Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Howler Episode 18: Lisa Tetrault, Senior Vice President, Security Services

This month, we sit down with Lisa Tetrault, Senior Vice President of Security Services, as she shares about her career journey, scaling the Security Operations Center (SOC) at Arctic Wolf from when we had less than 100 pack members to today, and the practices that keep her grounded and achieving her goals.

How to Implement a Zero Trust Strategy

The ways in which people work are changing, and so are the approaches needed to secure modern work. As organizations race to gain the benefits of cloud computing, relax rules around bring-your-own devices, and leverage hybrid-work models that require edge devices such as VPN gateways, the result is an expanding, disparate IT environment. And even worse, users are a part of the attack surface — one threat actors are all too ready and willing to exploit.

RVTools Supply Chain Attack Delivers Bumblebee Malware

Arctic Wolf has recently observed the distribution of a trojanized RVTools installer via a malicious typosquatted domain. The domain matches the legitimate domain, however, the Top Level Domain (TLD) is changed from.com to.org. RVTools is a widely used VMware utility for inventory and configuration reporting, developed by Robware. Once the malicious installer was downloaded, the installer attempts to make outbound connections to known command and control infrastructure.

What is Cloud Security Posture Management?

The cloud provides many great business advantages – efficiency, speed-to-market, and many others – and has been rapidly adopted by organizations all over the world. While the rise in cloud operations allows organizations to operate in a way that’s more cost-effective and flexible, opening data, assets, and networks to the internet creates additional risk — particularly around misconfigurations and non-compliance.

CVE-2025-32756: Exploitation of Critical Severity Zero-Day Vulnerability in Fortinet FortiVoice

On May 13, 2025, Fortinet published a security advisory on a critical severity stack-based overflow vulnerability, CVE-2025-32756, impacting FortiVoice, FortiCamera, FortiMail, FortiNDR, and FortiRecorder. The vulnerability allows remote unauthenticated threat actors to execute arbitrary code or commands via crafted HTTP requests. In the advisory Fortinet stated that the vulnerability has been exploited in the wild on FortiVoice.

CVE-2025-2775: PoC Released for SysAid On-Premises Pre-Auth RCE Vulnerability

On May 7, 2025, watchTowr publicly disclosed technical details and a proof-of-concept (PoC) exploit for a pre-authenticated Remote Code Execution (RCE) chain affecting SysAid On-Premises, a self-hosted IT service management (ITSM) platform used by organizations to manage IT support tasks. Although the vulnerabilities were patched in March 2025, they had not been assigned Common Vulnerabilities and Exposures (CVE) identifiers and were disclosed for the first time with watchTowr’s publication.