From access to impact: why 2025 was the year OT threats grew teeth
OT cybersecurity took a hit in 2025 as threat groups mapped control loops and targeted distributed energy – shrinking the gap between access and physical impact.
Read More
Apple, Microsoft and Google: three of the biggest names in tech. And in October 2023 they appeared together in this Wired article – because they’ve all been busy patching some serious vulnerabilities.
So what did they fix? And how can organisations of all sizes improve their patch management systems?
At the end of October, Apple issued 12 new security fixes for its iOS 17.1. They included:
With more than 100 issues patched, Microsoft’s efforts have included zero-day vulnerabilities, among others:
The Chrome browser had 20 vulnerabilities patched, including one (the first on our list) that was rated as critical:
Some of the vulnerabilities here have already been exploited by attackers, while some haven’t yet been used in real-life attacks. They have varying degrees of severity, but all of them could be exploited – so users should update their devices and software as soon as possible to benefit from the security patching.
As well as Chrome, Google has patched a further 53 vulnerabilities on Android, some of them rated as critical – including a heap buffer overflow issue (CVE-2023-4863) that Malwarebytes noted could be used to install spyware.
Big tech companies are patching all the time – as highlighted by Microsoft’s well known monthly Patch Tuesday updates.
It’s the art of maintaining security. And there are some best practices for patch management that companies of all sizes can follow:
And come to Black Hat MEA to gain access to the latest insights and research in patch management, and connect with vendors and partners who can help you secure your organisation. We can’t wait to see you there
Join the newsletter to receive the latest updates in your inbox.
OT cybersecurity took a hit in 2025 as threat groups mapped control loops and targeted distributed energy – shrinking the gap between access and physical impact.
Read More
Ransomware now reaches full encryption in just three hours. Analysis of Barracuda and Securin data reveals how Akira and others are accelerating attacks.
Read More
The average time to exploit has fallen from 745 days in 2020 to just 44 days in 2025, according to Flashpoint. Here’s why N-day vulnerabilities are driving faster attacks.
Read More