THE LATEST FROM IONIX >>

LATEST

  • Exploited! Warning sign indicating a vulnerability: CVE-2025-2775, SYSAID on-prem XML external entity vulnerability.

    Exploited! SysAid On-Prem XML External Entity Vulnerability (CVE-2025-2775)

  • Ionix's article on asset discovery, emphasizing that it's a starting point rather than a complete security strategy. The graphic shows an ascending series of blue and orange circles.

    Asset Discovery: A Starting Point, Not a Security Strategy

  • Alert: A zero-day vulnerability update announcement shows that an exploited unauthenticated file upload vulnerability (CVE-2025-31324) in SAP NetWeaver Visual Composer has been discovered.

    Exploited! SAP NetWeaver Visual Composer Unauthenticated File-Upload Vulnerability (CVE-2025-31324) 

  • Alert: Zero-day vulnerability update for Erlang/OTP SSH. Unauthenticated remote code execution (CVE-2025-32433) has been exploited.

    Exploited! Erlang/OTP SSH Unauthenticated Remote Code Execution Vulnerability (CVE-2025-32433)

  • Graphic with a dark blue background, a red heartbeat monitor, and white text that reads: "The CVE Program is on Life Support - What's Next?" The Ionix logo is in the upper left corner.

    The CVE Program Is on Life Support – and So Is Our Outdated Approach to Vulnerability Management 

  • A doctor holds a tablet displaying a digital DNA strand, illustrating proactive cybersecurity in a reactive world. The text 'Prophylactic Cybersecurity: How to be Proactive in a Reactive World' is overlaid, along with the speaker's name and title: Billy Hoffman, Ionix Field CTO.

    Prophylactic Cybersecurity for Healthcare

  • Exploited! Alert announcing a critical unauthenticated access vulnerability (CVE-2025-2825) in CrushFTP.

    Exploited: Critical Unauthenticated Access Vulnerability in CrushFTP (CVE-2025-2825)

  • Security alert graphic with red color scheme and a warning symbol. Text states 'EXPLOITED! Vulnerability Update' and details the Kentico Xperience Staging Service Authentication Bypass vulnerabilities (CVE-2025-2746 and CVE-2025-2747).

    Exploited! Kentico Xperience Staging Service Authentication Bypass Vulnerabilities (CVE-2025-2746 & CVE-2025-2747)

  • Alert: Multiple remote code execution vulnerabilities in Ingress Nginx Controller for Kubernetes have been exploited.

    Exploited! Ingress-NGINX CONTROLLER FOR Ingress-NGINX RCE (CVE-2025-1974, 1097, 1098, 24514) – Patch Now | IONIX

  • Exploit alert for CVE-2025-24813, an Apache Tomcat path equivalence vulnerability.

    Exploited! Apache Tomcat Path Equivalence Vulnerability (CVE-2025-24813)

  • LLM Agents One Days

    Can Autonomous LLM Agents Exploit One Day Vulnerabilities?

  • Alert: Zero-day vulnerability update for CVE-2025-24893, a critical remote code execution vulnerability in XWiki.

    Exploited: XWiki Remote Code Execution Vulnerability (CVE-2025-24893)