Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Docker Hardened Images are Free: Scale Their Adoption with JFrog

Securing your Docker containers just got a lot easier. On December 17, Docker announced that their catalog of over 1,000 Docker Hardened Images (DHI)—previously a premium-only feature—is now free and open source. This big change means every developer can now start their Dockerfile with a minimalist, near-zero CVE, SLSA Level 3 compliant foundation.

What is the Difference Between DevOps and DevSecOps?

For engineering managers, the pressure to deliver software faster has never been higher. You are constantly balancing the need for velocity with the imperative of stability and quality. While DevOps revolutionized the software development life cycle (SDLC) by breaking down silos between development and operations, it left a critical gap: security. In a landscape where cyberattacks are growing in sophistication and frequency, treating security as an afterthought is no longer a viable strategy.

How to Add Privacy to Your LangChain Agent in 3 Lines of Code

If you’re building with LangChain, you’re moving fast. That’s the point. Agents are pulling from tools, chaining prompts, summarizing documents, and responding to users in real time. But there’s a quiet truth many teams discover a little too late: Your agent is probably handling personal data—even if you didn’t design it to. Emails show up in prompts. Names appear in support tickets. Internal notes include phone numbers, IDs, or customer context.

Streamline Security Operations with Falcon for IT's Turnkey Automations

As IT environments grow more complex and adversaries move faster, security and IT teams need a reliable way to enforce configurations, maintain application health, and resolve issues at scale without writing or maintaining custom scripts. CrowdStrike Falcon for IT already gives operators powerful tools to query endpoints, run remediation, and enforce baseline configurations.

MongoBleed (CVE-2025-14847): Critical Unauthenticated MongoDB Memory Disclosure

A critical vulnerability identified as CVE-2025-14847 (dubbed “MongoBleed“) affects MongoDB Server instances, exposing systems to unauthenticated information disclosure. This vulnerability allows a remote attacker to read sensitive data from the server’s memory without requiring authentication.

Security Alert: CVE-2025-14847 MongoDB "MongoBleed" Actively Exploited

A high-severity vulnerability, CVE-2025-14847, affecting MongoDB Server is being actively exploited in the wild with a Bitsight Dynamic Vulnerability Exploit (DVE) score of 9.71. The flaw, commonly referred to as “MongoBleed,” is an unauthenticated memory-read vulnerability caused by improper handling of zlib-compressed network message headers, which may allow attackers to read uninitialized heap memory remotely.

The Holiday Whisper: Shai-Hulud 3.0

The end-of-year holiday period is traditionally a time for code freezes and quiet rotations; however, it is also a favored window for opportunistic attackers. Threat actors love the holidays; they know that with development teams out of the office and response times naturally lagging, a small window opens for them to test new exploits without immediate detection. Recently, a security researcher discovered a new, contained variant of Shai-Hulud, dubbed "The Golden Path" (v3.0).

Emerging Threat: CVE-2025-14733 - Authentication Bypass Vulnerability

CVE-2025-14733 is a high-severity authentication bypass vulnerability affecting a widely deployed enterprise web application platform used to manage administrative and API access. The flaw allows attackers to bypass authentication controls under specific conditions by manipulating request parameters and session handling logic.

What is MFA Fatigue and Bombing: A Brief Outlook

Your phone is bombarded with notifications each day. You accept, deny, read, ignore, or delete these notifications every day. The Business of Apps statistics state that on average, a US smartphone receives 46 app push notifications in one day. These notifications can be overwhelming and become repetitive after some time, and reach a point where you don’t even pay attention to them anymore. You tend to take action on the notification without thinking because it is an everyday task.