conceptualized and implemented across digital ecosystems:

  • Fundamental shifts in how technology integrates with business and society
  • emergence of new technology paradigms

These long-term developments will likely require significant technical breakthroughs, new regulatory frameworks, and evolution in how organizations approach security as a fundamental business function rather than a technical discipline.

Key Risk Factors and Uncertainties

Several critical factors could significantly impact the trajectory of cyber security evolution:

Evolving threat landscape
Skills shortage
Regulatory compliance complexity

Organizations should monitor these factors closely and develop contingency strategies to mitigate potential negative impacts on technology implementation timelines.

Alternative Future Scenarios

The evolution of technology can follow different paths depending on various factors including regulatory developments, investment trends, technological breakthroughs, and market adoption. We analyze three potential scenarios:

Optimistic Scenario

Rapid adoption of advanced technologies with significant business impact

Key Drivers: Supportive regulatory environment, significant research breakthroughs, strong market incentives, and rapid user adoption.

Probability: 25-30%

Base Case Scenario

Measured implementation with incremental improvements

Key Drivers: Balanced regulatory approach, steady technological progress, and selective implementation based on clear ROI.

Probability: 50-60%

Conservative Scenario

Technical and organizational barriers limiting effective adoption

Key Drivers: Restrictive regulations, technical limitations, implementation challenges, and risk-averse organizational cultures.

Probability: 15-20%

Scenario Comparison Matrix

FactorOptimisticBase CaseConservative
Implementation TimelineAcceleratedSteadyDelayed
Market AdoptionWidespreadSelectiveLimited
Technology EvolutionRapidProgressiveIncremental
Regulatory EnvironmentSupportiveBalancedRestrictive
Business ImpactTransformativeSignificantModest

Transformational Impact

Technology becoming increasingly embedded in all aspects of business operations. This evolution will necessitate significant changes in organizational structures, talent development, and strategic planning processes.

The convergence of multiple technological trends—including artificial intelligence, quantum computing, and ubiquitous connectivity—will create both unprecedented security challenges and innovative defensive capabilities.

Implementation Challenges

Technical complexity and organizational readiness remain key challenges. Organizations will need to develop comprehensive change management strategies to successfully navigate these transitions.

Regulatory uncertainty, particularly around emerging technologies like AI in security applications, will require flexible security architectures that can adapt to evolving compliance requirements.

Key Innovations to Watch

Artificial intelligence, distributed systems, and automation technologies leading innovation. Organizations should monitor these developments closely to maintain competitive advantages and effective security postures.

Strategic investments in research partnerships, technology pilots, and talent development will position forward-thinking organizations to leverage these innovations early in their development cycle.

Technical Glossary

Key technical terms and definitions to help understand the technologies discussed in this article.

Understanding the following technical concepts is essential for grasping the full implications of the security threats and defensive measures discussed in this article. These definitions provide context for both technical and non-technical readers.

Filter by difficulty:

malware beginner

algorithm Malware can take many forms including viruses, worms, trojans, ransomware, spyware, adware, and rootkits. Modern malware often employs sophisticated evasion techniques to avoid detection by security solutions.
Types of malwareCommon malware types and their characteristics
Example: The Emotet trojan began as banking malware but evolved into a delivery mechanism for other malware types, demonstrating how sophisticated malware can adapt and change functionality over time.

API beginner

interface APIs serve as the connective tissue in modern software architectures, enabling different applications and services to communicate and share data according to defined protocols and data formats.
API concept visualizationHow APIs enable communication between different software systems
Example: Cloud service providers like AWS, Google Cloud, and Azure offer extensive APIs that allow organizations to programmatically provision and manage infrastructure and services.

penetration testing intermediate

platform

phishing beginner

encryption Modern phishing attacks are increasingly sophisticated, often leveraging AI to create convincing spear-phishing campaigns that target specific individuals with personalized content that appears legitimate.
Phishing attack flowAnatomy of a typical phishing attack
Example: Business Email Compromise (BEC) attacks are sophisticated phishing campaigns where attackers impersonate executives to trick employees into transferring funds or sensitive information.

firewall intermediate

API

ransomware beginner

cloud computing Ransomware typically encrypts victim data using strong cryptographic algorithms, making recovery impossible without the decryption key. Advanced variants now also exfiltrate data before encryption, enabling double-extortion tactics.
Example: The REvil ransomware group leveraged a supply chain attack against Kaseya VSA to deploy ransomware to thousands of organizations simultaneously, demanding a $70 million ransom payment.

threat intelligence intermediate

middleware

platform intermediate

scalability Platforms provide standardized environments that reduce development complexity and enable ecosystem growth through shared functionality and integration capabilities.

zero-day intermediate

DevOps These vulnerabilities are particularly dangerous because defenders have no time to develop and deploy patches before exploitation occurs. They are highly valued in both offensive security markets and criminal underground.
Zero-day vulnerability timelineTimeline showing vulnerability discovery to patch development
Example: The SUNBURST attack exploited a zero-day vulnerability in SolarWinds Orion software, remaining undetected for months while compromising numerous government agencies and private organizations.