Send a text
This week on the InfoSec.Watch Podcast, we break down a series of actively exploited vulnerabilities targeting some of the most trusted control planes in enterprise environments—firewalls, identity integrations, and mobile device management platforms.
The episode opens with active exploitation of Fortinet’s FortiCloud SSO authentication bypass (CVE-2026-24858), impacting FortiManager, FortiAnalyzer, and FortiPortal deployments with SSO enabled. With CISA publishing mitigation guidance, the hosts explain why FortiCloud SSO must be treated as an exposure multiplier, and why defenders should assume compromise, hunt for persistence, and validate trust even after patching.
Next, the focus shifts to Ivanti Endpoint Manager Mobile (EPMM), where a pre-auth remote code execution (CVE-2026-1281)—alongside a second critical path traversal flaw—is being exploited in the wild. Grant and Sloane outline why MDM platforms are Tier-Zero assets, capable of controlling entire mobile fleets, and walk through the post-patch actions required to detect chaining, persistence, and credential theft.
The episode also examines a ransomware incident impacting New Britain, Connecticut, highlighting the real-world consequences for local governments when core services go offline. The discussion emphasizes segmentation between public safety and business systems, offline operating procedures, and the importance of tested restores for directory services, VoIP, and line-of-business applications.
In the Vulnerability Spotlight, the hosts take a deeper look at how attackers abuse alternate authentication paths, particularly SSO flows and SAML integrations, to bypass perimeter defenses. This leads into the Trend to Watch: identity convenience is becoming the new perimeter, and SSO features increasingly represent cascading failure points across cloud and on-prem infrastructure.
The Policy & Regulation Watch covers new FCC guidance on ransomware preparedness, reinforcing the need for offline recovery validation and tabletop exercises focused on restoring critical services under active attack.
Tool of the Week highlights CISA’s alert feed and KEV updates, with practical advice on wiring alerts directly into vulnerability triage workflows and enforcing same-day response SLAs for confirmed exploitation.
The episode closes with a highly actionable Defense Move of the Week: implementing a repeatable validation loop for Tier-Zero systems—verify versions, confirm exposure removal, review logs, and rotate secrets—to ensure remediation actually worked.
Key themes this week:
- SSO as an alternate intrusion path
- MDM and firewalls as Tier-Zero assets
- Active exploitation requires validation, not trust
- Patch fast—but always hunt and verify
For the full weekly brief and ongoing coverage, subscribe at infosec.watch and follow InfoSec.Watch on X, Facebook, and LinkedIn.
Support the show
Thanks for listening to InfoSec.Watch! Subscribe to our newsletter for in-depth analysis: https://infosec.watch Follow us for daily updates: - X (Twitter) - LinkedIn - Facebook - Stay secure out there!