Vicarius (@vicariusltd) 's Twitter Profile
Vicarius

@vicariusltd

Leading the pack in vulnerability remediation, one meme at a time 😜

ID: 745198592462364672

linkhttps://vicarius.io calendar_today21-06-2016 10:16:04

1,1K Tweet

2,2K Followers

117 Following

Vicarius (@vicariusltd) 's Twitter Profile Photo

It's never been easier to remediate. In fact, it's just a few clicks 😎 Pleased to announce our new partnership with Atera! Read more about the integration here: finance.yahoo.com/news/vicarius-…

It's never been easier to remediate. In fact, it's just a few clicks 😎

Pleased to announce our new partnership with <a href="/AteraCloud/">Atera</a>! Read more about the integration here: finance.yahoo.com/news/vicarius-…
Vicarius (@vicariusltd) 's Twitter Profile Photo

🦹🏻‍♀️🏴‍☠️ Villain of the Week 🏴‍☠️🦹🏻‍♀️ A critical vulnerability, CVE-2025-32706, has been discovered in the Windows Common Log File System (CLFS) driver. With a CVSS score of 7.8, this flaw allows an authenticated local attacker to exploit improper input validation and gain SYSTEM-level

🦹🏻‍♀️🏴‍☠️ Villain of the Week 🏴‍☠️🦹🏻‍♀️

A critical vulnerability, CVE-2025-32706, has been discovered in the Windows Common Log File System (CLFS) driver. With a CVSS score of 7.8, this flaw allows an authenticated local attacker to exploit improper input validation and gain SYSTEM-level
Vicarius (@vicariusltd) 's Twitter Profile Photo

It's rock 'em sock 'em databases! Learn the different approaches to vulnerability disclosure. 🇪🇺🇺🇸 vicarius.io/articles/vdb-v…

Vicarius (@vicariusltd) 's Twitter Profile Photo

MSPs have to juggle more tools than professional circus performers (which is insane and exhausting). I think we ought to help them out. So let's integrate, shall we? Learn how on July 9th! linkedin.com/events/remedia…

MSPs have to juggle more tools than professional circus performers (which is insane and exhausting). I think we ought to help them out. So let's integrate, shall we?

Learn how on July 9th!

linkedin.com/events/remedia…
Vicarius (@vicariusltd) 's Twitter Profile Photo

Everyone on three—1, 2...5! Now that I got your attention, I have some news to share. Gartner just gave us the ol' stamp of approval in their latest report on the future of Exposure Management! We were highlighted specifically for our innovation in driving more automation

Vicarius (@vicariusltd) 's Twitter Profile Photo

😈🗡️ Villain of the Week 🗡️😈 A high-severity vulnerability, CVE-2025-49144, has been identified in Notepad++, a widely-used open-source text editor. This flaw allows attackers to achieve privilege escalation by abusing the installer's insecure search path behavior—potentially

😈🗡️ Villain of the Week 🗡️😈

A high-severity vulnerability, CVE-2025-49144, has been identified in Notepad++, a widely-used open-source text editor. This flaw allows attackers to achieve privilege escalation by abusing the installer's insecure search path behavior—potentially
Vicarius (@vicariusltd) 's Twitter Profile Photo

Is there anything more American than hot dogs and Top Gun? No, but this webinar is next week 🤷‍♀️ Register here: atera.com/webinars/remed…

Is there anything more American than hot dogs and Top Gun? No, but this webinar is next week 🤷‍♀️

Register here: atera.com/webinars/remed…
Vicarius (@vicariusltd) 's Twitter Profile Photo

Will Patch Tuesday ever end? Unlikely. But it's very likely I will be singing this at karaoke (and in the shower) 👨‍🎤🚿

Vicarius (@vicariusltd) 's Twitter Profile Photo

Let's see what we have in the file cabinet this week 🗃️ --- CVE‑2025‑6218: Directory Traversal RCE 📍Location: WinRAR (versions 7.11 and earlier). The vulnerability allows attackers to exploit directory traversal flaws in archive processing to execute arbitrary code on affected

Let's see what we have in the file cabinet this week 🗃️

---
CVE‑2025‑6218: Directory Traversal RCE
📍Location: WinRAR (versions 7.11 and earlier).

The vulnerability allows attackers to exploit directory traversal flaws in archive processing to execute arbitrary code on affected
Vicarius (@vicariusltd) 's Twitter Profile Photo

It's kinda awkward to admit this, but sometimes even I need to refresh my vRx memory 🫣 My takeaway? These folks (our wolfpack product and R&D) have their act together. Three native options to remediate? And automated?! I gotta see this. Anyone else?

Vicarius (@vicariusltd) 's Twitter Profile Photo

Is picking all of them allowed? No? Ok 🫤 In our first webinar with Atera we presented this poll to the audience—and the results (partially) speak for themselves. Because we'll finish the sentence, asterisk, and more tomorrow! (Weren't expecting that turn, did ya 😉) Join the

Is picking all of them allowed? No? Ok 🫤

In our first webinar with Atera we presented this poll to the audience—and the results (partially) speak for themselves.

Because we'll finish the sentence, asterisk, and more tomorrow! (Weren't expecting that turn, did ya 😉)

Join the
Vicarius (@vicariusltd) 's Twitter Profile Photo

New case is up and ready 🗃️ 🫆CVE-2025-47981: Security Mechanism RCE, considered wormable 📍Location: Windows SPNEGO Extended Negotiation (NEGOEX) The vulnerability allows attackers to gain full system control by sending malicious packets to services using SPNEGO

New case is up and ready 🗃️

🫆CVE-2025-47981: Security Mechanism RCE, considered wormable
📍Location: Windows SPNEGO Extended Negotiation (NEGOEX)

The vulnerability allows attackers to gain full system control by sending malicious packets to services using SPNEGO
Vicarius (@vicariusltd) 's Twitter Profile Photo

Case of the Week: CVE-2025-53770 🗃️ 📍 Location: Microsoft SharePoint Server, on-prem only 🤖 Actively exploited in the wild The vulnerability involves deserialization of untrusted data and enables unauthenticated attackers to execute arbitrary code remotely, providing full

Case of the Week: CVE-2025-53770 🗃️

📍 Location: Microsoft SharePoint Server, on-prem only
🤖 Actively exploited in the wild

The vulnerability involves deserialization of untrusted data and enables unauthenticated attackers to execute arbitrary code remotely, providing full