Critical Path Security Announces ScubaGoggles Testing for MSOC and XDR Customers

Critical Path Security is expanding its managed security capabilities to include ScubaGoggles configuration testing for our MSOC and XDR customers. As organizations continue to rely heavily on cloud collaboration platforms, configuration risk has become one of the most common and most exploitable security gaps. Misconfigurations in SaaS environments routinely undermine otherwise strong endpoint, network, and identity controls. Addressing this risk requires structured, repeatable assessment aligned to authoritative baselines. ScubaGoggles provides that framework. What Is ScubaGoggles Cybersecurity and Infrastructure Security Agency (CISA) developed ScubaGoggles as part of its Secure Cloud Business Applications initiative. The tool is designed to assess Google Workspace tenant configurations against CISA-published secure configuration baselines. ScubaGoggles evaluates tenant settings, applies policy validation through Open Policy Agent rules, and generates structured reports identifying deviations from recommended security controls. The result is a repeatable and defensible configuration review aligned to federal guidance and industry best practices. Why Configuration Assessment Matters…

0 Comments

Geopolitical Volatility and the Iranian Cyber Threat: What Defenders Need to Know Now

The intersection of kinetic warfare and keyboard-driven operations has never been more visible. Following the joint U.S. and Israeli military strikes against Iranian nuclear and military assets on February 28, 2026, the Canadian Centre for Cyber Security (CCCS) has issued a critical threat bulletin. At Critical Path Security, we've always maintained that layered defence isn't a buzzword-it's a survival requirement. As geopolitical tensions boil over into the digital domain, Iranian state-sponsored actors are pivoting from standard espionage to disruptive and destructive operations. Here is what the current threat landscape looks like and, more importantly, what your team should be doing about it. The Threat Profile: Beyond Simple Phishing The CCCS identifies four primary ways Iran is likely to respond. While information operations and harassment are common, the real risk to our clients lies in the targeting of critical infrastructure and poorly secured IoT/ICS devices. Iranian actors (including IRGC-affiliated groups) typically…

0 Comments

UNC6201 Exploits Dell RecoverPoint Zero-Day: What Security Teams Need to Know

What Security Teams Need to Know In a significant and ongoing cyber-espionage campaign, a sophisticated threat actor has been exploiting a critical zero-day vulnerability in Dell RecoverPoint for Virtual Machines since at least mid-2024. The vulnerability - tracked as CVE-2026-22769 and carrying a CVSSv3.1 score of 10.0 (Critical) - has enabled remote unauthenticated access, root-level persistence, lateral movement, and deployment of custom malware across compromised enterprise environments. This post breaks down the technical details, adversary activity, enterprise impact, and immediate defensive actions organizations should take. What Is CVE-2026-22769? CVE-2026-22769 is a critical vulnerability in Dell RecoverPoint for Virtual Machines (RP4VM) versions prior to 6.0.3.1 HF1. The root cause is the presence of hard-coded credentials within the appliance's Apache Tomcat Manager configuration. An attacker with knowledge of these credentials can authenticate remotely without valid user input, effectively bypassing standard authentication controls. Successful exploitation enables: Unauthenticated remote access Root-level command execution Installation…

0 Comments

When Security Incidents Become Customer Incidents

Lessons from the BridgePay Payment Infrastructure Disruption Cybersecurity incidents rarely remain confined to technical environments. What begins as an infrastructure issue quickly surfaces in daily operations - transactions failing, services becoming unavailable, workflows interrupted, and customers seeking answers. In those moments, the event is no longer viewed through a security lens. It's experienced as disruption. Availability, reliability, and responsiveness are tested in real time, and the impact becomes visible well beyond the systems where it originated. A recent ransomware attack affecting U.S. payment gateway provider BridgePay illustrates how quickly this transition occurs, and why organizations should view cybersecurity through both technical and business lenses. What Happened In early February 2026, BridgePay confirmed a ransomware incident that caused a system-wide outage across core payment-processing infrastructure. The disruption escalated rapidly after degraded performance was detected in virtual terminal and API systems early in the morning, eventually resulting in full service interruption. The…

0 Comments