Operations | Monitoring | ITSM | DevOps | Cloud

Addressing Critical Linux CVEs and React Vulnerabilities #patch

Key Takeaways December Patch Tuesday lineup includes one known exploit in the Windows OS that warrants attention. Third-party Patch Tuesday updates include Mozilla and Adobe. Google Chrome released iOS updates so far, but a Chrome Desktop release is expected this week. Here we are at the final Patch Tuesday for 2025. Microsoft has resolved 56 CVEs (two Critical and 54 Important). Included in this release is one known exploited (CVE-2025-62221) and two publicly disclosed CVEs (CVE-2025-54100 and CVE-2025-64671).

How Poor Digital Experience Drives Security Risks at Work #shorts #ivanti

Ivanti’s 2025 DEX report reveals a surprising disconnect: While IT leaders strongly believe in DEX, its adoption and impact are plateauing across industries. Join us for a thought-provoking webinar with Ivanti’s Mariah Shotts, along with special guest and AI expert Rob May. We’ll unpack findings from our global survey of 3,300 IT professionals and office workers, revealing: Whether you’re just beginning your DEX journey or looking to optimize your existing program, this session will help you benchmark your progress, close critical gaps and chart a future-proof strategy.

Latest Software Updates: Adobe, Microsoft, and Mozilla #shorts #patch

Adobe has released five updates, featuring a major cold fusion update addressing over 140 CVEs. Microsoft has issued six updates, with no critical CVEs in its OS update. Mozilla has rolled out three critical updates for Firefox. Effective management of CVEs relies on risk-based prioritization, as individual ratings may not accurately represent real-world risks.

DLL Hijacking: Risks, Real-World Examples and How to Prevent Attacks

There’s been buzz around CVE-2025-56383 (published on Sept. 26, 2025), a hijacking vulnerability in Notepad++ v8.8.3 in which a DLL file can be swapped to execute malicious code. The CVE has been disputed by multiple parties, but we’re not here to comment on that. However, we are here to comment on DLL hijacking and discuss the very real threat that it poses to an organization. Let’s look into what DLL hijacking is and what measures you can take to keep your DLLs safe.

ITAM: Your Unexpected First Line of Cyber Threat Defense

When the conversation turns to cybersecurity, people often think of firewalls, intrusion detection systems or state-of-the-art endpoint protection. Yet, beneath these sophisticated shields is an essential (and often unsung) foundation: robust IT Asset Management (ITAM). For CIOs guiding mid-sized and enterprise organizations through an increasingly perilous digital landscape, ITAM offers not just operational clarity, but a powerful first line of cyber threat defense.

Is Shadow AI Quietly Reshaping Your Workplace Security Posture?

AI tools have seen a meteoric rise in the workplace. What was once the domain of highly specialized tech roles is now commonplace: Ivanti’s 2025 Technology at Work Report found that 42% of office workers say they’re using gen AI tools, like ChatGPT, at work — up 16 points from the previous year. The catch? These productivity gains happen under the table. Among those who reported using gen AI tools, 46% say that some (or all) of the tools they use are not employer-provided.

Service Desk Excitement for Ivanti Neurons Automation Bots #shorts

Ivanti is a leading enterprise software company that offers a powerful, cloud-based IT and security platform. Our solutions are designed to scale with your business, helping IT and Security teams boost operational efficiency, cut costs and stay ahead of security threats. The Ivanti Neurons platform is cloud-native, providing a unified and reusable foundation for consistent visibility, scalability, and secure delivery. Trusted by over 34,000 customers, including 85 of the Fortune 100, Ivanti empowers organizations to tackle challenges with end-to-end solutions.

Google Issues Security Fix: What to know #patch

Timely application updates are crucial, especially after security vulnerabilities such as zero-day exploits. Organizations must adopt a proactive update strategy for third-party applications. Challenges with auto-updaters require user action to complete updates. Specific instances of zero-day vulnerabilities in Google Chrome and Edge highlight the need for consistent and frequent updates to reduce security risks.

Reducing Resolution Time with Ivanti Neurons Automation Bots #shorts

Ivanti is a leading enterprise software company that offers a powerful, cloud-based IT and security platform. Our solutions are designed to scale with your business, helping IT and Security teams boost operational efficiency, cut costs and stay ahead of security threats. The Ivanti Neurons platform is cloud-native, providing a unified and reusable foundation for consistent visibility, scalability, and secure delivery. Trusted by over 34,000 customers, including 85 of the Fortune 100, Ivanti empowers organizations to tackle challenges with end-to-end solutions.

Proactive Battery Health Device Monitoring with Ivanti Neurons Automation Bots #shorts

Ivanti is a leading enterprise software company that offers a powerful, cloud-based IT and security platform. Our solutions are designed to scale with your business, helping IT and Security teams boost operational efficiency, cut costs and stay ahead of security threats. The Ivanti Neurons platform is cloud-native, providing a unified and reusable foundation for consistent visibility, scalability, and secure delivery. Trusted by over 34,000 customers, including 85 of the Fortune 100, Ivanti empowers organizations to tackle challenges with end-to-end solutions.