Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security Update: Publicly Exposed Ingress NGINX Admission

A series of vulnerabilities, known as IngressNightmare (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974), have been identified in ingress-nginx, a widely used Kubernetes ingress controller. When exploited together, these vulnerabilities allow for configuration injection through the Validating Admission Controller.

Implementing Privileged Access Workstations: A Step-by-Step Guide

At a time when cyber threats seem to escalate daily, security teams are always on the lookout for new ways to protect their sensitive data and systems. For some, Privileged Access Workstations (PAWs) are being viewed as one solution to keep privileged accounts and critical systems safe from compromise. These are specialized workstations built for administrators and users who manage highly sensitive environments.

How to Build a Mature Vulnerability Management Program

The terms “patch management” and “vulnerability management“ are not the same. And that difference is a big difference. They may be confused because applying patches is one of the many ways to mitigate cyber risks. However, it is one piece of the entire vulnerability management puzzle and organizations that do not realize this are burdened with a false sense of security.

Understanding NTLM and Kerberos: Key Differences and Use Cases

Connecting all your company resources in a network for sharing is valuable, but you need a way to verify that only authorized users and devices can access these resources. Authentication serves this purpose by providing methods for users and devices to prove their identity. In Windows environments, two main authentication protocols are used: NTLM (New Technology LAN Manager) and Kerberos. In this article we will discuss NTLM vs Kerberos and show why it is important to implement Kerberos if possible.

Insider Risk with Nightfall DLP: Episode 2 - Managing Shadow AI

Earlier this year, security researchers found more than 1 million records, including user data and API keys, in an exposed DeepSeek database. This massive exposure event tells us that data exfiltration risk and AI proliferation are forever linked together: as AI tools grow in popularity and complexity, exfiltration risk rises in kind.

Adversary Tradecraft: Emulating Mustang Panda's Use of MAVInject in Recent Campaigns

In cybersecurity, the adage “what’s old is new” continues to hold true as attackers resurface longstanding techniques or repurpose them with new twists and adaptations. The popularization of Living Off the Land Binaries (LOLBins) — legitimate, Windows-native tools commonly abused for malicious uses — is a great example of this.

Security Bulletin: Critical Vulnerabilities in Kubernetes Ingress NGINX Controller

CVE-2025-1974 is a critical remote code execution (RCE) vulnerability in Kubernetes’ Ingress-NGINX Controller that allows unauthenticated attackers with network access to inject arbitrary NGINX configuration directives, potentially leading to full cluster compromise. Ingress-NGINX is a software-only ingress controller provided by the Kubernetes project. Because of its versatility and ease of use, ingress-nginx is quite popular: it is deployed in over 40% of Kubernetes clusters.

Does Higher Ed Mean Higher Risk? Why University Campuses Are Under Threat

Universities are built for openness, but that openness comes with a steep price. Higher education institutions face an average of 3,574 cyberattacks per week, the highest of any industry. With open networks, unmanaged devices, and critical research infrastructure, they have become a prime target for cybercriminals, nation-state actors, and ransomware groups.

Hunting with Elastic Security: Unmasking concealed artifacts with Elastic Stack insights

Attackers thrive in the shadows, using MITRE ATT&CK T1564 - Hide Artifacts to cloak their presence with hidden files, concealed processes, and manipulated registry keys. These stealth tactics allow adversaries to evade detection, persist undetected, and escalate their access — all while quietly exfiltrating data or disrupting operations. Imagine files, processes, and even user accounts disappearing in your environment without a trace.