Configuring ESXi VM Networks

In the previous posts, we took a look at setting up VMkernel networks, including storage and vMotion. Now, we discuss configuring ESXi networks for the VMs themselves. VM networks provide connectivity of the VMs to the production network. Let’s walk through how these are configured. NAKIVO for VMware vSphere Backup Complete data protection for VMware vSphere VMs and instant recovery options. Secure backup targets onsite, offsite and in the cloud. Anti-ransomware features. DISCOVER SOLUTION.

Axios npm Package Compromised: Supply Chain Attack Delivers Cross-Platform RAT

On March 31, 2026, two malicious versions of axios, the enormously popular JavaScript HTTP client with over 100 million weekly downloads, were briefly published to npm via a compromised maintainer account. The packages contained a hidden dependency that deployed a cross-platform remote access trojan (RAT) to any machine that ran npm install (or equivalent in other package managers like Bun) during a two-hour window. The malicious versions (1.14.1 and 0.30.4) were removed from npm by 03:29 UTC.

Cyberattacks tied to conflict in Iran, open source exploit & AI espionage / Intel Chat [#306]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Emerging Threat: F5 BIG-IP Access Policy Manager Remote Code Execution (CVE-2025-53521)

CVE-2025-53521 is an unauthenticated remote code execution vulnerability in F5's BIG-IP Access Policy Manager (APM). The flaw exists in the apmd process, the daemon responsible for processing live access policy traffic, and is triggered when a BIG-IP APM access policy is configured on a virtual server and the system receives specific malicious traffic. No credentials are required to exploit it. The vulnerability carries a CVSS score of 9.8 and a CVSS score of 9.3.

7 tabletop exercise scenarios every cybersecurity team should practice in 2026

The world of cybersecurity is experiencing a shift as adversaries continue to refine their techniques. In 2025, cybersecurity teams will confront a host of new challenges that demand proactive and adaptive responses. Tabletop exercises offer an excellent opportunity to simulate incidents in a controlled environment, allowing teams to evaluate and improve their incident response plans.

The Case for an Independent MFA Layer in Microsoft Environments

The quiet shift no one talks about. Something happened over the past few years that most MSPs didn't plan for. Their customers moved to Microsoft 365, adopted Entra ID as their identity provider, and started using Microsoft Authenticator for MFA. It made sense at the time. It was simple, it was included in the license, and it worked. But somewhere along the way, a strategic decision was made by default. Microsoft became the identity provider, directory, credential store, and MFA provider. All at once.

World Backup Day: Don't Jump Without a Parachute

You would never jump out of an airplane with only a single parachute. If that main canopy fails, you need a reserve ready to deploy immediately. Yet, countless organizations operate their IT infrastructure every day without a reliable safety net for their most critical asset. They plunge into the digital landscape assuming their primary data storage will never fail. March 31 is World Backup Day, which serves as a crucial reminder to pack your digital parachute.

What is Configuration Drift? 5 Best Practices for Your Team's Security Posture

Security configurations are not static. They evolve over time due to software updates, policy changes, emergency patches, and human intervention. While these changes are often necessary, they can lead to configuration drift, a gradual misalignment between an organization’s security controls and its intended security policies.

Ransomware Protection Best Practices: Leveraging MDR and EDR in the Zero Trust Era

Ransomware attacks are on the rise. Their quiet nature is one of the main reasons why many organizations are unable to detect them. Ransomware attacks begin with something small, maybe a login at an unusual hour or a script running where it normally should not. There could be many more instances, which may not appear suspicious at first. By the time encryption begins, attackers have already moved deep into the environment.

Where AI in the SOC is actually delivering - and where it isn't

Where AI in the SOC is actually delivering — and where it isn’t“We’ll have a generation of security professionals who can supervise AI but can’t function without it." For all the noise surrounding “agentic AI” in cybersecurity, security operations centers are still wrestling with the same fundamental questions: What does AI genuinely improve today? Where does it fall short? How can organizations tell the difference?