THE LATEST FROM IONIX >>

LATEST

  • The CVE Program Is on Life Support – and So Is Our Outdated Approach to Vulnerability Management 

  • Prophylactic Cybersecurity for Healthcare

  • Exploited: Critical Unauthenticated Access Vulnerability in CrushFTP (CVE-2025-2825)

  • Exploited! Kentico Xperience Staging Service Authentication Bypass Vulnerabilities (CVE-2025-2746 & CVE-2025-2747)

  • Exploited! Apache Tomcat Path Equivalence Vulnerability (CVE-2025-24813)

  • LLM Agents One Days

    Can Autonomous LLM Agents Exploit One Day Vulnerabilities?

  • Exploited: XWiki Remote Code Execution Vulnerability (CVE-2025-24893)

  • Exploited! PAN‑OS Authentication Bypass Vulnerability (CVE‑2025‑0108)

  • What Is CTEM? Understanding Gartner’s CTEM Framework

  • CTEM: Closing the Cloud Security Gap

  • Three Pillars for MSSP Success in EASM

  • Continuous Risk Assessment: The Connecting Thread in CTEM