Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Troubleshooting Cilium network policies: Four common pitfalls

Cilium network policies (CNPs) extend Kubernetes’ L3/L4 controls to the application layer (L7). CNPs provide teams with advanced networking capabilities, but they can also introduce new ways for connectivity to fail, especially in environments running thousands of workloads. Many of these issues stem from differences in how Kubernetes and Cilium interpret the same concepts, such as label scoping, IP-based rules, service identities, and how default-deny behavior is applied.

How to detect React2Shell attacks using network-based threat hunting

How do you find React2Shell vulnerabilities or detect React2Shell attacks in real environments? In this video, Corelight cloud security researcher David Burkett walks through how to threat hunt React2Shell by focusing on post-exploitation behavior at the network level. Instead of relying on exploit signatures, the approach uses application baselining and network traffic analysis to identify abnormal behavior.

Why Network Validation Matters and Why GigaOm Names Forward Networks as a Leader and an Outperformer

Enterprise networks are highly dynamic environments. They span campuses, data centers, and multiple clouds, requiring constant maintenance. Configuration updates, security policies, patches, capacity shifts, and automation-driven enhancements occur continuously. At this scale and velocity, every change carries risk unless it is verified against intended network behavior.

Hidden Costs That Eat Your AWS Credits Faster Than You Expect

You finally land a big pile of AWS credits. Maybe $10,000 from AWS, or even close to $100,000 through a startup program. It feels like someone gave you an unlimited cloud card. For a few weeks, life is good. You launch new services, spin up bigger instances, create extra test environments, and nobody worries about the bill. Then one morning you open the AWS console and see this: credits almost gone, real charges starting next month.

What Is a Prop Firm and How Technology Ensures Secure Trading

In today's fast-paced financial markets, professional trading has evolved significantly, thanks to the rise of proprietary trading firms, commonly known as prop firms. These firms provide traders with the capital and resources necessary to trade financial instruments without risking their own money. But beyond the financial mechanics, technology plays a critical role in ensuring that trading within prop firms is secure, efficient, and transparent. This article explores what is a prop firm and the technological safeguards that protect both traders and firms in the digital era.

Cyberattack on the Sun: Threat Actors Manipulate Solar Panel Systems; Agentic AI Increases the Risk

Millions of homes, businesses, and hospitals depend on solar power, a clean and cost-effective source of renewable energy. Adoption has accelerated worldwide thanks to major government initiatives such as the Inflation Reduction Act (IRA) in the U.S., the Renewable Energy Directive (RED II) in the EU, the Smart Export Guarantee in the UK, and Australia’s Small-scale Renewable Energy Scheme (SRES). As clean energy infrastructure expands, a new vulnerability is emerging.

Arctic Wolf Observes Malicious SSO Logins on FortiGate Devices Following Disclosure of CVE-2025-59718 and CVE-2025-59719

In December 12, 2025, Arctic Wolf began observing intrusions involving malicious SSO logins on FortiGate appliances. Fortinet had previously released an advisory for two critical authentication bypass vulnerabilities (CVE-2025-59718 and CVE-2025-59719) on December 9, 2025. Arctic Wolf had also sent out a security bulletin for the vulnerabilities shortly thereafter.

Top 2025 Network and Cybersecurity awards honor Firewall Analyzer

We are excited to announce that ManageEngine Firewall Analyzer has been recognized with multiple prestigious industry awards across the Cybersecurity and Network Security categories. These honors reflect the trust and confidence our users place in Firewall Analyzer as their go-to solution for firewall management, security visibility, and compliance reporting.

Cato CTRL Threat Research: A Deep Dive into a New JSCEAL Infostealer Campaign

JSCEAL is an information stealer that’s been targeting users of cryptocurrency applications. As reported by Check Point Research (CPR) in July 2025, JSCEAL has developed into a more advanced form. In a new campaign observed by Cato CTRL in August 2025, JSCEAL has adopted a revamped command-and-control (C2) infrastructure, enhanced anti-analysis safeguards, and an updated script engine designed for increased stealth. The campaign remains active.