Blog Contributor

Can You Detect What You Can’t Predict? Lessons from SharePoint Vulnerability CVE-2025-53770

The exploitation of critical zero-day vulnerabilities in Microsoft SharePoint highlights that adversaries don’t always need new tools to succeed. By chaining familiar techniques with newly discovered flaws, they can bypass defenses without deploying novel malware or infrastructure. Sometimes, all it …

Continue reading

Infiltrating Defenses: Abusing VMware in MITRE's Cyber Intrusion

This is the third and final blog post in a series detailing MITRE’s encounter with a state-sponsored cyber threat actor in our research and experimentation network, NERVE. It builds upon the insights shared in our April 19, 2024 post, “Advanced Cyber Threats Impact Even the Most Prepared” and May 3, …

Continue reading