Arctic Wolf Report Finds Nearly Three-Quarters of Organizations Have Already Introduced AI into their Cybersecurity Posture

New global research reveals high optimism for AI’s role in threat detection and response—but leaders acknowledge it can’t succeed without human oversight EDEN PRAIRIE, Minn. – August 27, 2025 — Arctic Wolf®, a global leader in security operations, today released new findings from its latest report, Navigating the Human-AI Relationship for Security Operations Success. The Arctic Wolf Report Finds Nearly Three-Quarters of Organizations Have Already Introduced AI into their Cybersecurity Posture

CVE-2025-7775: Critical Citrix NetScaler Zero-Day RCE Exploited to Drop Webshells

Security bulletin with an exclamation point in the middle of the screen

On August 26, 2025, Citrix released fixes for a critical vulnerability in Citrix NetScaler ADC and Gateway (CVE-2025-7775) that has been exploited on unpatched appliances. The issue stems from a memory overflow flaw that could allow Remote Code Execution (RCE) and/or Denial of Service (DoS) by remote threat actors. The vulnerability affects NetScaler appliances configured CVE-2025-7775: Critical Citrix NetScaler Zero-Day RCE Exploited to Drop Webshells

Aurora Endpoint Security Achieves 100% Threat Protection in Independent Tolly Group Evaluation

Arctic Wolf delivers leading endpoint detection and response while limiting resource use and streamlining analyst workload EDEN PRAIRIE, Minn. — August 26, 2025 — Arctic Wolf®, a global leader in security operations, today announced that its Aurora Endpoint Security achieved 100% threat protection against malware while delivering exceptional efficiency, according to independent testing commissioned by Aurora Endpoint Security Achieves 100% Threat Protection in Independent Tolly Group Evaluation

What is Advanced Endpoint Protection

Endpoints play a vital role in any organisation’s operations. However, endpoints are susceptible to a variety of cyber attacks, particularly malware and ransomware – threats that remain highly popular among threat actors. Additionally, many social engineering attacks seek to gain access to individual users’ endpoints. Worse still, in a time when factors such as remote What is Advanced Endpoint Protection

What is Advanced Endpoint Protection

Endpoints play a vital role in any organization’s operations. However, endpoints are susceptible to a variety of cyber attacks, particularly malware and ransomware – threats that remain highly popular among threat actors. Additionally, many social engineering attacks seek to gain access to individual users’ endpoints. Worse still, in a time when factors such as remote What is Advanced Endpoint Protection

How To Achieve Endpoint Visibility for Enhanced Endpoint Security

Endpoint visibility is fundamental to many of the processes that underpin effective endpoint security: data collection, monitoring, alerting (including alert analysis), and comprehensive threat detection and response. Trouble is, the number, types, locations, and use cases of endpoints are constantly in flux, due to user comings and goings, role changes, broad use of virtual instances How To Achieve Endpoint Visibility for Enhanced Endpoint Security

How To Achieve Endpoint Visibility for Enhanced Endpoint Security

Endpoint visibility is fundamental to many of the processes that underpin effective endpoint security: data collection, monitoring, alerting (including alert analysis), and comprehensive threat detection and response. Trouble is, the number, types, locations, and use cases of endpoints are constantly in flux, due to user comings and goings, role changes, broad use of virtual instances How To Achieve Endpoint Visibility for Enhanced Endpoint Security

Introducing the Arctic Wolf AI Security Assistant: Providing Value for Security Operations for Beta Customers

Browser icon with blue background.

Arctic Wolf recently introduced its AI Security Assistant, a cutting-edge generative AI security assistant designed to enhance security operations within the Aurora™ Platform. This innovative tool is now in beta and promises to deliver deeper security expertise instantly to users. What Is the AI Security Assistant? The AI Security Assistant is an interactive security assistant Introducing the Arctic Wolf AI Security Assistant: Providing Value for Security Operations for Beta Customers

CVE-2025-20265: Maximum-Severity Remote Code Execution Vulnerability in Cisco Secure Firewall Management Center

Arctic Wolf Security Bulletin

On 14 August 2025, Cisco released fixes for a maximum-severity vulnerability affecting Cisco Secure Firewall Management Center (FMC) Software, tracked as CVE-2025-20265. FMC is the centralised platform used to manage security settings and network devices across Cisco Firepower and ASA deployments.  CVE-2025-20265 results from improper handling of user input during the RADIUS authentication process. An CVE-2025-20265: Maximum-Severity Remote Code Execution Vulnerability in Cisco Secure Firewall Management Center

CVE-2025-20265: Maximum-Severity Remote Code Execution Vulnerability in Cisco Secure Firewall Management Center

Arctic Wolf Security Bulletin

On August 14, 2025, Cisco released fixes for a maximum-severity vulnerability affecting Cisco Secure Firewall Management Center (FMC) Software, tracked as CVE-2025-20265. FMC is the centralized platform used to manage security settings and network devices across Cisco Firepower and ASA deployments.  CVE-2025-20265 results from improper handling of user input during the RADIUS authentication process. An CVE-2025-20265: Maximum-Severity Remote Code Execution Vulnerability in Cisco Secure Firewall Management Center

Threat Actor Profile: Interlock Ransomware

Browser icon with blue background.

Executive Summary A relatively new ransomware group, Interlock, has gained traction in 2025 as an opportunistic ransomware operator that leverages compromised websites and multi-stage social engineering techniques to deliver their payloads. First observed in September 2024, Interlock departs from the traditional Ransomware-as-a-Service (RaaS) model, operating without affiliates or public advertisements. The financially-motivated group conducts opportunistic Threat Actor Profile: Interlock Ransomware

CVE-2025-25256: PoC Available for FortiSIEM Remote Unauthenticated Command Injection Vulnerability

Arctic Wolf Security Bulletin

On 12 August 2025, Fortinet released fixes for a critical-severity vulnerability in FortiSIEM, tracked as CVE-2025-25256. The flaw arises from improper neutralisation of special elements used in an OS command within the phMonitor service (TCP/7900). Successful exploitation could allow a remote, unauthenticated threat actor to execute unauthorised code or commands via crafted CLI requests.  Fortinet CVE-2025-25256: PoC Available for FortiSIEM Remote Unauthenticated Command Injection Vulnerability

CVE-2025-25256: PoC Available for FortiSIEM Remote Unauthenticated Command Injection Vulnerability

On August 12, 2025, Fortinet released fixes for a critical-severity vulnerability in FortiSIEM, tracked as CVE-2025-25256. The flaw arises from improper neutralization of special elements used in an OS command within the phMonitor service (TCP/7900). Successful exploitation could allow a remote, unauthenticated threat actor to execute unauthorized code or commands via crafted CLI requests.  Fortinet CVE-2025-25256: PoC Available for FortiSIEM Remote Unauthenticated Command Injection Vulnerability

From Hours to Assurance: Inside the Incident360 Retainer

Join Arctic Wolf as we take a close look at the new Incident360 Retainer and demonstrate how the next step toward proactive incident response can help you better respond to and prepare for cyber incidents. IDC, Arctic Wolf’s Incident Response Retainer Plan: Why Didn’t Anyone Think of This Before?, July 2025, IDC #US53353925

Microsoft Patch Tuesday: August 2025

Arctic Wolf Security Bulletin

On 12 August 2025, Microsoft released its August 2025 security update, addressing 107 newly disclosed vulnerabilities. Arctic Wolf highlighted four vulnerabilities in this bulletin based on their potential impact. At the time of disclosure, none of the vulnerabilities had been reported as exploited.  Vulnerabilities  Vulnerability  CVSS  Description  CVE-2025-49712  8.8  Microsoft SharePoint Remote Code Execution Vulnerability Microsoft Patch Tuesday: August 2025

Microsoft Patch Tuesday: August 2025

Security Bulletin text on the screen with a wolf in the background

On August 12, 2025, Microsoft released its August 2025 security update, addressing 107 newly disclosed vulnerabilities. Arctic Wolf highlighted four vulnerabilities in this bulletin based on their potential impact. At the time of disclosure, none of the vulnerabilities had been reported as exploited.  Vulnerabilities  Vulnerability  CVSS  Description  CVE-2025-49712  8.8  Microsoft SharePoint Remote Code Execution Vulnerability Microsoft Patch Tuesday: August 2025

The 2025 Cyber Insurance Outlook

Discover the latest trends and insights in the cyber insurance market with Arctic Wolf’s 2025 Cyber Insurance Outlook report. Learn how AI, ransomware, and evolving threats are shaping the industry.

The 2025 Cyber Insurance Outlook

Discover the latest trends and insights in the cyber insurance market with Arctic Wolf’s 2025 Cyber Insurance Outlook report. Learn how AI, ransomware, and evolving threats are shaping the industry.

CVE-2025-53786: U.S. CISA Issues Emergency Directive for Post-Authentication Vulnerability in Microsoft Exchange Hybrid Configurations

Arctic Wolf Security Bulletin

On August 6, 2025, Microsoft disclosed a high-severity post-authentication vulnerability affecting on-premises Microsoft Exchange servers configured for hybrid-joined environments, tracked as CVE-2025-53786. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued Emergency Directive 25-02, requiring federal agencies to patch the vulnerability by Monday, August 11. At this time, no other countries are known to CVE-2025-53786: U.S. CISA Issues Emergency Directive for Post-Authentication Vulnerability in Microsoft Exchange Hybrid Configurations