Blog https://fieldeffect.com/blog Looking for the latest info on cyber security? Keep up to date with industry research, news, and thought leadership on the Field Effect blog. en Thu, 12 Mar 2026 12:57:34 GMT 2026-03-12T12:57:34Z en Critical authentication bypass in Aruba AOS-CX impacts CX-series switches https://fieldeffect.com/blog/critical-authentication-bypass-in-aruba-aos-cx-impacts-cx-series-switches <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/critical-authentication-bypass-in-aruba-aos-cx-impacts-cx-series-switches" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Critical authentication bypass in Aruba AOS-CX impacts CX-series switches" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> Hewlett Packard Enterprise (HPE) released security updates addressing multiple vulnerabilities in Aruba Networking AOS-CX, including a critical authentication bypass flaw (CVE-2026-23813) affecting the web-based management interface of Aruba CX-series switches. The vulnerability carries a CVSS score of 9.8 and could allow an unauthenticated remote attacker to bypass authentication and potentially reset the administrator password, leading to full administrative control of the affected switch.</span></p> </div> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/critical-authentication-bypass-in-aruba-aos-cx-impacts-cx-series-switches" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Critical authentication bypass in Aruba AOS-CX impacts CX-series switches" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> Hewlett Packard Enterprise (HPE) released security updates addressing multiple vulnerabilities in Aruba Networking AOS-CX, including a critical authentication bypass flaw (CVE-2026-23813) affecting the web-based management interface of Aruba CX-series switches. The vulnerability carries a CVSS score of 9.8 and could allow an unauthenticated remote attacker to bypass authentication and potentially reset the administrator password, leading to full administrative control of the affected switch.</span></p> </div> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fcritical-authentication-bypass-in-aruba-aos-cx-impacts-cx-series-switches&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security intelligence Thu, 12 Mar 2026 12:57:34 GMT https://fieldeffect.com/blog/critical-authentication-bypass-in-aruba-aos-cx-impacts-cx-series-switches 2026-03-12T12:57:34Z Field Effect Security Intelligence Team Ivanti Endpoint Manager under active exploitation https://fieldeffect.com/blog/ivanti-endpoint-manager-active-exploitation <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/ivanti-endpoint-manager-active-exploitation" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_03.jpg" alt="Ivanti Endpoint Manager under active exploitation" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> CISA added an actively exploited <span>authentication bypass vulnerability </span><span>affecting Ivanti Endpoint Manager (EPM) to its KEV catalog</span>. The flaw is considered high-severity, and allows unauthenticated attackers with network access to the core server to retrieve sensitive credential material through an alternate authentication path. Organizations should update affected deployments to Endpoint Manager 2024 SU5, which resolves the vulnerability.</span></p> </div> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/ivanti-endpoint-manager-active-exploitation" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_03.jpg" alt="Ivanti Endpoint Manager under active exploitation" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> CISA added an actively exploited <span>authentication bypass vulnerability </span><span>affecting Ivanti Endpoint Manager (EPM) to its KEV catalog</span>. The flaw is considered high-severity, and allows unauthenticated attackers with network access to the core server to retrieve sensitive credential material through an alternate authentication path. Organizations should update affected deployments to Endpoint Manager 2024 SU5, which resolves the vulnerability.</span></p> </div> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fivanti-endpoint-manager-active-exploitation&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security intelligence Tue, 10 Mar 2026 21:10:42 GMT https://fieldeffect.com/blog/ivanti-endpoint-manager-active-exploitation 2026-03-10T21:10:42Z Field Effect Security Intelligence Team What is the future of cybersecurity? | Field Effect https://fieldeffect.com/blog/what-is-the-future-of-cyber-security <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/what-is-the-future-of-cyber-security" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-What-is-the-future-of-cyber-security.jpg" alt="What is the future of cybersecurity? | Field Effect" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>The future of cybersecurity is notoriously hard to predict. After all, every aspect of the industry changes continuously. Cyber threats evolve and the tools that defend against them mirror those changes, evolving in their own right to better defend increasingly complex networks.</p> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/what-is-the-future-of-cyber-security" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-What-is-the-future-of-cyber-security.jpg" alt="What is the future of cybersecurity? | Field Effect" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>The future of cybersecurity is notoriously hard to predict. After all, every aspect of the industry changes continuously. Cyber threats evolve and the tools that defend against them mirror those changes, evolving in their own right to better defend increasingly complex networks.</p> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fwhat-is-the-future-of-cyber-security&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Cybersecurity education Tue, 10 Mar 2026 14:30:00 GMT https://fieldeffect.com/blog/what-is-the-future-of-cyber-security 2026-03-10T14:30:00Z Field Effect Key insights from the Field Effect 2026 Cyber Threat Outlook Report https://fieldeffect.com/blog/key-insights-2026-cyber-threat-report <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/key-insights-2026-cyber-threat-report" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Blog-Thumb-Threat-Outlook.png" alt="Key insights from the Field Effect 2026 Cyber Threat Outlook Report" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Most organizations didn’t suffer breaches in 2025 because they lacked tools or effort. They struggled because defenses were optimized for assumptions that no longer hold.</p> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/key-insights-2026-cyber-threat-report" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Blog-Thumb-Threat-Outlook.png" alt="Key insights from the Field Effect 2026 Cyber Threat Outlook Report" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Most organizations didn’t suffer breaches in 2025 because they lacked tools or effort. They struggled because defenses were optimized for assumptions that no longer hold.</p> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fkey-insights-2026-cyber-threat-report&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Cybersecurity education From the experts Tue, 10 Mar 2026 11:46:00 GMT https://fieldeffect.com/blog/key-insights-2026-cyber-threat-report 2026-03-10T11:46:00Z Field Effect Field Effect report finds identity compromise driving majority of cyber incidents https://fieldeffect.com/blog/field-effect-threat-report <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/field-effect-threat-report" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20Generic%203.png" alt="Field Effect report finds identity compromise driving majority of cyber incidents" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <h4>More than 80% of incident-related alerts tied to cloud identity abuse, new threat outlook shows</h4> <p>Field Effect has released its <a href="proxy.php?url=https://get.fieldeffect.com/2026-cyber-threat-report">2026 Cyber Threat Outlook</a>, revealing that more than 80% of incidents investigated by the company in 2025 stemmed from cloud identity compromise. The finding highlights a major shift in how attackers gain access to corporate environments.</p> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/field-effect-threat-report" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20Generic%203.png" alt="Field Effect report finds identity compromise driving majority of cyber incidents" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <h4>More than 80% of incident-related alerts tied to cloud identity abuse, new threat outlook shows</h4> <p>Field Effect has released its <a href="proxy.php?url=https://get.fieldeffect.com/2026-cyber-threat-report">2026 Cyber Threat Outlook</a>, revealing that more than 80% of incidents investigated by the company in 2025 stemmed from cloud identity compromise. The finding highlights a major shift in how attackers gain access to corporate environments.</p> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Ffield-effect-threat-report&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> News From the experts Tue, 10 Mar 2026 11:40:58 GMT https://fieldeffect.com/blog/field-effect-threat-report 2026-03-10T11:40:58Z Field Effect Fortinet devices under increased targeting as AI-enabled attacks scale in 2026 https://fieldeffect.com/blog/fortinet-increased-targeting-ai-enabled-attacks-2026 <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/fortinet-increased-targeting-ai-enabled-attacks-2026" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_02.jpg" alt="Fortinet devices under increased targeting as AI-enabled attacks scale in 2026" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> Field Effect is observing increased targeting of Fortinet devices in early 2026, with threat actors combining scanning for vulnerabilities, exposed management interfaces, and weak or single-factor authentication to gain access to edge infrastructure. Researchers also identified a surge in the use of an open-source, AI-enabled offensive security platform targeting Fortinet FortiGate devices,.</span></p> </div> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/fortinet-increased-targeting-ai-enabled-attacks-2026" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_02.jpg" alt="Fortinet devices under increased targeting as AI-enabled attacks scale in 2026" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> Field Effect is observing increased targeting of Fortinet devices in early 2026, with threat actors combining scanning for vulnerabilities, exposed management interfaces, and weak or single-factor authentication to gain access to edge infrastructure. Researchers also identified a surge in the use of an open-source, AI-enabled offensive security platform targeting Fortinet FortiGate devices,.</span></p> </div> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Ffortinet-increased-targeting-ai-enabled-attacks-2026&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security intelligence Mon, 09 Mar 2026 20:56:12 GMT https://fieldeffect.com/blog/fortinet-increased-targeting-ai-enabled-attacks-2026 2026-03-09T20:56:12Z Field Effect Security Intelligence Team Latest Iranian cyber activity amid Middle East escalation https://fieldeffect.com/blog/seedworm-iran-cyber-activity <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/seedworm-iran-cyber-activity" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_01.jpg" alt="Latest Iranian cyber activity amid Middle East escalation" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> Researchers linked new malware activity to the Iranian APT group Seedworm while separate reporting tied Iranian-aligned actors to campaigns compromising internet-connected cameras across the Middle East. The activity highlights how cyber operations and exposed IoT devices can support real-world military operations and intelligence gathering.</span></p> </div> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/seedworm-iran-cyber-activity" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_01.jpg" alt="Latest Iranian cyber activity amid Middle East escalation" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> Researchers linked new malware activity to the Iranian APT group Seedworm while separate reporting tied Iranian-aligned actors to campaigns compromising internet-connected cameras across the Middle East. The activity highlights how cyber operations and exposed IoT devices can support real-world military operations and intelligence gathering.</span></p> </div> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fseedworm-iran-cyber-activity&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security intelligence Mon, 09 Mar 2026 12:59:30 GMT https://fieldeffect.com/blog/seedworm-iran-cyber-activity 2026-03-09T12:59:30Z Field Effect Security Intelligence Team Researchers report a maximum‑severity flaw in a pac4j JWT library https://fieldeffect.com/blog/maximum-severity-flaw-java-jwt-library <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/maximum-severity-flaw-java-jwt-library" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Researchers report a maximum‑severity flaw in a pac4j JWT library" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> A flaw in a widely used Java library for working with JSON Web Tokens has drawn attention because it weakens one of the core guarantees of token‑based authentication: that only a trusted issuer can create valid tokens. Researchers found that, under certain conditions, the library may incorrectly accept or mis-validate tokens, opening the door to forged credentials or unauthorized access if an attacker can craft tokens that appear legitimate.</span></p> </div> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/maximum-severity-flaw-java-jwt-library" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Researchers report a maximum‑severity flaw in a pac4j JWT library" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> A flaw in a widely used Java library for working with JSON Web Tokens has drawn attention because it weakens one of the core guarantees of token‑based authentication: that only a trusted issuer can create valid tokens. Researchers found that, under certain conditions, the library may incorrectly accept or mis-validate tokens, opening the door to forged credentials or unauthorized access if an attacker can craft tokens that appear legitimate.</span></p> </div> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fmaximum-severity-flaw-java-jwt-library&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security intelligence Thu, 05 Mar 2026 20:54:15 GMT https://fieldeffect.com/blog/maximum-severity-flaw-java-jwt-library 2026-03-05T20:54:15Z Field Effect Security Intelligence Team CISA warns of remote code execution risk in VMware Aria Operations https://fieldeffect.com/blog/cisa-rce-vmware-aria-operations <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/cisa-rce-vmware-aria-operations" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_03.jpg" alt="CISA warns of remote code execution risk in VMware Aria Operations" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> CISA has added a high-severity Broadcom VMware Aria Operations vulnerability (CVE-2026-22719) to its Known Exploited Vulnerabilities catalog following reports of active exploitation. The flaw allows unauthenticated command execution during a support-assisted migration workflow and affects Aria Operations along with platforms that integrate it, including VMware Cloud Foundation and VMware Telco products.</p> </div> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/cisa-rce-vmware-aria-operations" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_03.jpg" alt="CISA warns of remote code execution risk in VMware Aria Operations" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> CISA has added a high-severity Broadcom VMware Aria Operations vulnerability (CVE-2026-22719) to its Known Exploited Vulnerabilities catalog following reports of active exploitation. The flaw allows unauthenticated command execution during a support-assisted migration workflow and affects Aria Operations along with platforms that integrate it, including VMware Cloud Foundation and VMware Telco products.</p> </div> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fcisa-rce-vmware-aria-operations&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security intelligence Wed, 04 Mar 2026 18:00:40 GMT https://fieldeffect.com/blog/cisa-rce-vmware-aria-operations 2026-03-04T18:00:40Z Field Effect Security Intelligence Team Cyber spillover risks amid the February 2026 Middle East escalation https://fieldeffect.com/blog/cyber-spillover-risks-2026-middle-east-escalation <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/cyber-spillover-risks-2026-middle-east-escalation" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_02.jpg" alt="Cyber spillover risks amid the February 2026 Middle East escalation" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> Escalating conflict following coordinated U.S. and Israeli strikes on Iranian military and nuclear sites has raised concerns about potential cyber spillover. Canadian and UK cybersecurity agencies warn that Iran is likely to use cyber capabilities in response, though no large-scale attacks have been confirmed. Researchers have observed a rise in opportunistic hacktivist activity and unverified claims of DDoS attacks, defacements, and data leaks targeting Iran’s adversaries. Organizations are advised to remain vigilant and reinforce core security controls.</p> </div> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/cyber-spillover-risks-2026-middle-east-escalation" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_02.jpg" alt="Cyber spillover risks amid the February 2026 Middle East escalation" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> Escalating conflict following coordinated U.S. and Israeli strikes on Iranian military and nuclear sites has raised concerns about potential cyber spillover. Canadian and UK cybersecurity agencies warn that Iran is likely to use cyber capabilities in response, though no large-scale attacks have been confirmed. Researchers have observed a rise in opportunistic hacktivist activity and unverified claims of DDoS attacks, defacements, and data leaks targeting Iran’s adversaries. Organizations are advised to remain vigilant and reinforce core security controls.</p> </div> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fcyber-spillover-risks-2026-middle-east-escalation&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security intelligence Wed, 04 Mar 2026 14:32:26 GMT https://fieldeffect.com/blog/cyber-spillover-risks-2026-middle-east-escalation 2026-03-04T14:32:26Z Field Effect Security Intelligence Team Critical TLS authentication bypass impacts VMware Tanzu https://fieldeffect.com/blog/tls-authentication-bypass-vmware-tanzu <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/tls-authentication-bypass-vmware-tanzu" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_01.jpg" alt="Critical TLS authentication bypass impacts VMware Tanzu" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> Broadcom has patched CVE-2025-68121, a critical (CVSS 10.0) flaw in Go’s crypto/tls library that impacts multiple VMware Tanzu products through embedded Go-based components. The vulnerability can undermine TLS authentication integrity during session resumption, potentially allowing unauthorized trust of a peer. Affected products include Tanzu RabbitMQ and several Tanzu Greenplum offerings. Users are urged to upgrade to the fixed versions listed in Broadcom’s advisories.</p> </div> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/tls-authentication-bypass-vmware-tanzu" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_01.jpg" alt="Critical TLS authentication bypass impacts VMware Tanzu" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> Broadcom has patched CVE-2025-68121, a critical (CVSS 10.0) flaw in Go’s crypto/tls library that impacts multiple VMware Tanzu products through embedded Go-based components. The vulnerability can undermine TLS authentication integrity during session resumption, potentially allowing unauthorized trust of a peer. Affected products include Tanzu RabbitMQ and several Tanzu Greenplum offerings. Users are urged to upgrade to the fixed versions listed in Broadcom’s advisories.</p> </div> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Ftls-authentication-bypass-vmware-tanzu&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security intelligence Tue, 03 Mar 2026 13:56:12 GMT https://fieldeffect.com/blog/tls-authentication-bypass-vmware-tanzu 2026-03-03T13:56:12Z Field Effect Security Intelligence Team MDR for MSPs with a lean cybersecurity team https://fieldeffect.com/blog/mdr-for-lean-msps <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/mdr-for-lean-msps" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20MDR%202.png" alt="MDR for MSPs with a lean cybersecurity team" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>“My MSP doesn’t have a dedicated security team.”</p> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/mdr-for-lean-msps" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20MDR%202.png" alt="MDR for MSPs with a lean cybersecurity team" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>“My MSP doesn’t have a dedicated security team.”</p> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fmdr-for-lean-msps&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Cybersecurity education Mon, 02 Mar 2026 15:10:20 GMT https://fieldeffect.com/blog/mdr-for-lean-msps 2026-03-02T15:10:20Z Field Effect Cybersecurity insurance and MDR: What businesses and MSPs need to know https://fieldeffect.com/blog/cybersecurity-insurance-mdr <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/cybersecurity-insurance-mdr" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Blog-Thumb-Cyber-insurance-MDR.png" alt="Cybersecurity insurance and MDR: What businesses and MSPs need to know" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Cybersecurity insurance (cyber liability insurance) is a policy that helps organizations cover the financial impact of cyber incidents such as ransomware, data breaches, business interruption, and regulatory fines.&nbsp;<br><br>Unlike traditional insurance, cyber coverage now requires demonstrable cybersecurity controls before approval or renewal.</p> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/cybersecurity-insurance-mdr" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Blog-Thumb-Cyber-insurance-MDR.png" alt="Cybersecurity insurance and MDR: What businesses and MSPs need to know" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Cybersecurity insurance (cyber liability insurance) is a policy that helps organizations cover the financial impact of cyber incidents such as ransomware, data breaches, business interruption, and regulatory fines.&nbsp;<br><br>Unlike traditional insurance, cyber coverage now requires demonstrable cybersecurity controls before approval or renewal.</p> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fcybersecurity-insurance-mdr&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Cybersecurity education Mon, 02 Mar 2026 14:50:31 GMT https://fieldeffect.com/blog/cybersecurity-insurance-mdr 2026-03-02T14:50:31Z Field Effect Researchers report FreePBX exploitation: 900+ systems compromised https://fieldeffect.com/blog/freepbx-exploitation-900-systems-compromised <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/freepbx-exploitation-900-systems-compromised" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Researchers report FreePBX exploitation: 900+ systems compromised" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> Researchers report more than 900 Sangoma FreePBX instances infected with persistent web shells following exploitation of CVE-2025-64328, a high-severity (CVSS 8.6) post-authentication command-injection vulnerability in the FreePBX Endpoint Manager filestore module. Affecting versions 17.0.2.36 and above up to (but not including) 17.0.3, the flaw stems from improper handling of user input in the SSH test-connection function, enabling arbitrary command execution as the asterisk user. Exploitation has been observed since December 2025, despite patches released in November 2025. </p> </div> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/freepbx-exploitation-900-systems-compromised" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Researchers report FreePBX exploitation: 900+ systems compromised" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> Researchers report more than 900 Sangoma FreePBX instances infected with persistent web shells following exploitation of CVE-2025-64328, a high-severity (CVSS 8.6) post-authentication command-injection vulnerability in the FreePBX Endpoint Manager filestore module. Affecting versions 17.0.2.36 and above up to (but not including) 17.0.3, the flaw stems from improper handling of user input in the SSH test-connection function, enabling arbitrary command execution as the asterisk user. Exploitation has been observed since December 2025, despite patches released in November 2025. </p> </div> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Ffreepbx-exploitation-900-systems-compromised&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security intelligence Mon, 02 Mar 2026 14:13:33 GMT https://fieldeffect.com/blog/freepbx-exploitation-900-systems-compromised 2026-03-02T14:13:33Z Field Effect Security Intelligence Team HIPAA & what it means for MSPs https://fieldeffect.com/blog/hipaa-for-msps <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/hipaa-for-msps" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Blog-Thumb-HIPAA_v2.png" alt="HIPAA &amp; what it means for MSPs" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>For MSPs that support healthcare organizations, HIPAA compliance can be slightly intimidating.</p> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/hipaa-for-msps" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Blog-Thumb-HIPAA_v2.png" alt="HIPAA &amp; what it means for MSPs" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>For MSPs that support healthcare organizations, HIPAA compliance can be slightly intimidating.</p> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fhipaa-for-msps&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> From the experts Mon, 02 Mar 2026 12:45:00 GMT https://fieldeffect.com/blog/hipaa-for-msps 2026-03-02T12:45:00Z Matt Lewis Zyxel patches critical UPnP command‑injection flaw, POC available https://fieldeffect.com/blog/zyxel-patch-upnp-command-injection-flaw <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/zyxel-patch-upnp-command-injection-flaw" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_03.jpg" alt="Zyxel patches critical UPnP command‑injection flaw, POC available" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> Zyxel disclosed CVE-2025-13942, a critical (CVSS 9.8) command-injection vulnerability in the UPnP service of the EX3510-B0 router, affecting firmware through version 5.17(ABUP.15.1)C0. The flaw allows unauthenticated remote attackers to execute operating system commands via specially crafted UPnP SOAP requests when both UPnP and WAN access are enabled. Proof-of-concept code has been released, and exploitation requires minimal complexity once the service is exposed. </p> </div> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/zyxel-patch-upnp-command-injection-flaw" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_03.jpg" alt="Zyxel patches critical UPnP command‑injection flaw, POC available" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> Zyxel disclosed CVE-2025-13942, a critical (CVSS 9.8) command-injection vulnerability in the UPnP service of the EX3510-B0 router, affecting firmware through version 5.17(ABUP.15.1)C0. The flaw allows unauthenticated remote attackers to execute operating system commands via specially crafted UPnP SOAP requests when both UPnP and WAN access are enabled. Proof-of-concept code has been released, and exploitation requires minimal complexity once the service is exposed. </p> </div> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fzyxel-patch-upnp-command-injection-flaw&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security intelligence Fri, 27 Feb 2026 13:51:01 GMT https://fieldeffect.com/blog/zyxel-patch-upnp-command-injection-flaw 2026-02-27T13:51:01Z Field Effect Security Intelligence Team Why law firms need smarter cybersecurity solutions https://fieldeffect.com/blog/law-firms-cybersecurity <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/law-firms-cybersecurity" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20MDR%201.png" alt="Why law firms need smarter cybersecurity solutions" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Law firms are trusted with some of the most sensitive information: client records, case details, financial data, and intellectual property. In today’s digital-first world, this data is a prime target for cybercriminals. Unfortunately, many firms still rely on outdated security measures or a patchwork of tools that leave dangerous gaps.</p> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/law-firms-cybersecurity" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20MDR%201.png" alt="Why law firms need smarter cybersecurity solutions" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Law firms are trusted with some of the most sensitive information: client records, case details, financial data, and intellectual property. In today’s digital-first world, this data is a prime target for cybercriminals. Unfortunately, many firms still rely on outdated security measures or a patchwork of tools that leave dangerous gaps.</p> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Flaw-firms-cybersecurity&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Cybersecurity education Thu, 26 Feb 2026 05:45:00 GMT https://fieldeffect.com/blog/law-firms-cybersecurity 2026-02-26T05:45:00Z Field Effect Maximum‑severity zero day in Cisco Catalyst SD‑WAN now patched https://fieldeffect.com/blog/max-severity-zero-day-cisco-catalyst-sd-wan-patched <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/max-severity-zero-day-cisco-catalyst-sd-wan-patched" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_02.jpg" alt="Maximum‑severity zero day in Cisco Catalyst SD‑WAN now patched" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> Cisco disclosed CVE-2026-20127, a maximum-severity zero-day in Catalyst SD-WAN Controller and Manager that allows unauthenticated remote access to high-privilege internal accounts. Exploitation enables attackers to reach the NETCONF interface and manipulate routing and policy across the SD-WAN control plane. Limited in-the-wild activity was confirmed prior to patch release. </p> </div> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/max-severity-zero-day-cisco-catalyst-sd-wan-patched" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_02.jpg" alt="Maximum‑severity zero day in Cisco Catalyst SD‑WAN now patched" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> Cisco disclosed CVE-2026-20127, a maximum-severity zero-day in Catalyst SD-WAN Controller and Manager that allows unauthenticated remote access to high-privilege internal accounts. Exploitation enables attackers to reach the NETCONF interface and manipulate routing and policy across the SD-WAN control plane. Limited in-the-wild activity was confirmed prior to patch release. </p> </div> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fmax-severity-zero-day-cisco-catalyst-sd-wan-patched&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security intelligence Wed, 25 Feb 2026 21:00:58 GMT https://fieldeffect.com/blog/max-severity-zero-day-cisco-catalyst-sd-wan-patched 2026-02-25T21:00:58Z Field Effect Security Intelligence Team Typosquatting campaign targets npm, CI pipelines, and AI‑driven development https://fieldeffect.com/blog/typosquatting-campaign-sandworm-mode <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/typosquatting-campaign-sandworm-mode" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_01.jpg" alt="Typosquatting campaign targets npm, CI pipelines, and AI‑driven development" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> Researchers detailed SANDWORM_MODE, a supply-chain attack campaign involving at least 19 malicious npm packages impersonating popular developer utilities and AI coding tools. The typosquatted packages deployed a malicious Model Context Protocol (MCP) server and used embedded prompt-injection techniques to harvest SSH keys, cloud credentials, npm tokens, and environment secrets across developer and CI environments. The activity highlights how AI-integrated toolchains create new paths for credential theft. </p> </div> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/typosquatting-campaign-sandworm-mode" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_01.jpg" alt="Typosquatting campaign targets npm, CI pipelines, and AI‑driven development" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> Researchers detailed SANDWORM_MODE, a supply-chain attack campaign involving at least 19 malicious npm packages impersonating popular developer utilities and AI coding tools. The typosquatted packages deployed a malicious Model Context Protocol (MCP) server and used embedded prompt-injection techniques to harvest SSH keys, cloud credentials, npm tokens, and environment secrets across developer and CI environments. The activity highlights how AI-integrated toolchains create new paths for credential theft. </p> </div> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Ftyposquatting-campaign-sandworm-mode&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security intelligence Wed, 25 Feb 2026 14:37:50 GMT https://fieldeffect.com/blog/typosquatting-campaign-sandworm-mode 2026-02-25T14:37:50Z Field Effect Security Intelligence Team What is the difference between MDR, XDR, and EDR? https://fieldeffect.com/blog/mdr-xdr-edr <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/mdr-xdr-edr" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/blog_featured-Difference-between-MDR-XDR-and-EDR.jpg" alt="MDR XDR EDR Thumbnail" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>The cybersecurity world can sometimes feel like a tangled web of acronyms, each longer and more complex than the last. We've previously covered <a href="proxy.php?url=https://fieldeffect.com/blog/cyber-security-solutions-how-they-work/">some of the more common terms</a>, but today, let's dive deeper into the world of detection and response, focusing on three heavy hitters:</p> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/mdr-xdr-edr" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/blog_featured-Difference-between-MDR-XDR-and-EDR.jpg" alt="MDR XDR EDR Thumbnail" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>The cybersecurity world can sometimes feel like a tangled web of acronyms, each longer and more complex than the last. We've previously covered <a href="proxy.php?url=https://fieldeffect.com/blog/cyber-security-solutions-how-they-work/">some of the more common terms</a>, but today, let's dive deeper into the world of detection and response, focusing on three heavy hitters:</p> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fmdr-xdr-edr&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Cybersecurity education Tue, 24 Feb 2026 19:45:00 GMT https://fieldeffect.com/blog/mdr-xdr-edr 2026-02-24T19:45:00Z Field Effect Cyber myth buster: EDR and backups aren’t a security strategy https://fieldeffect.com/blog/cyber-myth-buster-edr-and-backups-arent-a-security-strategy <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/cyber-myth-buster-edr-and-backups-arent-a-security-strategy" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Blog-Thumb-Myth-Buster.png" alt="Cyber myth buster: EDR and backups aren’t a security strategy" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Endpoint detection and response (EDR) and data backups are essential tools in any cybersecurity program. They help detect threats on endpoints and recover data when things go wrong. But relying on them alone leaves critical gaps.</p> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/cyber-myth-buster-edr-and-backups-arent-a-security-strategy" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Blog-Thumb-Myth-Buster.png" alt="Cyber myth buster: EDR and backups aren’t a security strategy" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Endpoint detection and response (EDR) and data backups are essential tools in any cybersecurity program. They help detect threats on endpoints and recover data when things go wrong. But relying on them alone leaves critical gaps.</p> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fcyber-myth-buster-edr-and-backups-arent-a-security-strategy&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Products and services Tue, 24 Feb 2026 19:26:54 GMT https://fieldeffect.com/blog/cyber-myth-buster-edr-and-backups-arent-a-security-strategy 2026-02-24T19:26:54Z Field Effect The best alternatives to Blackpoint for managed detection & response https://fieldeffect.com/blog/best-alternatives-blackpoint-managed-detection-response <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/best-alternatives-blackpoint-managed-detection-response" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20MDR%203.png" alt="Managed detection and response MDR" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <h2>Why do organizations seek alternatives to Blackpoint?</h2> <p>Blackpoint Cyber is a familiar name among MSPs seeking a managed SOC-as-a-service offering. However, as cybersecurity demands evolve, many MSPs and lean IT teams find themselves looking for more integrated, complete, and value-driven MDR solutions.</p> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/best-alternatives-blackpoint-managed-detection-response" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20MDR%203.png" alt="Managed detection and response MDR" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <h2>Why do organizations seek alternatives to Blackpoint?</h2> <p>Blackpoint Cyber is a familiar name among MSPs seeking a managed SOC-as-a-service offering. However, as cybersecurity demands evolve, many MSPs and lean IT teams find themselves looking for more integrated, complete, and value-driven MDR solutions.</p> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fbest-alternatives-blackpoint-managed-detection-response&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Products and services Tue, 24 Feb 2026 18:20:43 GMT https://fieldeffect.com/blog/best-alternatives-blackpoint-managed-detection-response 2026-02-24T18:20:43Z Field Effect How to calculate the ROI of MDR solutions https://fieldeffect.com/blog/how-to-calculate-the-roi-of-mdr-solutions <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/how-to-calculate-the-roi-of-mdr-solutions" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20MDR%203.png" alt="Managed detection and response MDR" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Return on investment (ROI) for managed detection and response (MDR) is often misunderstood.</p> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/how-to-calculate-the-roi-of-mdr-solutions" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20MDR%203.png" alt="Managed detection and response MDR" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Return on investment (ROI) for managed detection and response (MDR) is often misunderstood.</p> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fhow-to-calculate-the-roi-of-mdr-solutions&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Products and services Tue, 24 Feb 2026 18:05:35 GMT https://fieldeffect.com/blog/how-to-calculate-the-roi-of-mdr-solutions 2026-02-24T18:05:35Z Field Effect Low‑skill threat actor leverages AI in FortiGate intrusion activity https://fieldeffect.com/blog/threat-actor-ai-fortigate-intrusion-activity <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/threat-actor-ai-fortigate-intrusion-activity" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Low‑skill threat actor leverages AI in FortiGate intrusion activity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> More than 600 FortiGate devices were compromised worldwide after a low-skill, financially motivated actor used commercial AI tools to automate reconnaissance, credential harvesting, and intrusion activity against exposed management interfaces with weak authentication. The campaign highlights how AI can amplify opportunistic attacks. Organizations should restrict internet-facing management access, enforce MFA, rotate credentials, and monitor for anomalous activity to reduce risk. </p> </div> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/threat-actor-ai-fortigate-intrusion-activity" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Low‑skill threat actor leverages AI in FortiGate intrusion activity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"> <p style="color: inherit; font-style: inherit;"><span style="font-weight: bold;">At a glance:</span> More than 600 FortiGate devices were compromised worldwide after a low-skill, financially motivated actor used commercial AI tools to automate reconnaissance, credential harvesting, and intrusion activity against exposed management interfaces with weak authentication. The campaign highlights how AI can amplify opportunistic attacks. Organizations should restrict internet-facing management access, enforce MFA, rotate credentials, and monitor for anomalous activity to reduce risk. </p> </div> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fthreat-actor-ai-fortigate-intrusion-activity&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Security intelligence Tue, 24 Feb 2026 14:01:04 GMT https://fieldeffect.com/blog/threat-actor-ai-fortigate-intrusion-activity 2026-02-24T14:01:04Z Field Effect Security Intelligence Team Evaluating MDR vendors: Why MSPs choose Field Effect MDR https://fieldeffect.com/blog/evaluating-mdr-vendors-why-msps-choose-field-effect-mdr <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/evaluating-mdr-vendors-why-msps-choose-field-effect-mdr" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20MDR%203.png" alt="Managed detection and response MDR" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>For managed service providers (MSPs), choosing a managed detection and response (MDR) vendor is no longer just a technology decision, it's a business risk decision.</p> <div class="hs-featured-image-wrapper"> <a href="proxy.php?url=https://fieldeffect.com/blog/evaluating-mdr-vendors-why-msps-choose-field-effect-mdr" title="" class="hs-featured-image-link"> <img src="proxy.php?url=https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20MDR%203.png" alt="Managed detection and response MDR" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>For managed service providers (MSPs), choosing a managed detection and response (MDR) vendor is no longer just a technology decision, it's a business risk decision.</p> <img src="proxy.php?url=https://track.hubspot.com/__ptq.gif?a=8376691&amp;k=14&amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fevaluating-mdr-vendors-why-msps-choose-field-effect-mdr&amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Products and services Mon, 23 Feb 2026 15:36:57 GMT https://fieldeffect.com/blog/evaluating-mdr-vendors-why-msps-choose-field-effect-mdr 2026-02-23T15:36:57Z Field Effect