Sign in to view MZ’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
MZ MegaZone
Bolton, Massachusetts, United States
2K followers
500+ connections
View mutual connections with MZ
MZ can introduce you to 1 people at CVE Program
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with MZ
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Websites
- Personal Website
-
https://www.facebook.com/megazone
About
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Activity
2K followers
-
MZ MegaZone reposted thisMZ MegaZone reposted thisRegistration is open for “CVE/FIRST VulnCon 2026” on April 13–16, 2026!!! In-person & virtual available: https://lnkd.in/dv9-edAf #cve #first #vulncon26 #vulnerabilitymanagement #vulnerability
-
MZ MegaZone reposted thisMZ MegaZone reposted thisA week has passed since we shared news of a major security incident at F5. We’ve taken, and will continue to take, significant steps to protect our customers by remediating the threat and strengthening the security of our core systems and infrastructure. To all our customers who have spent long hours implementing updates and combing through logs, thank you. Your responsiveness and the grace you have shown us working through this incident together are deeply appreciated. We are learning a tremendous amount from this incident and will take time to fully assess where and how we can be better. Along the way, we will share updates, so that our learnings can benefit not only F5, but the entire security community. In that spirit, our Chief Information Security Officer, Christopher Burger has written a blog on some initial lessons learned. I hope you find it helpful – there will be more to come. https://lnkd.in/gXNViF3fLessons we are learning from our security incidentLessons we are learning from our security incident
-
MZ MegaZone shared thisThe session recordings for VulnCon 2025 are now available on YouTube: https://lnkd.in/eEM_4CNu There is a lot of good content there. If you want to see the program schedule, and session descriptions, see https://lnkd.in/epk82nwD Then you can find the matching recording to view.
-
MZ MegaZone shared thisReflecting on my career journey, I realize the immense value that mentorship holds. That's why I'm thrilled to pay it forward and give back as a mentor myself. Thanks to F5 for the opportunity to share knowledge and help others grow. #MentorTogether
-
MZ MegaZone shared thisThe CVE Foundation has posted a short FAQ for those interested. Events of this week created something of a scramble, so more information will be forthcoming as drafts get hammered out.MZ MegaZone shared thisHi Folks, more info about our federation here. https://lnkd.in/ev9d5Ju5Building a trusted, stable, and durable global community to support the CVE ProgramBuilding a trusted, stable, and durable global community to support the CVE Program
-
MZ MegaZone reposted thisMZ MegaZone reposted thisCVE Foundation - Launched to Secure the Future of the CVE Program.Building a trusted, stable, and durable global community to support the CVE ProgramBuilding a trusted, stable, and durable global community to support the CVE Program
-
-
MZ MegaZone shared this#VulnCon2025 was fantastic. I'm honored to work with a great group of people organizing the event. Looking forward to Scottsdale in 2026!MZ MegaZone shared thisThe #VulnCon2025 Program Committee! I hope everyone is having a great time at the event sharing, learning, and connecting.
-
MZ MegaZone reposted thisMZ MegaZone reposted this⚠️ SSRF targeting EC2 instance metadata? Oracle Cloud still reeling from breach fallout? Malicious NPM packages exploiting developers' trust? This week on #AppSecNow, our experts dive deep into the latest AppSec threats: 🔹 How attackers leverage EC2 SSRF for unintended impacts 🔹 Oracle’s breach and accountability challenges 🔹 Golang malware disguising itself with job-interview tactics 🔹 Critical Apache Parquet flaw, plus cautionary advice about dependency management in NPM packages Join Merlyn, Malcolm, MZ MegaZone and Chase Abbott for insightful discussions to elevate your AppSec posture. Don’t miss out! Watch now ▶️ https://lnkd.in/gdhev-iT #CyberSecurity #DevSecOps #CloudSecurity #InfoSec #SecurityNews #F5Labs #VulnCon #ThreatResearch #EC2 #OracleCloud #NPM #ApacheParquet #SecurityPodcast
-
MZ MegaZone liked thisF5 is probably one of the most challenging companies to work for. If you think you know your field, you’ll be humbled after you join. But, it’s a good thing. You’ll learn more about the full stack than you would in any place (if you’re open and you let it happen). I can’t recommend it enough.MZ MegaZone liked thisThe Solution Architect role at F5 is fascinating, challenging, and rewarding. I should know! Join us: https://lnkd.in/e4NYe73X
-
MZ MegaZone liked thisMZ MegaZone liked thisRegistration is open for “CVE/FIRST VulnCon 2026” on April 13–16, 2026!!! In-person & virtual available: https://lnkd.in/dv9-edAf #cve #first #vulncon26 #vulnerabilitymanagement #vulnerability
-
MZ MegaZone liked thisMZ MegaZone liked thisThe CVE program has rules. But rules only matter if they are enforced. On Nov 17, I asked VulnCheck to help assign a CVE to a publicly disclosed vulnerability in a Microsoft open-source project, a DNS Rebinding vulnerability impacting Playwright-MCP. In October, I'd alerted Microsoft Security Response Center (MSRC) to the vulnerability, but MSRC triagers declined to assign a CVE, stating that the issue was “already fixed.” The MSRC triager missed a critical point: *a fixed vulnerability still requires a CVE* so downstream users know they must update to be protected. Without a CVE, there is no reliable signal to the ecosystem that a vulnerability has been fixed, and downstream users need to update dependencies. Under the CVE Program’s own operational rules, this situation is not ambiguous. When the CNA with the most appropriate scope refuses to assign or fails to act within 72 hours, the Root CNA (MITRE) is required to step in and ensure a CVE is issued. The the relevant policy can be found below. With VulnCheck’s help, a formal dispute was submitted to MITRE in mid-November. As of today, just short of two months later, MITRE has still not responded. My situation isn't unique. The CVE system needs to actually work when a powerful CNA fails to do the right thing. Currently it's not working and vulnerabilities are being missed. MITRE's role as secretariat and Root CNA exists to ensure the rules are followed. But when the Root CNA itself ignores those rules, there is no mechanism left to correct the failure. That gap undermines the trust every researcher, vendor, and downstream user depends on.
-
MZ MegaZone reacted on thisMZ MegaZone reacted on thisAt F5, we take pride in fostering growth, celebrating excellence, and creating opportunities for exceptional individuals to thrive. I’m excited to share that four outstanding team members have officially stepped into full-time roles within our organization, strengthening our capabilities and driving our mission forward. Hen Golubenko - Security Researcher Tim Kushmaro - Software Development Engineer Rotem Avraham - Software Development Engineer Ori Kushnir - DevOps Engineer Please join me in congratulating Hen, Tim, Rotem, and Ori as they begin this next chapter. Welcome aboard, your journey with F5 is just beginning! I look forward to seeing the positive impact and innovative contributions each of you will make as we continue working together to deliver unparalleled results for our customers. #f5 #f5networks #bef5 #leadership #cybersecurity I am Anna Saydon Follow me 👍 Ring the 🔔 on my profile
-
MZ MegaZone reacted on thisMZ MegaZone reacted on thisAfter almost 10 years, it’s time to say goodbye to F5 ❤️ I’m so lucky to have worked with such amazing people and have F5 as my home. My last day will be Dec 31st and starting the new year with a new opportunity that I’m SO excited for! Little slide show of some memories over the years 🥹
-
MZ MegaZone liked thisMZ MegaZone liked thisAfter almost 19 incredible years, it’s time for me to say farewell to F5. It’s hard to put into words what this journey has meant for me. Over my time at F5, I’ve had the privilege of working for and alongside so many truly amazing people, tackling meaningful challenges, helping the company evolve and innovate, and staying true to its human-first ethos. The relationships, lessons, and experiences I’ve gained will stay with me well beyond this chapter. For now, I’m taking some time for a well-earned break to reflect on what’s next. I’m incredibly grateful to everyone I’ve worked with along the way—thank you for the collaboration, the trust, and the many great memories. I look forward to connecting in 2026!
Experience & Education
-
CVE Program
*** ***** *******
-
**
********* ******** ******** * ** ****
-
*******
****
-
********* *********** *********
** ****** ***** * ******* * ********* ******* undefined
-
View MZ’s full experience
See their title, tenure and more.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Licenses & Certifications
Languages
-
English
Native or bilingual proficiency
Recommendations received
1 person has recommended MZ
Join now to viewView MZ’s full profile
-
See who you know in common
-
Get introduced
-
Contact MZ directly
Explore more posts
-
Cortex by Palo Alto Networks
58K followers
🛠️ Traditional SIEMs weren’t built for today’s threats. Complexity, poor cloud integration, and high false positives are holding security teams back. It’s time to modernize. This guide gives security leaders a clear roadmap to transform their SIEM without disrupting operations. 🔍 Start your SIEM transformation with Cortex XSIAM. https://bit.ly/3JsfsEz
84
-
The Cyber Security Hub™
2M followers
Download Pentera Labs Report - revealing three new critical injection points in the ingress-nginx controller, building on Wiz’s IngressNightmare CVE. These overlooked vulnerabilities could let attackers hijack traffic, spoof headers, or reach unauthorized backend services - They exist in one of the most widely used ingress controllers in Kubernetes, putting countless environments at risk. This research highlights how small misconfigurations can lead to major exposure in modern cloud-native architectures. What’s Inside: ✅ 3 new injection vulnerabilities in ingress-nginx ✅ How attackers find and exploit CVEs in open source ✅ Actionable tips to secure your Kubernetes environment https://lnkd.in/eHtX6EdP
9
1 Comment -
The Cyber Security Hub™
2M followers
Download Pentera Labs Report - revealing three new critical injection points in the ingress-nginx controller, building on Wiz’s IngressNightmare CVE. These overlooked vulnerabilities could let attackers hijack traffic, spoof headers, or reach unauthorized backend services - They exist in one of the most widely used ingress controllers in Kubernetes, putting countless environments at risk. This research highlights how small misconfigurations can lead to major exposure in modern cloud-native architectures. What’s Inside: ✅ 3 new injection vulnerabilities in ingress-nginx ✅ How attackers find and exploit CVEs in open source ✅ Actionable tips to secure your Kubernetes environment https://lnkd.in/eHtX6EdP
6
1 Comment -
The Cyber Security Hub™
2M followers
Download Pentera Labs Report - revealing three new critical injection points in the ingress-nginx controller, building on Wiz’s IngressNightmare CVE. These overlooked vulnerabilities could let attackers hijack traffic, spoof headers, or reach unauthorized backend services - They exist in one of the most widely used ingress controllers in Kubernetes, putting countless environments at risk. This research highlights how small misconfigurations can lead to major exposure in modern cloud-native architectures. What’s Inside: ✅ 3 new injection vulnerabilities in ingress-nginx ✅ How attackers find and exploit CVEs in open source ✅ Actionable tips to secure your Kubernetes environment https://lnkd.in/eHtX6EdP
3
-
Cybrlytics Technology
10K followers
Download Pentera Labs Report - revealing three new critical injection points in the ingress-nginx controller, building on Wiz’s IngressNightmare CVE. These overlooked vulnerabilities could let attackers hijack traffic, spoof headers, or reach unauthorized backend services - They exist in one of the most widely used ingress controllers in Kubernetes, putting countless environments at risk. This research highlights how small misconfigurations can lead to major exposure in modern cloud-native architectures. What’s Inside: ✅ 3 new injection vulnerabilities in ingress-nginx ✅ How attackers find and exploit CVEs in open source ✅ Actionable tips to secure your Kubernetes environment https://lnkd.in/eHtX6EdP
2
-
CYBER DEFENSE MAROC
1K followers
Not all alerts are created equal. Master alert triage by focusing on context: asset criticality, attack vector, and threat intelligence. Prioritize what threatens your crown jewels first, then tackle the noise. Efficient triage = faster response, less burnout. Your SOC’s secret weapon? Smarter, not harder. 🔍 #Cybersecurity #AlertTriage
-
Pangolin
770 followers
ZTNA is not VPN with better branding. VPNs connect users to networks. ZTNA connects authorized users to specific resources. That shift matters. Instead of trusting someone once they’re “inside,” ZTNA checks identity, device posture, context, and policy before granting access. Less broad access. Less lateral movement risk. More control over who gets access to what. We just published a practical breakdown of how ZTNA works and where it fits in a real Zero Trust architecture. Link in comments. #ZTNA #ZeroTrust #RemoteAccess #InfrastructureSecurity
19
1 Comment -
Hussar Systems LLC | Palo Alto Networks
41 followers
Is your SIEM creating more operational hurdles than security solutions, leaving your team reactive and overwhelmed by alerts? Cortex XSIAM transforms security operations with an AI-driven, automation-first platform that addresses the fundamental limitations of traditional SIEMs. By unifying best-in-class SOC functions and leveraging machine learning, organizations can shift from reactive alert management to proactive threat prevention while dramatically improving efficiency. • Reduces mean time to respond from days to minutes through AI-powered analytics that automatically group alerts and score incidents based on relevance and risk. • Increases incident closure rates from 10% to 100% with embedded automation that ensures no threat slips through the cracks. • Cuts daily alert volume by 75% by eliminating false positives and duplicate incidents, allowing analysts to focus on genuine threats. • Consolidates multiple security tools into a single platform, reducing investigation dashboards from six to one while accelerating resolution from one day to 14 minutes. • Automates compliance reporting for standards including HIPAA, NIST, PCI DSS, and SOX while maintaining internal security standards through configurable playbooks. Discover how an automation-first security operations platform can transform your SOC from overwhelmed to optimized while preparing for evolving threats. Explore Palo Alto Networks Quick Start Service: https://lnkd.in/gcDg3rrf Explore Palo Alto Networks Firewall Managed Service: https://lnkd.in/gTt-RcTB #PaloAltoNetworks #ResourceLibrary #PaloAltoNetworksResourceLibrary #CortexXSIAM #SecurityOperations #AIforSecurity #SOCAutomation #SIEM #ThreatDetection
-
Central Data Systems Pvt Ltd
6K followers
Identity and Access Management (IAM) is a key guardrail for secure access. This guide explains core IAM components, how they protect resources, and why they are foundational to Zero Trust security strategies. Read the breakdown: http://oal.lu/Mhwr5 #IAM #ZeroTrust #Security
1
-
Hussar Systems LLC | Cisco
108 followers
Identity and Access Management (IAM) is a key guardrail for secure access. This guide explains core IAM components, how they protect resources, and why they are foundational to Zero Trust security strategies. Read the breakdown: http://oal.lu/Q1obO #IAM #ZeroTrust #Security
1
-
Chickasaw Telecom, Inc.
940 followers
Identity and Access Management (IAM) is a key guardrail for secure access. This guide explains core IAM components, how they protect resources, and why they are foundational to Zero Trust security strategies. Read the breakdown: http://oal.lu/nq0Lr #IAM #ZeroTrust #Security
-
Solubra S.A
180 followers
Identity and Access Management (IAM) is a key guardrail for secure access. This guide explains core IAM components, how they protect resources, and why they are foundational to Zero Trust security strategies. Read the breakdown: http://oal.lu/36byC #IAM #ZeroTrust #Security
-
Axiler
1K followers
Anonymous access isn’t just a visibility problem. It’s a remediation problem. When identities go missing, risk spreads quietly across applications, APIs, and cloud environments. Axiler doesn’t just detect abnormal access; it remediates it automatically, closing gaps before they are exploited.
10
-
Austin Jones
Satine Technologies • 2K followers
Boards don’t care about CVEs. They care about cash flow. If your security brief sounds like “we closed 327 medium-severity findings,” you’ve already lost your audience. Executives speak in dollars, risk, and velocity. If you can’t translate vulnerabilities into those terms, you’ll always be seen as a cost center. Security isn’t about patch counts. It’s about protecting revenue. Speak the right language or get tuned out.
8
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content