Ryan Vargas and Critical Path Security Head to Canadian Tire Motorsport Park for 2025 Season Debut

As the 2025 NASCAR Canada Series kicks off in full force, Critical Path Security is proud to support driver Ryan Vargas in his return to the track at the iconic Canadian Tire Motorsport Park in Bowmanville, Ontario. The race will take place on Sunday, May 18 at 1 PM ET, marking the second stop of the season and the first road course challenge for drivers this year. This track, known for its high-speed corners and challenging elevation changes, will be a true test of driver skill and car performance. The #28 Critical Path Security Dodge, driven by Vargas, is prepped and ready to make a strong statement on the international stage. A Cross-Border Mission Our involvement in both U.S. and Canadian cybersecurity has never been more visible. Supporting Ryan Vargas on Canadian soil isn't just a race-day partnership-it's a symbol of Critical Path Security's expanding presence across North America. With…

0 Comments

Léargas and Critical Path Security to Participate in Consensus 2025

This week, Patrick Kelley, CEO of both Léargas Security and Critical Path Security, will be attending Consensus 2025 in Toronto, Ontario. While the companies are not formal sponsors of the event, Mr. Kelley's presence reflects the growing commitment by both organizations to remain at the forefront of global cybersecurity trends-particularly where blockchain, digital identity, and threat intelligence converge. Consensus 2025, hosted by CoinDesk, is one of the premier gatherings for leaders across the blockchain, digital asset, Web3, and cybersecurity ecosystems. With the rapid expansion of decentralized technologies into critical infrastructure, finance, and identity frameworks, the implications for national and global security are profound. Operating across both Canada and the United States, Léargas and Critical Path Security continue to provide advanced security services, including XDR, incident response, and cyber risk leadership, to clients on both sides of the border. Participation in events like Consensus enables the teams to assess not only…

0 Comments

LockBit3 Chat Log Leak: A Deep Dive into Ransomware Negotiation Tactics

Critical Path Security - Threat Intelligence Report Date: May 2025Prepared by: Critical Path Security Research Team Executive Summary In a rare and highly consequential breach of operational secrecy, internal chat logs from the LockBit3 ransomware group have been leaked to the public. This unique intelligence provides cybersecurity professionals and defenders with an unparalleled opportunity to examine the internal communications of one of the most prolific ransomware syndicates in recent history. The Critical Path Security research team analysed more than 4,400 messages exchanged between LockBit affiliates and their victims. This report outlines significant trends in threat actor behaviour, negotiation tactics, and operational cadence, based on detailed analysis of the chat data. Key Findings Volume of Communications A total of 4,423 messages were reviewed, capturing the full breadth of negotiation stages-from initial victim outreach to ransom payment instructions. Average Ransom Demand Across the dataset, ransom demands averaged approximately $32,223 CAD, with most…

0 Comments

Critical SonicWall VPN Vulnerabilities Actively Exploited: Immediate Patch Required

SonicWall has issued an urgent security advisory addressing multiple critical vulnerabilities in its Secure Mobile Access (SMA) series. These flaws-now confirmed to be actively exploited-pose a serious risk to organizations relying on SonicWall's SSL VPN appliances to secure remote access. What's at Stake? Three vulnerabilities (CVE-2025-32819, CVE-2025-32820, and CVE-2025-32821) have been disclosed affecting the following SMA appliances: SMA 200 SMA 210 SMA 400 SMA 410 SMA 500v When chained together, these vulnerabilities can allow an attacker with valid SSL VPN user credentials to execute arbitrary code with root privileges. This grants full system control and could be used to pivot into internal networks, exfiltrate data, or deploy ransomware. Breakdown of the Exploits: CVE-2025-32819: Enables attackers to delete the primary SQLite database and reset the admin password, giving them admin access to the web interface. CVE-2025-32820: A path traversal vulnerability that makes the /bin directory writable. CVE-2025-32821: Allows an attacker to…

0 Comments