Shielding Your Systems from Software Security Vulnerabilities
March 4, 2025
4 min read
March 4, 2025
4 min read
Welcome to the March Origina Software Security Update.
This month, learn how we addressed over 140 software security vulnerabilities for a single customer. Plus, review the latest list of common vulnerabilities and exposures (CVEs) and read how cyberattacks are impacting the telecommunications industry.
A biotech company reached out to Origina after a security scan uncovered multiple vulnerabilities in their IBM© Cognos Analytics application. With no entitlements available and 144 CVEs to address, the scope of work was vast and required careful prioritization.
Over four months, our team identified, mitigated, and resolved numerous security issues, ensuring the customer’s confidence in their application’s resilience.
By November 2024, Origina had proposed solutions for nearly all of the vulnerabilities, and in February, we completed final stages of briefing stakeholders, validating Java-specific vulnerabilities, and ensuring all mitigations were viable. The customer’s security team conducted a final review, and Origina offered ongoing support.
Results and Impact
Through a detailed analysis and clear communication, Origina:
This incident exemplifies the power of collaboration and expertise. By working closely with the customer and utilizing advanced tools like our Vulnerability Advisory Portal, we ensured their Cognos Analytics application achieved optimal security.
Here are links to the latest and updated software security vulnerabilities available through the Origina Vulnerability Advisory Portal.
Our service delivers up-to-date threat intelligence and mitigation strategies for vulnerabilities, regardless of the product version or third-party components involved.
Key benefits include:
The Vulnerability Advisory Portal is a vital resource, offering unlimited access to proactive mitigation advisories, even when OEM patches or fixes are unavailable. You’ll also find hardening guides and publications with regularly updated information on secure configurations and regulations.
Ask Origina how we can assist with new functionalities, policy compliance, or regulatory needs — from MFA integration to advanced cryptographic implementation.
Telecommunications providers are vital to our everyday lives. From digital infrastructure to business operations to emergency response, their organizations move a tremendous amount of information through their networks.
And that is precisely why they are being targeted.
Numerous technologies can be components of telecommunications backbone core systems. A compromise or failure of this technology could result in the inability for telecommunication provider’s customers to make and receive calls and/or use data services. This can not only impact civilians but also the effectiveness of emergency service operations. It can also result in the loss of a user’s personal data, which can then be used in subsequent attacks.
Targeting Increases
Critical telecommunications providers are being attacked by foreign nations for disruption and data extraction to be used in influence operations, such as disrupting governmental elections, and by organized crime groups who typically engage in ransomware operations for monetary gains.
The number of physical strikes on telecommunications infrastructure is also increasing. Sub-sea cables have been dragged and cut by nefarious unregistered vessels known as shadow fleets. Surveying this infrastructure by foreign nations for future attacks has also increased over the past few years.
Here’s an example:
Chinese-Linked APT Group Salt Typhoon Targets Global Telecom Networks -The PRC Government Denied Involvement
A recent report by Recorded Future’s Insikt Group highlighted that the Chinese-linked APT group Salt Typhoon (aka FamousSparrow/GhostEmperor) continues targeting telecommunications providers worldwide. The group has exploited unpatched Cisco IOS XE devices, compromising additional U.S. telecom firms.
Source and for further reading: https://go.recordedfuture.com/hubfs/reports/cta-cn-2025-0213.pdf .
Security is at the heart of everything we do. Our focus goes beyond addressing individual risks and vulnerabilities. If you’re facing a security, risk, or regulatory challenge and need expert guidance, we’re here to help. Reach out to your Customer Success Manager or submit a request through the Origina Self-Service Portal.
Gain insight into industry-only news, access to webinars, tips and tricks, blog posts, podcasts, and guides, surrounding topics like cybersecurity, reducing software support and maintenance costs and much more, all delivered to your inbox each month.
LEARN MORE