Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A10 Adds ThreatX API and Application Security to its Security Portfolio

A10 recently acquired ThreatX, a fully managed cloud-native application and API protection solution. Hear from A10's Jamison Utter and the co-founder and CPO of ThreatX, Bret Settle, about how this brings expanded capabilities to the A10's security portfolio and gives customers the flexibility to have protection wherever they want it, even in a hybrid environment.

Critical Middleware Vulnerability in Next.js (CVE-2025-29927)

Researchers have discovered a critical security vulnerability in Next.js that allows attackers to easily bypass middleware authorization measures. The vulnerability, designated CVE-2025-29927, was discovered by Rachid Allam and Yasser Allam and since assigned a base CVSS score of 9.1. By skipping checks for authorization cookies, attackers can potentially gain access to restricted areas of applications like admin tools and dashboards.

World Backup Day : Backup Your Data Before It's Too Late!

Imagine waking up one day to find all your business files, customer records, or personal memories gone—forever. No warning, no way to recover them. Scary, right? That’s why World Backup Day exists. It’s a reminder to businesses and individuals to protect their critical files before disaster strikes. On March 31st, take the time to back up your data and ensure your information is secure—because losing data is no joke.

EP 4 - AI-Powered Fraud: Redefining the Identity Threat Landscape

Imagine receiving an urgent email from your bank that looks perfectly legitimate. It warns you of a suspicious transaction and prompts you to verify your identity. You hesitate but click, and suddenly, your credentials are compromised. This scenario, crafted by AI-powered fraud-as-a-service, is happening now.

Kubernetes IngressNightmare Vulnerabilities: What You Need to Know

We would like to recognize Amit Serper, Travis Lowe, Tony Gore, Adrian Godoy, Mihai Vasilescu, Suraj Sahu, Pablo Ramos, Raj Jammalamadaka, Lacie Griffin, and Josh Grunzweig for their contributions in authoring this publication. CrowdStrike is committed to protecting our customers from the latest disclosed vulnerabilities. We are actively monitoring activity surrounding “IngressNightmare,” the name given to recently identified vulnerabilities in the Kubernetes (K8s) ingress-nginx controller.