Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Enhancing Detection and Security Efficacy with the Behavioral Detection Engine in Aurora Endpoint Defense

In the ever-evolving cybersecurity landscape, staying ahead of emerging threats is a constant challenge. Traditional endpoint detection and response (EDR) solutions often suffer from alert noise, rule complexity, and slow adaptation to new attack techniques. That’s why Arctic Wolf is excited to introduce the Behavioral Detection Engine — an advanced detection and response framework embedded within Aurora Focus, the EDR module of Aurora Endpoint Defense.

CVE-2025-5777: Critical Information Disclosure Vulnerability "Citrix Bleed 2" in Citrix NetScaler ADC and Gateway

On June 23, 2025, Citrix updated the scope of a previously disclosed vulnerability—CVE-2025-5777—to clarify that it affects NetScaler devices configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. CVE-2025-5777, originally disclosed on June 17, is a critical-severity out-of-bounds read caused by insufficient input validation.

Four Ways to Prevent Credential Theft and Credential-Based Attacks

When it comes to cybercrime, there are few threat actor tactics as useful and widespread as credential theft, and the subsequent use of stolen credentials, to maliciously gain access to an IT environment. As hybrid work models and the widespread use of web-based applications further the digitalization of corporate environments, user credentials have proliferated. In turn, credential theft has risen as a low-tech way for threat actors to gain easy access to target environments.

Pre-Authenticated RCE Chain Disclosed in Sitecore XP

On June 17, 2025, watchTowr disclosed technical details for a pre-authenticated remote code execution (RCE) exploit chain in Sitecore Experience Platform (XP), an enterprise content management system. Although Sitecore released a fix for these vulnerabilities in May 2025, no official CVE identifiers have been assigned at this time. The three vulnerabilities are currently tracked as WT-2025-0024, WT-2025-0025, and WT-2025-0032 by watchTowr and impact Sitecore XP versions 10.1 through 10.4.

Arctic Wolf Observes Social Engineering Campaign Targeting IT Staff of Healthcare Providers to Reset User Credentials

Arctic Wolf has identified a social engineering campaign targeting health care providers in the United States. Throughout multiple incidents, hospital help desks have received suspicious phone calls from unidentified individuals claiming to be doctors who had forgotten their password. When the callers were confronted with a request to verify their identities, including first name and department affiliation, the suspicious callers disconnected.

Alpha AI: The Apex of SOC Intelligence

Arctic Wolf is redefining cybersecurity with AI-powered innovations that help businesses stay ahead of evolving threats. By combining human expertise, the power of the Aurora Platform, and one of the industry’s largest security data sets, Alpha AI makes security simpler, faster, and more effective. Watch Dan Schiappa, President of Technology and Services, and Ian McShane, Vice President of Product, as they share how Arctic Wolf’s latest AI advancements are helping more than 10,000 organizations make security work.

Trend Micro Fixes Several Critical Vulnerabilities in Apex Central and Endpoint Encryption PolicyServer

On June 10, 2025, Trend Micro released fixes for six critical vulnerabilities affecting Apex Central and Endpoint Encryption PolicyServer. Five of the vulnerabilities allow remote code execution (RCE), and one enables authentication bypass. The vulnerabilities were responsibly disclosed by the Zero Day Initiative (ZDI), a vulnerability research organization owned by Trend Micro.

Arctic Wolf Observes Organizations Receiving Unsolicited Microsoft MFA Messages

Arctic Wolf has recently observed customers receiving unsolicited Microsoft multi-factor authentication (MFA) text messages. These messages originate from legitimate Microsoft short code numbers; however, the source and intent have not been confirmed. This issue appears widespread, affecting organizations across multiple industry verticals. Example of Text Message It is currently unclear whether this activity is due to a systemic issue on Microsoft’s side or part of a malicious campaign.

The Howler Episode 19: Todd Warner, SVP of Customer Success

This month, we sit down with Todd Warner, Senior Vice President of Customer Success, as he shares the best leadership advice he's ever received, why he loves working in customer success, his love of swim spas, and much more! Todd Warner is the SVP of Customer Success at Arctic Wolf, where he focuses on taking care of our customers and leading the CS team. With 10+ years leading and building CS teams and 10+ years in various sales roles, he has learned the importance of listening to customers and working toward outcomes that best suit their needs.