Microsoft Windows remains the most widely used desktop operating system in enterprise environments – and also one of the most targeted by threat actors. Insecure configurations are a leading source of security breaches [1][2][3], often exploited to gain initial access [TA0001], escalate privileges [TA0004], steal credentials [TA0006], establish persistent access [TA0003], and move laterally within […]
Security experts are observing a worrying trend: the time to exploit (TTE), i.e. the time between a security vulnerability becoming known and being exploited by malicious actors, has been falling dramatically in recent times. At the same time, attackers are becoming increasingly skilled at concealing their presence in a successfully hacked network. Experts refer to […]
Just last month, CVE-2025-22457 (CVSS 9.8) affecting Ivanti Connect Secure, Policy Secure, and ZTA Gateways was recognized as a vector for ransomware. Now, two new CVEs have been added to the growing list of high-risk Ivanti vulnerabilities; CVE-2025-4427 and CVE-2025-4428 affecting Ivanti EPMM (Endpoint and Patch Management Mobile) are under active exploitation. Greenbone includes active […]
https://www.greenbone.net/wp-content/uploads/Gb_New-logo_horizontal_head.png00Joseph Leehttps://www.greenbone.net/wp-content/uploads/Gb_New-logo_horizontal_head.pngJoseph Lee2025-05-28 11:57:382025-05-28 11:57:38Attackers Advance on Two New Ivanti EPMM Flaws
Greenbone Audits CIS Microsoft Windows 11 Enterprise Benchmark
BlogMicrosoft Windows remains the most widely used desktop operating system in enterprise environments – and also one of the most targeted by threat actors. Insecure configurations are a leading source of security breaches [1][2][3], often exploited to gain initial access [TA0001], escalate privileges [TA0004], steal credentials [TA0006], establish persistent access [TA0003], and move laterally within […]
Dwell time: Attackers Are Striking Faster and Disguising Themselves Better
BlogSecurity experts are observing a worrying trend: the time to exploit (TTE), i.e. the time between a security vulnerability becoming known and being exploited by malicious actors, has been falling dramatically in recent times. At the same time, attackers are becoming increasingly skilled at concealing their presence in a successfully hacked network. Experts refer to […]
Attackers Advance on Two New Ivanti EPMM Flaws
BlogJust last month, CVE-2025-22457 (CVSS 9.8) affecting Ivanti Connect Secure, Policy Secure, and ZTA Gateways was recognized as a vector for ransomware. Now, two new CVEs have been added to the growing list of high-risk Ivanti vulnerabilities; CVE-2025-4427 and CVE-2025-4428 affecting Ivanti EPMM (Endpoint and Patch Management Mobile) are under active exploitation. Greenbone includes active […]