
Blumira Briefings
Staying on top of security news shouldn't be another full-time job.
Enter Blumira Briefings, our weekly panel series where security experts break down the headlines you might have missed, and explain what they actually mean for your security practice! ๐
Each week, join a lineup of different Blumira experts (and sometimes special guests!) who will:
- Share the top threats, suspects, and risks we're seeing across our detection and response platform
- Discuss significant security stories and what they mean for YOU
- Provide practical advice you can actually implement right away
โขโขKeep it conversational, informative, and under 30 minutes
Blumira Briefings
๐ฆ Blumira Briefings Ep. 13: Critical Veeam RCE, NetScaler Vulns, & Zero-Click Copilot Data Theft
๐ Welcome back for this weekโs episode and your weekly security download! We're joined by Jake Ouellette, Taylor Jacobson, and Amanda Berlin to break down the week's most important security headlines with context you can actually use. ๐
What We Cover This Week:
๐ Most changed weekly trends, including recurring process dumps for credential theft and suspicious IAM behavior
๐ง Critical Veeam RCE vulnerability (CVE-2025-23121) with a 9.9 CVSS score - make sure to patch this one immediately!
๐ NetScaler ADC and Gateway vulnerabilities allowing token theft from internet-facing devices
๐ฒ Cisco Meraki MX and Z device vulnerability can DoS VPN connections
๐ผ Identity theft report showing 148% surge in impersonation scams, with businesses as primary targets
๐ค First-ever zero-click AI data leak vulnerability in Microsoft 365 Copilot dubbed "EchoLeak"
Document your recovery processes so anyone can perform them if the primary person is unavailable - don't create single points of failure in your incident response team
Plus, Expert Insights On:
- How to handle emergency patches outside normal change control cycles
- Why testing backup restoration is more critical than just having backups
- Practical ways to run tabletop exercises even with limited resources
- Strategies for businesses to prevent impersonation attacks
- How organizations can manage AI access to reduce risks
NOTE: We'll be on hiatus next week due to the July 4th holiday -- we'll be back on July 11th with more security insights!
๐ฐ SOURCES:
Veeam RCE Vulnerability: https://thehackernews.com/2025/06/veeam-patches-cve-2025-23121-critical.html
Citrix NetScaler Vulnerabilities: https://www.darkreading.com/vulnerabilities-threats/citrix-patches-vulns-netscaler-adc-gateway
Cisco & Atlassian Patches: https://www.securityweek.com/high-severity-vulnerabilities-patched-by-cisco-atlassian/
Identity Impersonation Scams: https://www.infosecurity-magazine.com/news/reported-impersonation-scams-surge/
Zero-Click AI Data Leak: https://www.bleepingcomputer.com/news/security/zero-click-ai-data-leak-flaw-uncovered-in-microsoft-365-copilot/
๐ LINKS:
Veeam Advisory: https://www.veeam.com/kb4743
Rapid7 Emergent Threat Response: https://www.rapid7.com/blog/post/etr-critical-veeam-backup-replication-cve-2025-23121/
Citrix Security Bulletin CTX693420: https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420
OWASP Top 10 for LLM Applications 2025: https://genai.owasp.org/resource/owasp-top-10-for-llm-applications-2025/
Defensive Security Handbook: https://www.oreilly.com/library/view/defensive-security-handbook/9781098127237/