Patrick Kelley’s RSAC™ 2025 Session Named a Top-Rated Talk

We're proud to announce that Patrick Kelley's session at RSAC™ 2025, titled "Mental Health In Cybersecurity: ​Balancing the Scales ", has officially been recognized as a Top-Rated Session of the conference. Mental health remains one of the most underdiscussed but deeply felt issues in our industry. Patrick's session cut through the noise, bringing raw vulnerability and lived experience to the stage-and it resonated. Here's what attendees had to say: "One of the best talks on burnout in the cybersecurity sector I have ever attended." "Absolutely best session of the conference so far!" The session emphasized the importance of boundaries, balance, and breaking the silence: "This presentation caused me to take a hard look at how I interact with my team and reflect on past missteps and how I could better approach those in the future." This wasn't just another conference talk. It was a shared moment of reflection and connection-a reminder…

0 Comments

Patrick Kelley of Critical Path Security to Provide Expert Training on Zeek at Co-op Cyber Tech 2025

Critical Path Security is excited to announce that Patrick Kelley, our CEO and seasoned cybersecurity expert, will deliver specialized training on leveraging Zeek for advanced cybersecurity monitoring at the upcoming Co-op Cyber Tech conference. The event, a leading technical conference addressing cybersecurity in the cooperative space, is scheduled for June 24 - 26, 2025, in Denver, Colorado. In this highly anticipated session, titled "Zeek: Leveraging ACID and OT Protocols," Patrick will offer practical, hands-on training tailored for critical infrastructure and operational technology (OT) professionals. Participants will gain invaluable insights into effective deployment and use of Zeek for comprehensive network visibility and threat detection across IT and OT environments. Training Highlights Include: Zeek Deployment Best Practices: Optimal sensor placement strategies (external, internal, between network segments). Comprehensive Zeek Management: Mastering Zeek command-line tools and service control (zeekctl). Advanced Scaling Techniques: Distributed Zeek deployment using Docker and Ansible for enhanced performance. OT-Specific Protocol…

0 Comments

Don’t Get Hooked by a SharePoint Phish: You’re Already Logged In

SharePoint phishing has become one of the most effective tactics used by attackers to compromise user credentials-and it's working because it looks familiar. If your team uses Microsoft 365, you're likely sharing and receiving SharePoint links regularly. That convenience is exactly what attackers are counting on. Here's the Red Flag: If someone shares a SharePoint document with you, you should not be prompted to log in again-especially if you're already signed in to Office 365 in your browser or desktop apps. If you're already authenticated, you shouldn't have to authenticate again. Phishing campaigns often mimic the Microsoft SharePoint sharing experience. They send a link that looks like a legitimate SharePoint document. But when you click the link, instead of seeing the document, you're redirected to a fake Microsoft login page. It looks real. It uses a Microsoft logo. It even may copy the same fonts and layout. But when you…

0 Comments

Palo Alto Networks Issues Multiple Security Updates Across Product Line

June 12, 2025 - Palo Alto Networks has released seven new security advisories detailing critical and medium-severity vulnerabilities affecting several of its core products, including GlobalProtect, PAN-OS, Prisma Access, and Cortex XDR. High-Severity: GlobalProtect for macOS - CVE-2025-4232 The most severe of the disclosed vulnerabilities is an improper wildcard neutralization flaw in GlobalProtect for macOS. Tracked as CVE-2025-4232, this vulnerability affects the application's log collection feature and could allow an authenticated attacker to escalate privileges to root via code injection. Chrome Fixes and Prisma Access Exposure In conjunction with internal updates, Palo Alto also implemented 11 recent Chrome-related security fixes, including a patch for CVE-2025-4233 - a cache vulnerability affecting the Prisma Access Browser. Command Injection Vulnerabilities in PAN-OS Two additional command injection flaws were identified in PAN-OS: CVE-2025-4231: Exploitable through the management web interface by an authenticated administrator with network access, allowing command execution as root. CVE-2025-4230: Exploitable via…

0 Comments