top of page
All Posts
CVSS 4.0 vs CVSS 3.1 vs 3.0: Why Vulnerability Severity Scoring Needed a Reset
For years, vulnerability management has revolved around a familiar ritual: scan, score, sort, patch. At the center of that ritual sat CVSS, a single numerical expression of danger that promised clarity in a chaotic threat landscape. Over time, that promise hardened into dependency. CVSS scores became policy triggers, SLA benchmarks, and executive talking points. Yet as systems grew more interconnected and attacks more adaptive, the gap between what CVSS measured and what defe
Rhoda Smart
Feb 135 min read


n8n Python Sandbox Escape (CVE-2026-0863): Code Node Vulnerability Explained
Python’s widespread use for automation and scripting is a double-edged sword: it accelerates workflow development but expands the attack surface of automation platforms. In the context of n8n , a popular open-source workflow automation tool, Python execution has historically been a security challenge. The vulnerability tracked as CVE-2025-68668 prompted n8n to remove in-process Pyodide execution and harden defaults to reduce unsafe sandboxing paths. However, CVE-2026-0863 d
Rhoda Smart
Jan 2212 min read


MongoBleed: Pre-Auth Memory Disclosure via OP_COMPRESSED in MongoDB (CVE-2025-14847)
CVE-2025-14847 is a remotely exploitable information disclosure vulnerability affecting MongoDB Server . The flaw exists in the server’s network message handling logic and can be triggered before authentication, making it reachable by any client that can establish a network connection to the MongoDB service. MongoDB uses a custom binary wire protocol over TCP for all client–server communication. To reduce bandwidth usage, the protocol supports optional message compression, in
Rhoda Smart
Jan 1116 min read


CVE-2025-68668: Breaking Out of the Python Sandbox in n8n
INTRODUCTION CVE-2025-68668 is a sandbox bypass vulnerability in n8n , an open source workflow automation platform widely used for internal tooling, integrations, and automation pipelines. The flaw affects n8n versions from 1.0.0 up to, but not including, 2.0.0 , and allows an authenticated user with permission to create or modify workflows to execute arbitrary operating system commands on the host running n8n . At the center of this issue is the Python Code Node , which reli
Rhoda Smart
Jan 218 min read


Trust Wallet links $8.5M Chrome extension hack to Shai-Hulud supply chain attack
Trust Wallet has disclosed that a major security breach affecting its Google Chrome browser extension was the result of a broader software supply chain attack linked to the second wave of the Shai-Hulud, also known as Sha1-Hulud, campaign observed in November 2025. The incident ultimately led to the theft of approximately $8.5 million in cryptocurrency assets. In a post-mortem released on Tuesday, the company confirmed that developer secrets stored in its GitHub environment
Rhoda Smart
Jan 23 min read


A Technical Analysis of CVE-2025-13915: Critical Authentication Bypass in IBM API Connect
Introduction CVE-2025-13915 is a critical authentication bypass vulnerability affecting IBM API Connect , an enterprise API management platform used by organizations to publish, manage, and secure APIs. The issue allows a remote attacker to access protected components without proper authentication, effectively skipping the login checks that should block unauthenticated requests. IBM rated the flaw 9.8 on the CVSS scale, which already shows how serious the impact can be in rea
Rhoda Smart
Jan 111 min read


CVE-2025-13915: Critical Authentication Bypass in IBM API Connect
IBM has disclosed a critical security vulnerability in its API Connect platform that could allow attackers to bypass authentication and gain unauthorized access to the application. API Connect is commonly used by large organizations to build, manage, and secure APIs across cloud and on-prem environments, which increases the potential impact of this vulnerability. The issue, tracked as CVE-2025-13915, has a CVSS score of 9.8, placing it in the critical severity range. Accordin
Rhoda Smart
Dec 31, 20251 min read


Essential Tips for Protecting Your Business Online
In today's digital landscape, protecting your business online is more crucial than ever. With cyber threats on the rise, ensuring the safety of your data and maintaining your customers' trust should be a top priority. This blog post will provide essential tips to help you safeguard your business from potential online threats and vulnerabilities. Understanding Cyber Threats Before diving into protective measures, it's important to understand the types of cyber threats that can
Rhoda Smart
Dec 7, 20254 min read


Understanding Ransomware: Prevention and Response Strategies
Ransomware attacks have become a significant threat to individuals and organizations alike. With the rise of digital technology, the potential for cybercriminals to exploit vulnerabilities has increased dramatically. In 2022 alone, ransomware attacks surged by 13% compared to the previous year, affecting thousands of businesses and individuals worldwide. Understanding ransomware, its implications, and effective prevention and response strategies is crucial for safeguarding yo
Rhoda Smart
Dec 7, 20254 min read


Top Cybersecurity Trends to Watch in 2023
In an era where digital transformation is accelerating, cybersecurity has become a critical concern for organizations worldwide. As we move through 2023, several trends are emerging that will shape the cybersecurity landscape. Understanding these trends is essential for businesses to protect their assets and maintain trust with customers. This blog post will explore the top cybersecurity trends to watch this year, providing insights and practical examples to help you stay ahe
Rhoda Smart
Dec 7, 20254 min read
bottom of page