Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

New SMB Vulnerability opens door to privilege escalation

On September 9, 2025, Microsoft released details of CVE-2025-55234, a critical vulnerability in the Windows Server Message Block (SMB) protocol. With a CVSS v3 score of 8.8, it’s classified as High severity and poses a serious elevation-of-privilege (EoP) risk. An attacker exploiting this flaw could launch a relay attack, allowing them to gain the privileges of a legitimate user without elevated permissions or insider access.

Kubernetes backup & recovery deep dive: DR and VM protection with Spectro Cloud Palette & CloudCasa

Hands-on deep dive into building rock-solid resilience for modern Kubernetes environments. We’ll start with the must-know foundations of Kubernetes backup, disaster recovery and compliance, then explore real-world pitfalls that simple snapshots or open-source Velero can miss. You’ll learn how deploying CloudCasa through Spectro Cloud Palette delivers enterprise-grade, policy-driven protection across multicluster environments. Next, we’ll tackle an emerging challenge: safeguarding virtual-machine workloads running on Kubernetes through KubeVirt solutions like Palette VMO.

Guest Post: A CIO/CISO Perspective on Agile Security and the Modern DevOps in the Startup Era

Ori Asias, Progressive Senior VP, guides global IT transformations, fostering growth, positive cultures, leveraging a BSc in Industrial Engineering, and pivotal roles in CIO, CISO, and DevOps. Security experts dedicated to shaping insightful editorial content, guiding developers and organizations toward secure cloud app development. Dive into a wealth of knowledge and experience in fortifying software integrity.

What Being Customer Recognized in The Forrester Wave: Static Application Security Testing Solutions, Q3 2025 Really Means

Our customers have been telling us for months: “You’ve made security simple.” Today, Forrester confirmed what our customers already knew. Mend.io has been recognized as a Strong Performer in The Forrester Wave: Static Application Security Testing Solutions, Q3 2025. In our first appearance in the evaluation, we earned top scores in Innovation and Triage. But the recognition that matters most? Being highlighted as a customer favorite.

How to Bring Back Rancher Projects with CloudCasa

If you’ve ever worked with Rancher projects, you know they’re a handy way to group namespaces, manage RBAC, and keep your Kubernetes world a little less chaotic. But what happens if a project or its namespaces vanish? That’s where CloudCasa comes in. It makes restoring Rancher projects and their workloads surprisingly simple. Let’s break it down into the three main situations you might run into.

Securing Identity in the Age of AI: A Buyer's Guide to Teleport

As enterprises embrace AI, identity has become the defining security challenge. Every new database, Kubernetes cluster, SaaS app, and now every AI agent introduces yet another identity that must be governed and protected. At the same time, attackers are weaponizing AI to accelerate identity-based threats, exploiting fragmentation and credential sprawl to devastating effect.

Oracle Linux Server Hardening

Server hardening’s core principle is, “unnecessary functionality compromises security.” Adopting Linux should greatly simplify the process. No matter which flavor of Linux you choose to run, hardening your servers should be the same process; once you know one, you know them all. When it comes to Oracle Linux Server Hardening, what works for Red Hat or CentOS should continue to work. In theory, yes, but in practice, there are significant differences that could make or break your project.

NPM Supply Chain Attack: Sophisticated Multi-Chain Cryptocurrency Drainer Infiltrates Popular Packages

The NPM ecosystem faced another significant supply chain attack when 18 popular packages, including highly-used libraries like debug and chalk, were compromised with advanced cryptocurrency drainer malware. This attack, affecting packages with over 2 billion weekly downloads, demonstrates how cybercriminals are leveraging trusted software distribution channels to deploy advanced Web3 wallet hijacking code.