Threat advisory: multiple critical remote code execution vulnerabilities affecting Microsoft windows platforms
advisory ID: ADV-2025-ALL-05
date issued: 14 May 2025
severity: Critical (CVE-2025-29966), High (CVE-2025-30397)
CVSs scores:
Our Managed Detection and Response Services provide continuous monitoring from a team who’ll neutralise any breaches at speed...
Gain access to malware experts to quickly contain threats and reduce future exposure to attacks...
Integrity360 has been recognised as a Gartner Representative Vendor.
Many organisations are choosing CyberFire MDR to strengthen their defences. Discover how it can protect your business in our brochure.
Cyber attacks often seem faceless, but hidden behind the headlines of financial loss and technical details there are very real human stories.
In 2025, we’re witnessing a shift in how ransomware operates, who it targets, and the consequences of falling victim.
Stay ahead of the latest cyber security industry developments, advancements and threats, and understand how you can best protect your organisation.
Do you know what your company’s network vulnerabilities are? Businesses that invest in penetration testing do.
If your business handles credit card data, PCI DSS compliance isn’t optional—it’s critical. From retailers and e-commerce platforms to service providers and financial institutions, securing credit card data is critical to customer trust and preventing fraud.
Stay informed with the latest cyber security news with our weekly threat roundups.
Confused about cyber security? Our A-Z Glossary of terms can help you navigate this complicated industry.
Unlocking the full potential of Microsoft’s built-in security capabilities takes more than just a licence. It requires cyber security expertise, strategic alignment with business goals, and smart implementation. That’s where Integrity360 comes in.
SOC 2 certification reflects Integrity360’s continued investment in strengthening cyber resilience for clients across highly regulated and high-risk industries.
Holiseum will form a new Integrity360 services practice focused on OT/IoT and as a regional hub for the group in France
Posts by:
advisory ID: ADV-2025-ALL-05
date issued: 14 May 2025
severity: Critical (CVE-2025-29966), High (CVE-2025-30397)
CVSs scores:
CVSS Base Score: 9.8 CRITICAL
As the cyber threat landscape evolves, staying ahead of emerging risks is crucial. Discover the key trends shaping cyber security in 2025 and how to prepare.
When a new security vulnerability emerges, there’s often a small window of time to respond before attackers start exploiting it in the wild. For LDAPNightmare (CVE-2024-49112), that window is quickly closing.
Microsoft’s latest Patch Tuesday release addressed 16 critical vulnerabilities, all classified as remote code execution flaws—a stark reminder of the importance of proactive patch management.
The recently discovered vulnerabilities in Veeam Service Provider Console, tracked as CVE-2024-42448 and CVE-2024-42449, have been classified as critical and high severity. If exploited, these vulnerabilities could severely undermine system integrity and operational security, jeopardising sensitive data and backup operations.
If you were to look at a stock image of a hacker, it would show a hooded figure hunched over the desk who’s lost in the sea of green text and numbers that flash across the screen.
Issue Overview and Impact
CVE-2024-24919 is a critical information disclosure vulnerability in Check Point Security Gateways which have remote access VPN or mobile access software enabled.
With more and more businesses embracing digital transformation, the importance of data security, particularly in online transactions, has never been greater. The Payment Card Industry Data Security Standard (PCI DSS) stands as a benchmark for securing payment card data. Compliance with PCI DSS is mandatory for all businesses handling card payments, ensuring the confidentiality, integrity, and availability of cardholder data.
With new vulnerabilities being discovered every day the issue of vulnerability management has never been more important. Cyber threats are evolving at a rapid pace, often leaving cyber security researchers struggling to keep up. To avoid the worst case scenarios businesses must understand how to identify, prioritise, and mitigate vulnerabilities before they can be exploited by adversaries. This is where vulnerability management comes in, but how can it be used effectively?