This Week in Technology

This Week in Technology

By Eric Corcoran
Posted in Technology Week in Review
On July 25, 2025

Monday 7/14

XenServer: Powering your present, readying your future, and now available for all workloads (Citrix)

XenServer is widening its support statement to embrace all types of workloads. This isn’t just a minor update; it’s a strategic move to address the very real challenges facing our customers today, offering a powerful, cost-effective, and versatile hypervisor for your entire virtualized infrastructure.

https://www.citrix.com/blogs/2025/07/09/xenserver-now-available-for-all-workloads/

June 2025 Malware Spotlight: Discord Exploits Lead to Rising Threats (Check Point)

FakeUpdates is the most prevalent malware this month with an impact of 4% worldwide organizations, followed by Androxgh0st with an impact of 3% and AsyncRat with 2% impact.

https://blog.checkpoint.com/research/june-2025-malware-spotlight-discord-exploits-lead-to-rising-threats/

Tuesday 7/15

CIS Safeguard 4.9: Configure Trusted DNS Servers on Enterprise Assets

https://www.gothamtg.com/blog/cis-safeguard-49-configure-trusted-dns-servers-on-enterprise-assets

Enterprise Data Cloud vs. Traditional Storage: What’s the Real Difference? (Pure Storage)

Your storage strategy directly affects your ability to manage data well. And for organizations looking to scale AI, modernize operations, and stay adaptable, effective data management can shape the entire direction of the business.

https://blog.purestorage.com/perspectives/enterprise-data-cloud-vs-traditional-storage-whats-the-real-difference/

Understanding the True Costs of a Cyber Attack on Healthcare Organizations (Rubrik)

As healthcare organizations navigate these threats, they must balance their fundamental mission of patient care with the complex financial realities that follow an attack.

https://www.rubrik.com/blog/company/25/understanding-the-true-costs-of-a-cyber-attack-on-healthcare-organizations

Wednesday 7/16

Identity security at inception: A CISO’s guide to proactive protection (CyberArk)

The current state of identity sprawl demands a shift to a proactive model: protecting enterprise resources and privileged access at the moment of creation.

https://www.cyberark.com/resources/blog/identity-security-at-inception-a-cisos-guide-to-proactive-protection

The new frontier of ransomware defense: NetApp’s data-driven resilience (NetApp)

In the ever-escalating cyberwar, ransomware is a relentless predator, no longer content with breaching endpoints or sneaking past perimeter defenses. Today’s attacks zero in on the heart of organizations: their data infrastructure. Backup systems, storage environments, and recovery frameworks are now prime targets, demanding a radical rethinking of resilience strategies.

https://www.netapp.com/blog/ransomware-defense-data-resilience/

Monday 7/21

Microsoft Releases Guidance on Exploitation of SharePoint Vulnerability (CVE-2025-53770)

CISA is aware of active exploitation of a new remote code execution (RCE) vulnerability enabling unauthorized access to on-premises SharePoint servers. While the scope and impact continue to be assessed, the new Common Vulnerabilities and Exposures (CVE), CVE-2025-53770, is a variant of the existing vulnerability CVE-2025-49706 and poses a risk to organizations.

https://www.cisa.gov/news-events/alerts/2025/07/20/microsoft-releases-guidance-exploitation-sharepoint-vulnerability-cve-2025-53770

Modern applications need modern networking — Here’s what that means for your business (Citrix)

Businesses everywhere are re-architecting applications into microservices, shifting to cloud-native platforms, and building systems that can scale fast, change frequently, and run anywhere. This evolution has brought huge gains in agility—but it’s also introduced a new layer of complexity.

https://www.citrix.com/blogs/2025/07/15/modern-applications-need-modern-networking/

Modern application control, done right with least privilege (CyberArk)

Transitioning to a least privilege strategy can help to substantially reduce the attack surface by restricting access rights to only what is necessary for users and devices to perform their tasks. This approach minimizes the risk of insider threats, complicates lateral movement, limits the impact of compromised accounts, and enhances overall security posture.

https://www.cyberark.com/resources/blog/modern-application-control-done-right-with-least-privilege

Tuesday 7/22

Certificate Management on Domain Controllers

Security of an Active Directory (AD) infrastructure can be significantly increased by deploying Active Directory Certificate Services (AD CS) and installing certificates on domain controllers (DC). AD CS plays a foundational role for enabling certificate-based security across a range of services in AD.

https://www.gothamtg.com/blog/certificate-management-on-domain-controllers

CIS Safeguard 4.10: Enforce Automatic Device Lockout on Portable Devices

https://www.gothamtg.com/blog/cis-safeguard-410-enforce-automatic-device-lockout-on-portable-devices

Identity visibility gets its own category—and it's long overdue (Axonius)

Identity Visibility and Intelligence Platforms (IVIP)  bring clarity to identity chaos. They integrate identity data across systems (think AD, Azure, Okta, Workday, AWS, on-prem apps, SaaS platforms, and more), normalize and correlate that data, and make it actionable through risk insights, automation, and governance context.

https://www.axonius.com/blog/identity-visibility-gets-its-own-category

SharePoint Zero-Day CVE-2025-53770 Actively Exploited: What Security Teams Need to Know (Check Point)

This exploitation campaign reinforces the critical need to monitor and defend legacy and on-premises infrastructure. Threat actors are rapidly leveraging unpatched SharePoint vulnerabilities and chaining exploits like CVE-2025-53770 with older flaws such as CVE-2025-49706 to gain initial access and escalate privileges.

https://blog.checkpoint.com/research/sharepoint-zero-day-cve-2025-53770-actively-exploited-what-security-teams-need-to-know/

Wednesday 7/23

Exchange 2016 and 2019 Reach End of Life in October 2025 – What You Need to Know

Microsoft has officially set the end-of-life date for both Exchange Server 2016 and Exchange Server 2019: October 14, 2025. That might sound like a long way off, but in IT terms, it’s right around the corner, especially if your organization still relies on Exchange for SMTP relay, hybrid identity, or legacy app integration.

https://www.gothamtg.com/blog/exchange-2016-and-2019-reach-end-of-life-in-october-2025-what-you-need-to-know

Thursday 7/24

How a Compromised Child Domain Can Lead to Complete Active Directory Forest Compromise (Rubrik)

When one child domain in a larger AD forest is compromised, cyber attackers can leverage inherent trust relationships to escalate privileges and subsequently gain full control of the entire Active Directory forest.

https://www.rubrik.com/blog/technology/25/7/how-a-compromised-child-domain-can-lead-to-complete-active-directory-forest-compromise

Cybersecurity Stop of the Month: Detecting and Responding to an Account Takeover (Proofpoint)

While phishing emails are often the entry point, today’s attackers have multiple options for breaking in. These include brute force attacks, multifactor authentication (MFA) bypass (like SIM swapping), adversary-in-the-middle (AiTM) attacks, helpdesk social engineering and malware—to name a few. All of these tactics can lead to a successful ATO, especially in digital workspaces where identity is the new perimeter. 

https://www.proofpoint.com/us/blog/email-and-cloud-threats/detecting-responding-stopping-account-takover

Friday 7/25

Sovereign SASE: A New Model for Data-Sensitive Enterprises (Fortinet)

Sovereign SASE is a deployment model in which security processing and traffic inspection happen entirely within trusted, organization-controlled environments. Unlike traditional cloud SASE solutions that rely on vendor-managed points of presence (POPs), sovereign SASE keeps user traffic, logs, enforcement, and telemetry local, on-premises or in a private data center.

https://www.fortinet.com/blog/business-and-technology/sovereign-sase-a-new-model-for-data-sensitive-enterprises

Breaking Performance Barriers: Extending the Unified Data Plane (Pure Storage)

If you’re managing mission-critical applications or looking to consolidate workloads, you know the struggle. Legacy architectures force you to choose between getting the performance you need and managing reasonable costs, rack space, and operational complexity. Why should achieving high performance mean accepting massive management overhead or sky-high electricity bills?

https://blog.purestorage.com/products/extending-the-unified-data-plane/