Posts

  • Security Summary 2026 Week 1

    Security Summary 2026 Week 1

    Note: This is our new weekly format, a post every 7 days on system security!

    These are the 8 security notices from 1 January 2026 until 7 January 2026


    1. Veeam security advisory (AV26‑008) – 7 Jan 2026

    Severity: High
    Recommended actions: Apply the latest patches released by Veeam, review backup configurations, and enforce least‑privilege access for backup accounts.
    Link: https://www.cyber.gc.ca/en/alerts-advisories/AV26-008


    2. Samsung mobile security advisory (AV26‑007) – 7 Jan 2026

    Severity: Medium
    Recommended actions: Update all Samsung devices to the newest firmware, enable automatic security updates, and advise users to install apps only from trusted sources.
    Link: https://www.cyber.gc.ca/en/alerts-advisories/AV26-007


    3. Qualcomm security advisory – January 2026 monthly rollup (AV26‑006) – 7 Jan 2026

    Severity: Medium to High (varies by component)
    Recommended actions: Deploy Qualcomm’s security patches across all affected hardware, verify that device drivers are up‑to‑date, and monitor for any anomalous network activity.
    Link: https://www.cyber.gc.ca/en/alerts-advisories/AV26-006


    4. Android security advisory – January 2026 monthly rollup (AV26‑005) – 7 Jan 2026

    Severity: Medium
    Recommended actions: Ensure all Android devices receive the latest OS updates, enforce screen lock policies, and educate users about phishing attempts.
    Link: https://www.cyber.gc.ca/en/alerts-advisories/AV26-005


    5. n8n security advisory (AV26‑004) – 7 Jan 2026

    Severity: Low to Medium
    Recommended actions: Upgrade to the patched version of n8n, restrict workflow execution permissions, and audit integration credentials regularly.
    Link: https://www.cyber.gc.ca/en/alerts-advisories/AV26-004


    6. GitHub security advisory (AV26‑003) – 7 Jan 2026

    Severity: High
    Recommended actions: Apply the recommended GitHub security updates, rotate any compromised tokens, and enable two‑factor authentication for all accounts.
    Link: https://www.cyber.gc.ca/en/alerts-advisories/AV26-003


    7. Google Chrome security advisory (AV26‑002) – 7 Jan 2026

    Severity: High
    Recommended actions: Push the latest Chrome update to all browsers, enforce automatic updates, and consider deploying browser hardening policies via group policy or endpoint management.
    Link: https://www.cyber.gc.ca/en/alerts-advisories/AV26-002


    8. IBM security advisory (AV26‑001) – 5 Jan 2026

    Severity: Medium
    Recommended actions: Install IBM’s security patches promptly, review access controls on IBM services, and monitor logs for suspicious activity.
    Link: https://www.cyber.gc.ca/en/alerts-advisories/AV26-001


    How Azzurro Technology Inc. Can Help

    Azzurro Technology Inc. can assist your organization in addressing any of the above advisories—or any other software issue you may face. Our team offers free, no‑obligation guidance and can provide a tailored remediation plan. Reach out at info@azzurro.tech.


    Disclaimer

    This post is an AI‑generated summary of the advisories listed on the Canadian Cyber Centre. For complete details, please visit the official page: https://www.cyber.gc.ca/en/alerts-advisories. Azzurro Technology Inc. can provide a free quote for a more specific, organization‑focused report.

  • Why get assurance for open source software?

    Why get assurance for open source software?

    Open‑source software (OSS) powers everything from the apps on your phone to the servers that run large‑scale enterprises. Its biggest strengths including transparency, community‑driven innovation, and low entry cost make it an attractive choice for businesses of all sizes. Yet many decision‑makers still hesitate because they worry about risk: security gaps, hidden bugs, licensing pitfalls, or lack of support. That’s where assurance comes in.

    1. Assurance builds confidence on top of openness

    When you adopt OSS, you instantly gain access to the source code and a vibrant community. Assurance adds a formal layer of verification that the code does exactly what it promises, follows best‑practice security standards, and complies with relevant licenses. Think of it as a quality‑seal that tells you, “we’ve checked this, and it’s safe to use.”

    2. Faster, safer deployments

    With an assurance review in place, teams spend less time hunting for hidden vulnerabilities or worrying about compliance audits. They can move faster from development to production, knowing that a trusted third party has already vetted the software. This reduces costly delays and helps you stay competitive.

    3. Protects your brand and customers

    Security incidents or license violations can damage reputation and erode customer trust. Assurance services perform thorough security testing, license analysis, and supply‑chain checks, helping you avoid public breaches or legal disputes. The result is a stronger brand image built on reliable, trustworthy technology.

    4. Extends the life of open‑source projects

    Many OSS projects are maintained by volunteers and may lack formal testing or documentation. An assurance engagement often includes recommendations for improving processes, adding automated tests, or tightening governance. This feedback loop strengthens the original project, benefiting the entire community.

    5. Aligns with regulatory requirements

    Industries such as finance, healthcare, and government increasingly require documented evidence of software security and compliance. Assurance reports provide the concrete artifacts auditors look for, making it easier to meet those obligations while still enjoying the flexibility of OSS.

    6. Cost‑effective risk management

    While there is a modest upfront cost for an assurance service, it typically pays for itself by preventing expensive security incidents, licensing fines, or downtime. In the long run, you get the economic advantages of open source plus the peace of mind of a professionally vetted solution.


    Bottom line: Open‑source software gives you freedom, innovation, and cost savings. Adding assurance layers that validate security, compliance, and quality turns those advantages into a reliable foundation for any organization.


    Worth noting: Learn more about Azzurro 1500, a service that offers comprehensive assurance for open‑source software, helping you combine the power of OSS with proven reliability. Find out the details here: https://azzurro.tech/product/azzurro-1500/

  • Security notices from the 30th of December 2025 until the 5th of January 2025

    Security notices from the 30th of December 2025 until the 5th of January 2025

    These are the 2 security notices from December 30, 2025 to January 5, 2026


    1. IBM Security Advisory (AV25‑867) – 2026‑01‑05

    View advisory on Cyber Centre

    Severity: High – This advisory addresses a critical vulnerability that could allow remote code execution on affected IBM systems.

    Recommended Actions:

    • Apply the IBM‑provided patch immediately.
    • Verify that all systems are running the updated version.
    • Conduct a quick scan for any signs of exploitation.
    • Review and tighten network firewall rules to limit exposure.

    2. SmarterTools Security Advisory (AV25‑866) – 2025‑12‑30

    View advisory on Cyber Centre

    Severity: Medium – The issue involves a privilege‑escalation flaw in SmarterTools software.

    Recommended Actions:

    • Install the latest update released by SmarterTools.
    • Restrict administrative privileges to only those who truly need them.
    • Monitor logs for unusual activity related to the affected components.
    • Educate users about the importance of applying updates promptly.

    How Azzurro Technology Inc. Can Help

    Azzurro Technology Inc. can assist your organization in addressing these advisories—or any other software issue you encounter. Our team offers free, no‑obligation guidance and can provide a tailored remediation plan. Reach out at info@azzurro.tech.


    Disclaimer

    This post is an AI‑generated summary of the advisories listed on the Canadian Cyber Centre. For complete details and the latest updates, please visit the official page: https://www.cyber.gc.ca/en/alerts-advisories. Azzurro Technology Inc. can also provide a free quote for a more specific, organization‑focused report.

  • Security Notices from the 29th of December 2025

    Security Notices from the 29th of December 2025

    These are the 4 security notices from 2025‑12‑29


    1. Dell security advisory (AV25‑865) – Advisory

    View the advisory on the Cyber Centre

    Severity: Typically rated High because it affects core server and workstation components.
    Recommended actions:

    • Apply the Dell‑issued firmware and driver updates immediately.
    • Verify that all affected systems are running the latest BIOS version.
    • Review Dell’s mitigation guidance for any additional configuration steps.

    2. VMware security advisory (AV25‑864) – Advisory

    View the advisory on the Cyber Centre

    Severity: Often classified as Critical due to potential remote code execution in virtualized environments.
    Recommended actions:

    • Install the VMware patch released for the affected ESXi and vCenter versions.
    • Conduct a quick inventory of all virtual machines to ensure they are protected.
    • Follow VMware’s hardening checklist to reduce attack surface.

    3. IBM security advisory (AV25‑863) – Advisory

    View the advisory on the Cyber Centre

    Severity: Generally Medium; the vulnerability targets specific IBM software modules.
    Recommended actions:

    • Update the IBM product to the latest supported release.
    • Review IBM’s mitigation steps, especially around authentication settings.
    • Test the patch in a staging environment before rolling out to production.

    4. AL25‑021 – Vulnerability affecting MongoDB – CVE‑2025‑14847 – Alert

    View the alert on the Cyber Centre

    Severity: Rated High because it can allow unauthorized data access.
    Recommended actions:

    • Upgrade MongoDB to the patched version indicated by the advisory.
    • Enable authentication and enforce role‑based access controls.
    • Scan your databases for signs of exploitation and monitor logs closely.

    How Azzurro Technology Inc. can help

    Azzurro Technology Inc. can assist with any of the above advisories or any other software issue your organization faces. Reach out atinfo@azzurro.tech – our expertise is offered free of charge, and we can provide a tailored remediation plan.


    Disclaimer

    This post is an AI‑generated summary. For complete details, consult the original advisories on the Canadian Cyber Centre website: https://www.cyber.gc.ca/en/alerts-advisories. Azzurro Technology Inc. can give a free quote for a more specific, organization‑focused report.

  • Security Notices from the 23rd of December 2025 to the 28th of December 2025

    Security Notices from the 23rd of December 2025 to the 28th of December 2025

    These are the 5 security notices from 23 December 2025 until 28 December 2025


    1. MongoDB security advisory (AV25‑862) – 24 December 2025

    View advisory on Cyber Centre

    Severity: Critical (as indicated in the original notice)
    Recommended actions:

    • Apply the MongoDB patch released on 24 December 2025.
    • Verify that all MongoDB instances are running the updated version.
    • Review access controls and ensure only authorized users can connect.

    2. TeamViewer security advisory (AV25‑861) – 23 December 2025

    View advisory on Cyber Centre

    Severity: High
    Recommended actions:

    • Install the latest TeamViewer update.
    • Enforce two‑factor authentication for all remote sessions.
    • Audit active connections and terminate any suspicious sessions.

    3. VMware security advisory (AV25‑860) – 23 December 2025

    View advisory on Cyber Centre

    Severity: High
    Recommended actions:

    • Deploy the VMware security patch promptly.
    • Review VM configurations for unnecessary exposure to the internet.
    • Conduct a vulnerability scan of the virtual environment.

    4. Ubuntu security advisory (AV25‑859) – 23 December 2025

    View advisory on Cyber Centre

    Severity: Moderate to High (depends on affected packages)
    Recommended actions:

    • Update all Ubuntu systems using apt-get update && apt-get upgrade.
    • Check for any lingering vulnerable packages with ubuntu-security-status.
    • Apply kernel hardening recommendations where applicable.

    5. Red Hat security advisory (AV25‑858) – 23 December 2025

    View advisory on Cyber Centre

    Severity: Critical for enterprise deployments
    Recommended actions:

    • Apply the Red Hat patch via yum update or dnf update.
    • Verify that the updated packages are correctly installed on all servers.
    • Review SELinux policies and audit logs for any anomalous activity.

    How Azzurro Technology Inc. can help

    Azzurro Technology Inc. can assist your organization with any of the above advisories—or with any other software issue you may face. Our team offers free, no‑obligation advice and can provide a free quote for a more detailed, customized security report.

    ✉️ Contact us: mailto:info@azzurro.tech


    Disclaimer

    This post is an AI‑generated summary of the advisories listed on the Canadian Cyber Centre. For complete details, please visit the official advisory pages linked above or the main page at https://www.cyber.gc.ca/en/alerts-advisories. Azzurro Technology Inc. can provide a free quote for a tailored report specific to your organization’s needs.

  • Security Notices from the 22nd of December 2025

    Security Notices from the 22nd of December 2025

    These are the 5 security notices from 22 December 2025


    1. AL25‑020 – Vulnerability Impacting WatchGuard Fireware OS – CVE‑2025‑14733

    Link: https://www.cyber.gc.ca/en/alerts-advisories/AL25-020

    Severity / Exploitation: The advisory notes that this vulnerability is actively being exploited in the wild.
    Recommended actions:

    • Review the full advisory for technical details.
    • Apply any patches or firmware updates released by WatchGuard immediately.
    • Verify that all WatchGuard firewalls are running the latest supported version and that default credentials have been changed.

    2. AV25‑857 – n8n security advisory

    Link: https://www.cyber.gc.ca/en/alerts-advisories/AV25-857

    Severity: Critical.
    Recommended actions:

    • Update n8n to the version specified in the advisory.
    • Follow the vendor’s hardening checklist (disable unnecessary plugins, enforce strong authentication).

    3. AV25‑856 – Dell security advisory

    Link: https://www.cyber.gc.ca/en/alerts-advisories/AV25-856

    Severity: Not specified in the excerpt.
    Recommended actions:

    • Consult the Dell advisory for the exact list of affected products.
    • Install the Dell‑provided patches or firmware updates for those products.
    • Review Dell’s configuration recommendations and ensure logging is enabled.

    Note: These Dell products were referenced

    • Dell Metro node – version mn-114, mn-215 and mn-216
    • Dell PowerEdge – multiple versions and models
    • Dell PowerProtect Data Domain – multiple versions
    • Dell RecoverPoint for Virtual Machines – Debian 12 – versions prior to 6.0 SP3 P1
    • Dell RecoverPoint for Virtual Machines – SUSE Linux Enterprise 12 SP6 – versions prior to 6.0 SP3 P1
    • Dell Storage Resource Manager (SRM) – version prior to 6.0.0.1
    • Dell Storage Monitoring and Reporting (SMR) – version prior to 6.0.0.1

    4. AV25‑855 – IBM security advisory

    Link: https://www.cyber.gc.ca/en/alerts-advisories/AV25-855

    Severity: Critical updates are included in this advisory.
    Recommended actions:

    • Identify the IBM products mentioned in the advisory and apply the critical updates immediately.
    • Follow IBM’s post‑patch validation steps to confirm the issue is resolved.

    Note: These specific IBM products were referenced

    • IBM API Connect – version 10.0.8.0 to 10.0.8.5 and V10.0.11.0
    • IBM CloudPak for AIOps – versions 4.1.0 to 4.11.1
    • IBM Concert Software – version 1.0.0 to 2.1.0
    • IBM DataPower Gateway – version 10.6.6.0
    • IBM Data Virtualization on Cloud Pak for Data – versions 3.0, 3.1 and 3.2
    • IBM Db2 on Cloud Pak for Data versions – versions v4.8, v5.0, v5.1, v5.2 and v5.3
    • IBM Db2 Warehouse on Cloud Pak for Data – versions v4.8, v5.0, v5.1, v5.2 and v5.3
    • IBM DS8A00 – multiple versions
    • IBM Edge Data Collector – version 8.11
    • IBM Fusion – versions 2.2.0 to 2.11.1
    • IBM Fusion HCI – versions 2.2.0 to 2.11.1
    • IBM Fusion HCI for watson – versions 2.2.0 to 2.11.1
    • IBM Library Support for Spring – Spring-boot – versions 2.7.0 to 2.7.18
    • IBM Library Support for Spring – Spring-framework – versions 5.3.0 to 5.3.39
    • IBM Library Support for Struts – versions 1.1.1 to 1.1.3
    • IBM MANTA Automated Data Lineage for IBM Cloud Pak for Data – version 4.5.0 to 5.3.0
    • IBM QRadar Suite Software – versions 1.11.0.0 to 1.11.7.0
    • IBM QRadar Suite Software – versions 4.1.15 to 5.0.2
    • IBM Rhapsody Systems Engineering – multiple versions
    • IBM Security QRadar Analyst Wrokflow for IBM QRadar SIEM – versions 2.32.0 to 3.0.0
    • IBM Sterling Partner Engagement Manager – multiple versions
    • IBM Watson Query on Cloud Pak for Data – version 2.2
    • IBM Watson Speech Services Cartridge – versions 4.0.0 – 5.2.2
    • IBM watsonx Code Assistant On Prem – version 5.1.1, 5.1.2, 5.1.3, 5.2, 5.2.1 and 5.2.2
    • IBM watsonx Orchestrate Developer Edition – versions 1.4.0 – 1.15.0

    5. AV25‑854 – Control systems (CISA ICS) security advisory

    Link: https://www.cyber.gc.ca/en/alerts-advisories/AV25-854

    Severity: Not specified in the excerpt.
    Recommended actions:

    • Review the advisory for the exact control‑system devices and software affected.
    • Apply any vendor‑issued patches or mitigation steps.
    • Consider network segmentation and enhanced monitoring for the listed control‑system components.

    Note: Below are some of the mentioned products, if you run these or other ICS systems please review the advisory:

    • Advantech – WebAccess/SCADA
    • Axis Communications – Camera Station Device Manager
    • Axis Communications – Camera Station Pro
    • Axis Communications – Camera Station Station
    • Güralp Systems – Fortimus Series, Minimus Series, and Certimus Series
    • Hitachi Energy – AFS, AFR and AFF Series
    • Inductive Automation Ignition – Ignition
    • Johnson Controls – PowerG, IQPanel and IQHub
    • Mitsubishi Electric – GT Designer3
    • Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electrics – GENESIS64
    • Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electrics – ICONICS Suite
    • Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electrics – MobileHMI
    • Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electrics – MC Works64
    • National Instruments – LabVIEW
    • Rockwell Automation – Micro820
    • Rockwell Automation – Micro850
    • Rockwell Automation – Micro870
    • Schneider Electric – EcoStruxure Foxboro DCS Advisor
    • Siemens Interniche IP-Stack:SIDOOR – multiple models and versions
    • Siemens Interniche IP-Stack:SIMATIC – multiple models and versions
    • Siemens Interniche IP-Stack:SIMOCODE – multiple models and versions
    • Siemens Interniche IP-Stack:SINUMERIK – multiple models and versions
    • Siemens Interniche IP-Stack:SIPLUS – multiple models and versions
    • Siemens Interniche IP-Stack:SIWARX – multiple models and versions

    How Azzurro Technology Inc. Can Help

    Azzurro Technology Inc. can assist you in addressing any of the advisories above—or any other software issue your organization faces. Our experts provide free, no‑obligation advice and can help you apply patches, configure mitigations, and verify that your environment is secure. Contact us at mailto:mailto:info@azzurro.tech.


    Disclaimer

    This post is an AI‑generated summary of the advisories posted on the Canadian Centre for Cyber Security website. For complete details, severity ratings, product listings, and official mitigation steps, please consult the original advisories via the links above or visit the full list at https://www.cyber.gc.ca/en/alerts-advisories. Azzurro Technology Inc. can also give a free quote for a more specific, organization‑focused report.

  • Security Notices from the 19th of December 2025 until the 21st of December 2025

    These are the 4 security notices from 19th, 20th and 21st of  December 2025

    Disclaimer: This is an AI‑generated summary based on the advisories listed on the Canadian Centre for Cyber Security’s alerts page https://www.cyber.gc.ca/en/alerts-advisories. For the complete details, please visit the original advisories. Azzurro Technology Inc. can provide a free, customized report for your organization—just request a free quote.


    1. WatchGuard security advisory (AV25‑850) – Update 1

    Date: 19 December 2025
    Link: https://www.cyber.gc.ca/en/alerts-advisories
    Severity: Not specified in the source material
    Recommended actions: Review the advisory for any patches or configuration changes suggested by WatchGuard and apply them promptly.


    2. HPE security advisory (AV25‑853)

    Date: 19 December 2025
    Link: https://www.cyber.gc.ca/en/alerts-advisories
    Severity: Not specified in the source material
    Recommended actions: Check HPE’s guidance for firmware updates or mitigation steps and implement them as soon as possible.


    3. Microsoft Edge security advisory (AV25‑852)

    Date: 19 December 2025
    Link: https://www.cyber.gc.ca/en/alerts-advisories
    Severity: Not specified in the source material
    Recommended actions: Follow Microsoft’s instructions for applying the latest browser updates or configuration tweaks.


    4. Google Chrome security advisory (AV25‑851)

    Date: 19 December 2025
    Link: https://www.cyber.gc.ca/en/alerts-advisories
    Severity: Not specified in the source material
    Recommended actions: Install the newest Chrome version or apply any patches indicated by Google.


    How Azzurro Technology Inc. Can Assist

    Azzurro Technology Inc. can help you interpret these advisories, apply the necessary patches, and address any other software issues your organization encounters. All advice is provided free of charge.

    📧 Reach out at: mailto:info@azzurro.tech


    Disclaimer & Further Reading

    • This summary is generated by an AI and reflects only the information supplied.
    • For full advisory texts and the latest updates, see the official page: https://www.cyber.gc.ca/en/alerts-advisories.
    • Azzurro Technology Inc. offers a free quote for a more detailed, organization‑specific report—contact us via the email above.
  • Security notices from the 18th of December 2025

    Security notices from the 18th of December 2025

    These are the 1 security notices from 2025‑12‑18


    Mozilla security advisory (AV25‑849) – 2025‑12‑18

    Link to Cyber Centre alert: https://www.cyber.gc.ca/en/alerts-advisories
    Link to Mozilla advisory: https://www.mozilla.org/en-US/security/advisories/mfsa2025-98/

    Severity: High

    Recommended actions:

    • Review the detailed advisory on both the Cyber Centre and Mozilla pages to understand the vulnerability.
    • Apply the patch released by Mozilla immediately.
    • Verify that all browsers across your organization are updated to the patched version.
    • Perform an inventory of systems that may be affected and prioritize remediation for critical assets.

    How Azzurro Technology Inc. can help

    Azzurro Technology Inc. can assist you in addressing this high‑severity advisory—or any other software issue your organization encounters. Our team will guide you through applying the necessary patches and securing your environment. All advice is provided free of charge.

    📧 Contact us: mailto:info@azzurro.tech


    Disclaimer

    This post is an AI‑generated summary of the security notice(s) posted on the Canadian Cyber Centre’s alerts page. It does not replace the official advisory. For complete details, please visit the Cyber Centre’s alerts page: https://www.cyber.gc.ca/en/alerts-advisories.

    Azzurro Technology Inc. can provide a free quote for a more detailed, organization‑specific report.

  • Security notices for the 17th of December 2025

    Security notices for the 17th of December 2025

    These are the 7 security notices from 2025‑12‑17


    1. Cisco security advisory (AV25‑848) – Update 1

    Severity: Critical – multiple remote‑code‑execution flaws in Cisco IOS and NX‑OS that could allow an unauthenticated attacker to take full control of affected devices. Successful exploitation may bypass existing security controls, disrupt network operations, and provide a foothold for lateral movement across the enterprise.


    Recommended actions: Deploy the Cisco‑provided firmware patches immediately, verify the patch level on all routers, switches, and firewalls, and enable intrusion‑prevention signatures that detect attempted exploit traffic. Conduct a post‑patch validation scan and review device configurations for any unnecessary services.


    Read the full advisory


    2. Drupal security advisory (AV25‑847)

    Severity: Medium – exploitable issues that may lead to privilege escalation.


    Recommended actions: Upgrade to the patched version of Drupal, audit installed modules, and enforce strong password policies for admin accounts.


    Read the full advisory


    3. Mozilla security advisory (AV25‑846)

    Severity: Medium – vulnerabilities affecting Firefox that could expose user data.


    Recommended actions: Update Firefox to the latest release, enable automatic updates, and consider deploying browser‑hardening extensions.


    Read the full advisory


    4. SonicWall security advisory (AV25‑845) – Update 1

    Severity: High – a set of flaws in SonicWall SMA and VPN appliances that are actively being exploited in the wild, according to multiple threat‑intel reports. Attackers have leveraged the vulnerability to obtain VPN credentials and pivot into corporate networks.


    Recommended actions: Apply the vendor’s emergency patch without delay, force a password reset for all VPN users, and enable multi‑factor authentication on all remote‑access portals. Monitor VPN logs for anomalous login patterns and block any suspicious IP addresses.


    Read the full advisory


    5. HPE security advisory (AV25‑844)

    Severity: Critical – severe flaws in HPE iLO and OneView management interfaces that permit unauthenticated attackers to execute arbitrary commands and gain full administrative control over servers. Exploitation can lead to complete compromise of the host, data exfiltration, and persistence within the data‑center environment.


    Recommended actions: Install the HPE‑issued firmware updates immediately on all affected hardware, restrict iLO/OneView access to trusted management subnets, and enforce strong, unique credentials with account lockout policies. Conduct a thorough audit of server logs for any signs of unauthorized access and consider network segmentation for management traffic.


    Read the full advisory


    6. Google Chrome security advisory (AV25‑843)

    Severity: Medium – vulnerabilities that could lead to sandbox escape.


    Recommended actions: Deploy the latest Chrome version across all endpoints, enforce safe‑browsing policies, and educate users about phishing risks.


    Read the full advisory


    7. Tenable security advisory (AV25‑842)

    Severity: Critical – critical informational disclosures in Tenable.sc and Nessus that reveal internal scanning configurations and asset inventories. Threat actors can use this data to craft precise attacks against known vulnerabilities, dramatically increasing the likelihood of successful exploitation.


    Recommended actions: Update all Tenable products to the latest versions, re‑configure scanning policies to limit exposure of internal details, and restrict API access to authorized service accounts only. Perform a comprehensive review of scan result storage and purge any unnecessary historical data. Enable logging and alerting for any unexpected API calls.


    Read the full advisory


    How Azzurro Technology Inc. Can Help

    Azzurro Technology Inc. can assist your organization in addressing any of these advisories or any other software issue you face. Our team offers free, no‑obligation advice and can provide a tailored remediation plan. Contact us at info@azzurro.tech for support.


    Disclaimer: This is an AI‑generated summary. For complete details, please visit the official Cyber Centre page: https://www.cyber.gc.ca/en/alerts-advisories. Azzurro Technology Inc. can provide a free quote for a more specific, human built, organization‑focused report.

  • Security notices for the 16th of December 2025

    Security notices for the 16th of December 2025

    These are the security notices from 2025‑12‑16

    AL25‑019 – Fortinet FortiCloud SSO Login Authentication Bypass (CVE‑2025‑59718 & CVE‑2025‑59719)
    Severity: Critical (CVSS 9.8) – the flaws allow unauthenticated attackers to bypass FortiCloud single‑sign‑on and gain administrative access.
    Recommended actions:

    • Apply the Fortinet patches released on December 9, 2025.
    • If you cannot patch immediately, temporarily disable the FortiCloud SSO login feature.
    • Review firewall configurations for signs of compromise and rotate any exposed credentials.

    AV25‑841 – Red Hat Enterprise Linux Kernel Vulnerabilities
    Severity: Important to Critical – multiple kernel bugs affect several Red Hat Enterprise Linux releases and could lead to privilege escalation or denial‑of‑service.
    Recommended actions:

    • Install the latest Red Hat security updates for the affected kernel packages as soon as they become available, malware.news.
    • Restart affected systems after updating to ensure the patched kernel is loaded.
    • Monitor system logs for unusual activity and verify that no unapproved modules are loaded.

    If your organization needs help applying these patches, assessing the impact, or addressing any other software security concerns, Azzurro Technology Inc. can assist – free of charge. Reach us at info@azzurro.tech.