Arctic Wolf (@awnetworks) 's Twitter Profile
Arctic Wolf

@awnetworks

At Arctic Wolf, our mission is to End Cyber Risk through effective security operations.

ID: 1544629472

linkhttps://arcticwolf.com/ calendar_today25-06-2013 02:44:39

6,6K Tweet

4,4K Followers

522 Following

Arctic Wolf (@awnetworks) 's Twitter Profile Photo

On June 4, 2025, Cisco released fixes for multiple vulnerabilities, several of which were noted to have publicly available proof-of-concept (PoC) exploit code: ow.ly/WyyX50W6kaC #EndCyberRisk #WeMakeSecurityWork

Arctic Wolf (@awnetworks) 's Twitter Profile Photo

šŸ† šŸ† šŸ† We #MakeSecurityWork around the globe, and we're proud to share that Arctic Wolf has been named 'Best Customer Service' team by SC Media UK's 2025 #SCEurope Awards. šŸ” Learn more: arcticwolf.com/resources/pres…

šŸ† šŸ† šŸ† 

We #MakeSecurityWork around the globe, and we're proud to share that Arctic Wolf has been named 'Best Customer Service' team by SC Media UK's 2025 #SCEurope Awards.

šŸ” Learn more: arcticwolf.com/resources/pres…
Arctic Wolf (@awnetworks) 's Twitter Profile Photo

On June 2, 2025, Hewlett Packard Enterprise (HPE) released fixes for multiple vulnerabilities affecting HPE StoreOnce VSA. The most severe of these was CVE-2025-37093. Learn more in our latest security bulletin: ow.ly/zUff50W6wjK #EndCyberRisk #

Arctic Wolf (@awnetworks) 's Twitter Profile Photo

PAM is critical to access security from a tactical standpoint and can be part of the strategy for an organization looking to better secure privileged access against threat actors and identity-based attacks. ow.ly/jAuU50W5bjs

Arctic Wolf (@awnetworks) 's Twitter Profile Photo

For the first time in four years, Arctic Wolf found that security leaders have a concern larger than ransomware – artificial intelligence. ow.ly/8PrK50VXiki

For the first time in four years, Arctic Wolf found that security leaders have a concern larger than ransomware – artificial intelligence.

ow.ly/8PrK50VXiki
Arctic Wolf (@awnetworks) 's Twitter Profile Photo

Big news out of Partner Jam: Arctic Wolf unveiled a new MSP Partner Program and Aurora Endpoint Security for MSPs. Learn more: arcticwolf.com/resources/pres…

Big news out of Partner Jam: Arctic Wolf unveiled a new MSP Partner Program and Aurora Endpoint Security for MSPs.

Learn more: arcticwolf.com/resources/pres…
Arctic Wolf (@awnetworks) 's Twitter Profile Photo

We’ve expanded the Aurora Platform with major updates to Data Explorer—giving security teams faster and easier access to the insights that matter most. Learn more: arcticwolf.com/resources/pres…

We’ve expanded the Aurora Platform with major updates to Data Explorer—giving security teams faster and easier access to the insights that matter most.

Learn more: arcticwolf.com/resources/pres…
Arctic Wolf (@awnetworks) 's Twitter Profile Photo

Arctic Wolf has recently observed customers receiving unsolicited Microsoft multi-factor authentication (MFA) text messages. Learn more in our latest security bulletin: ow.ly/H6hI50Wa6V0

Arctic Wolf (@awnetworks) 's Twitter Profile Photo

On June 10, Microsoft released its June 2025 security update, addressing 66 newly disclosed vulnerabilities. Arctic Wolf has highlighted five of them due to their potential impact. Learn more in our latest security bulletin: ow.ly/t5wa50W9zx9

Arctic Wolf (@awnetworks) 's Twitter Profile Photo

Learn how organizations are transferring risk by investing more in incident response (IR) retainers in Arctic Wolf’s latest survey, The State of Cybersecurity: 2025 Trends Report. ow.ly/pOKU50VXiqr

Learn how organizations are transferring risk by investing more in incident response (IR) retainers in Arctic Wolf’s latest survey, The State of Cybersecurity: 2025 Trends Report. 

ow.ly/pOKU50VXiqr
Arctic Wolf (@awnetworks) 's Twitter Profile Photo

Join Arctic Wolf experts as they breakdown the breaches that’ve made headlines so far this year, analyze threat actor tactics and trends, and offer insights to help you harden your organisation’s attack surface against future threats. ow.ly/ELLA50W1TJx

Join Arctic Wolf experts as they breakdown the breaches that’ve made headlines so far this year, analyze threat actor tactics and trends, and offer insights to help you harden your organisation’s attack surface against future threats. 

ow.ly/ELLA50W1TJx
Arctic Wolf (@awnetworks) 's Twitter Profile Photo

On June 17, 2025, watchTowr disclosed technical details for a pre-authenticated remote code execution (RCE) exploit chain in Sitecore Experience Platform (XP), an enterprise content management system. Learn more in our latest security bulletin: ow.ly/tf6O50WeQY2

Arctic Wolf (@awnetworks) 's Twitter Profile Photo

Throughout multiple incidents, hospital help desks have received suspicious phone calls from unidentified individuals claiming to be doctors who had forgotten their password. Learn more in our latest security bulletin: ow.ly/WJGQ50WeRbJ

Arctic Wolf (@awnetworks) 's Twitter Profile Photo

Arctic Wolf has identified the top three main attack vectors currently in use by threat actors: External remote access, external exploit, and human risk arcticwolf.com/resources/blog…

Arctic Wolf (@awnetworks) 's Twitter Profile Photo

Increasingly, attackers are letting themselves into enterprise environments through the use of compromised credentials. Learn more about how you can prevent credential theft. arcticwolf.com/resources/blog…

Arctic Wolf (@awnetworks) 's Twitter Profile Photo

GIFTEDCROOK has evolved—from simple browser stealer to advanced data exfiltration tool used in cyber-espionage campaigns tied to Ukraine peace talks. Arctic Wolf Labs breaks down the malware’s strategic pivot and capabilities: šŸ”— arcticwolf.com/resources/blog…

Arctic Wolf (@awnetworks) 's Twitter Profile Photo

BEC attacks are one of the most financially damaging cyber threats facing organizations today. Watch our security awareness training video breaking down Business Email Compromise (BEC) attacks. youtube.com/watch?v=hITp_5…

Arctic Wolf (@awnetworks) 's Twitter Profile Photo

The six core functions of the NIST CSF 2.0 — Identify, Protect, Detect, Respond, Recover, and now, Govern — provide a high-level organizational structure to enable positive, proactive cybersecurity outcomes. ow.ly/Fn6T50WhaBR

Arctic Wolf (@awnetworks) 's Twitter Profile Photo

On June 23, 2025, Citrix updated the scope of a previously disclosed vulnerability—CVE-2025-5777—to clarify that it affects NetScaler devices configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. ow.ly/f0uV50WiCwk

Arctic Wolf (@awnetworks) 's Twitter Profile Photo

On June 25, 2025, Cisco released patches for two maximum-severity vulnerabilities in Cisco Identity Services Engine (ISE) and ISE-Passive Identity Connector (ISE-PIC). Learn more in our latest security bulletin: ow.ly/bg1z50WiEkc