May 2025 was a volcanic month for cybersecurity news, including several large breaches and new critical severity vulnerabilities. The Greenbone blog has already covered some major events, such as new actively exploited vulnerabilities in SAP Netweaver, Commvault Command Center and Ivanti EPMM. In total 4,014 new vulnerabilities were added to MITRE’s CVE (Common Vulnerabilities and […]
Microsoft Windows remains the most widely used desktop operating system in enterprise environments – and also one of the most targeted by threat actors. Insecure configurations are a leading source of security breaches [1][2][3], often exploited to gain initial access [TA0001], escalate privileges [TA0004], steal credentials [TA0006], establish persistent access [TA0003], and move laterally within […]
https://www.greenbone.net/wp-content/uploads/Gb_New-logo_horizontal_head.png00Greenbone AGhttps://www.greenbone.net/wp-content/uploads/Gb_New-logo_horizontal_head.pngGreenbone AG2025-06-02 13:21:082025-06-05 09:24:41Greenbone Audits for Compliance with the CIS Windows 11 Enterprise Benchmark”
Security experts are observing a worrying trend: the time to exploit (TTE), i.e. the time between a security vulnerability becoming known and being exploited by malicious actors, has been falling dramatically in recent times. At the same time, attackers are becoming increasingly skilled at concealing their presence in a successfully hacked network. Experts refer to […]
Threat Report May 2025: Hack, Rinse, Repeat
BlogMay 2025 was a volcanic month for cybersecurity news, including several large breaches and new critical severity vulnerabilities. The Greenbone blog has already covered some major events, such as new actively exploited vulnerabilities in SAP Netweaver, Commvault Command Center and Ivanti EPMM. In total 4,014 new vulnerabilities were added to MITRE’s CVE (Common Vulnerabilities and […]
Greenbone Audits for Compliance with the CIS Windows 11 Enterprise Benchmark”
BlogMicrosoft Windows remains the most widely used desktop operating system in enterprise environments – and also one of the most targeted by threat actors. Insecure configurations are a leading source of security breaches [1][2][3], often exploited to gain initial access [TA0001], escalate privileges [TA0004], steal credentials [TA0006], establish persistent access [TA0003], and move laterally within […]
Dwell time: Attackers Are Striking Faster and Disguising Themselves Better
BlogSecurity experts are observing a worrying trend: the time to exploit (TTE), i.e. the time between a security vulnerability becoming known and being exploited by malicious actors, has been falling dramatically in recent times. At the same time, attackers are becoming increasingly skilled at concealing their presence in a successfully hacked network. Experts refer to […]