Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

From Developer to Cybersecurity Without Certs - Ed Urbasius' Story | Secrets of AppSec Champions

As the cybersecurity industry grows, more professionals are breaking into security from nontraditional backgrounds. In this episode, Edvinous Urbasius, a former developer turned cybersecurity consultant, shares his unfiltered story of how he got into the field without certifications—and what he learned on the job in a SOC.

CVE-2025-4123: The Grafana Ghost Vulnerability that Enables Account Takeover

A new high-severity vulnerability, CVE-2025-4123, has been discovered in Grafana, a widely used open-source observability platform. Dubbed “The Grafana Ghost,” this vulnerability stems from an open redirect flaw that can lead to stored cross-site scripting (XSS), account takeover and server-side request forgery (SSRF). Despite the release of patched versions, over 46,000 vulnerable Grafana instances are still publicly exposed, underscoring the urgency for immediate mitigation.

Hiding in the Shadows: How Threats Exploit the Unprepared

Every 39 seconds, a cyberattack strikes – and most victims don’t see it coming. In today’s hyperconnected world, attackers no longer need to break in. They wait patiently in the dark corners of your network—undetected, automated, and already inside. NeoSystems’ recent webinar, “Hiding in the Shadows,” exposes this chilling reality and what it takes to shine a light on modern threats before they take hold.