🗓️ WEBINAR | APR 28: The Governance Gap — Why Policy Breaks Down at Scale Register Now 🗓️ WEBINAR | The Governance Gap — Why Policy Breaks Down at Scale
CyCognito Blog

Research

Search the Blog

By Amit Sheps

CVE-2026-24061 is a newly assigned vulnerability that may allow remote code execution in externally exposed services due to improper input validation. Limited public details and lack of patches increase uncertainty, making comprehensive external asset visibility critical for effective risk assessment.

Read more about Emerging Threat: CVE-2026-24061 – Telnet Authentication Bypass in GNU Inetutils
By Zohar Venturero

Our new study looks under the hood of domain-to-IP volatility to understand how modern infrastructure behaves and why it matters for enterprise security operations. Read the research for a deeper look at the mechanics behind changing DNS resolution and what it means for tracking assets and exposure over time.

Read more about Domain-to-IP Volatility at Scale: A Study of 4 Million Enterprise Domains
By Amit Sheps

CVE-2026-21858, CVE-2025-68613, and CVE-2026-21877 expose critical remote code execution risks in n8n workflow automation. This blog outlines affected assets, available fixes, exploitation status, and recommended actions, and explains how CyCognito helps organizations identify exposed instances and reduce external risk effectively.

Read more about Emerging Threat: CVE-2026-21858, CVE-2025-68613 & CVE-2026-21877 – n8n Workflow Automation Vulnerabilities
By Amit Sheps

CVE-2025-37164 is a critical unauthenticated remote code execution vulnerability in HPE OneView. Because OneView serves as a privileged infrastructure management platform, successful exploitation can grant attackers broad control over managed systems, increasing the risk of lateral movement and downstream compromise.

Read more about Emerging Threat: CVE-2025-37164 – Critical Unauthenticated Remote Code Execution in HPE OneView
By Amit Sheps

CVE-2025-14733 is a high-severity authentication bypass vulnerability that can allow unauthenticated access to protected web applications and APIs. This blog explains affected assets, potential risk, available fixes, recommended actions, and how CyCognito helps organizations identify and reduce exposure.

Read more about Emerging Threat: CVE-2025-14733 –  Authentication Bypass Vulnerability
By Amit Sheps

CVE-2025-55182 is a critical RCE vulnerability in React Server Components affecting React 19 and Next.js applications. This blog explains what’s impacted, how attackers can exploit it, available patches, recommended actions, and how CyCognito helps organizations identify and prioritize exposed assets.

Read more about Emerging Threat: CVE-2025-55182 (React2Shell) – React Server Components RCE Vulnerability
By Amit Sheps

CVE-2025-41115 is a critical privilege escalation and user impersonation vulnerability in Grafana Enterprise. An attacker who exploits it can impersonate an administrator, modify dashboards and alerts, access connected databases and observability data, and pivot into other integrated systems.

Read more about Emerging Threat: CVE-2025-41115 – Critical SCIM Privilege Escalation in Grafana Enterprise
By Amit Sheps

CVE-2025-64095 is a critical file-upload vulnerability in DNN that allows unauthenticated attackers to overwrite site content and inject malicious code. Learn what’s affected, how to mitigate the risk, and how CyCognito helps identify vulnerable external assets.

Read more about Emerging Threat: CVE-2025-64095 – Critical Unauthenticated File Upload Vulnerability in DNN (DotNetNuke)
By Amit Sheps

CVE-2025-55752 is a path traversal vulnerability in Apache Tomcat that can bypass security controls and, in configurations allowing HTTP PUT, enable malicious file uploads leading to potential remote code execution. Proof-of-concept code is available, and cybersecurity authorities warn exploitation attempts are likely.

Read more about Emerging Threat: Apache Tomcat Vulnerability CVE-2025-55752