Wayne Lloyd, Federal CTO, RedSeal, Author at RedSeal

Entries by Wayne Lloyd, Federal CTO, RedSeal

The Auto Industry’s Invisible Crisis: Why Exposure Management Can’t Wait

The scene has played out across the automotive industry with disturbing regularity. A major dealer network suddenly goes dark. Service bays fall silent. Parts departments revert to handwritten orders. Customers wait for days while technicians work without access to repair histories or diagnostic systems. The culprit? Ransomware that shouldn’t have been able to spread so […]

Zero-Day in the Wild: Major Risk to Network Infrastructure

Cisco recently disclosed a serious zero-day vulnerability (CVE-2025-20352) in IOS / IOS XE, actively exploited in attacks. The flaw resides in the SNMP subsystem, and it’s a stack-based buffer overflow. With low privileges, attackers can trigger Denial-of-Service (DoS) on affected devices. Worse: if higher privileges are compromised (e.g. local admin credentials), this can lead to […]

When “Everything is Connected,” Nothing is Isolated: Lessons from the JLR Hack and How RedSeal Helps

BLUF: Reports on Jaguar Land Rover’s cyber incident describe “smart factories where everything is connected,” which meant the company couldn’t isolate affected functions and had to shut down most systems across multiple plants rippling into suppliers and production worldwide. Centralized interconnection amplified business impact. What happened (and why it mattered) JLR reportedly shut down systems across […]

Supply Chain Blind Spots: Lessons from the Salesforce/Salesloft/Drift Breach

The recent Salesforce/Salesloft/Drift supply-chain breach underscores just how fragile trust can be in today’s SaaS-driven environments. What happened: Attackers gained access to Salesloft’s GitHub account between March and June 2025. Using this foothold, they stole OAuth tokens and leveraged them in early August to siphon data from Salesforce environments. Over 700 companies were impacted, including […]

OT Asset Inventory Made Practical: What the New NSA/CISA Guidance Means — and How to Get There

Bottom line: NSA, CISA, EPA, FBI, and allied cyber agencies just published prescriptive guidance for building and maintaining an OT asset inventory and taxonomy—the foundation for a modern, defensible OT architecture. If you already run RedSeal, you can fulfill most of the guidance quickly by modeling your hybrid networks, auto-grouping assets into OT zones, validating segmentation, […]

From ChatGPT Jailbreaks to CitrixBleed: Why CTEM and Proactive Security Must Be Your 2025 Security Strategy

The past week in cybersecurity felt like reading the script of a cyber-thriller. We saw headlines about researchers tricking ChatGPT into revealing Windows product keys, new proof-of-concept exploits for CitrixBleed2, ransomware gangs striking major corporations, malicious browser extensions silently infecting millions of users, and nation-state actors pivoting to novel attack vectors.

On the […]

Cyber News Roundup for July 3, 2025

Cisco Unified CM Vulnerability Lets Remote Attacker Gain Root Access

Cisco has warned of a critical vulnerability in its Unified Communications Manager (Unified CM) and Unified CM Session Management Edition, posing serious risks to enterprise voice and video networks. Tracked as CVE-2024-20399 and carrying a CVSS score of 9.9, the flaw stems from improper input […]

Cyber News Roundup for June 20, 2025

: Cybersecurity Roundup: Fragile Fixes, Massive Breaches, and Smarter Threats
This week’s headlines spotlight the complexity of staying secure—from Microsoft’s flawed patch to a record-breaking data leak. Nation-state threats, deepfake deception, and zero-days across Linux, routers, and firmware remind defenders that resilience now depends on faster detection, smarter controls, and patching without breaking production.

Cyber News Roundup for June 13, 2025

From hackers exposing themselves to smartwatch-enabled data leaks, this week’s headlines reveal both attacker missteps and emerging risks. Our roundup covers critical patches, covert espionage campaigns, zero-day exploits, and policy updates—highlighting how defenders can stay ahead by turning threat actor errors into intelligence-driven advantages.

Cyber News Roundup for June 6, 2025

This Week in Cybersecurity: Major Threats, Data Leaks & Rising AI Risks
From Google’s warning on a Salesforce-targeted vishing campaign to what may be China’s largest-ever data leak—and new revelations about long-dwelling threat groups—this week’s headlines highlight how fast and far cyber risks are spreading.