Emerging Threat - Dell RecoverPoint for VMs Hardcoded Credential (CVE-2026-22769)

CVE-2026-22769 is a hardcoded credential vulnerability affecting Dell RecoverPoint for VMs, a disaster recovery orchestration platform used to manage replication and failover of virtualized workloads. The issue stems from static authentication credentials embedded within a product component. Because these credentials are not uniquely generated per deployment and cannot be changed by administrators, they introduce a structural authentication weakness.

Best Deployment Service for Kubernetes Security in 2026

Why do most Kubernetes security tools fail teams in practice? Because they treat deployment and security as separate problems. A true Kubernetes security deployment service embeds scanning, policy enforcement, and runtime monitoring directly into the deployment flow — so risky workloads never reach production in the first place. Why isn’t shift-left security enough on its own?

The Vendor Tiering Series: Why Tier Your Vendors

The thing about blanket approaches is that they rarely work or scale. The same holds true for third-party cyber risk management. Treating every provider, stakeholder, or partner with the same intensity is neither productive nor cost-effective. While defaulting to treating every vendor at the same risk level is common, it is not a resilient security strategy.

When Security Fails, Incident Response Decides Everything

The episode explores what happens after security fails, from inevitable incidents and one big ransomware hit away from collapse to money, media noise and decision power at 1 a.m. Viewers hear how poor planning burns cash without progress, why authority and rehearsal matter, and how psychology, struggle and resilience shape every response. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Non-human identities (NHIs) explained and how to secure them

Non-human identities are the fastest-growing and least-governed identity population in most environments. Service accounts, API keys, and AI agents run without MFA, without owners, and without expiration. Traditional identity and access management (IAM) wasn't built to manage them. Without governance for discovery, ownership, and lifecycle management, stale machine credentials become attacker footholds that persist for months.

Internet Exposure as a Critical Layer of Context in Vulnerability Management

During a recent video interview, we spent time unpacking a deceptively simple question: what actually makes a vulnerability critical? Severity scores, exploitability, and asset importance all factor into the answer. But one layer of context consistently changes the urgency of a finding more than most teams expect: internet exposure. The difference between a vulnerability that exists and one that matters often comes down to whether an attacker can reach it.

How One-Time Share Works in Keeper

Teams, friends and family members often need to share access to accounts, but traditional methods like email, text messages or screenshots expose sensitive information and create lasting risk. Keeper’s One-Time Share works by creating a secure, device-bound link that allows temporary access to a record while keeping credentials encrypted and fully protected. This approach enables fast, secure sharing without requiring the recipient to create a Keeper account or gain ongoing access to your vault.

CVE-2026-25639: Axios Vulnerability Triggers DoS in Node.js Applications

A newly disclosed vulnerability tracked as CVE-2026-25639 puts Node.js applications using Axios at risk of remote Denial-of-Service attacks. By sending a specially crafted configuration object, attackers can trigger a fatal runtime error inside Axios’s internal request handling logic, causing the Node.js process to crash instantly.

Why Your Security Stack Is Blocking AI (And How to Fix It)

Sr. Technical Content Strategist Hockey has a saying that describes the problem security organizations face when trying to integrate AI:"You have to skate to where the puck is going, not where it has been". Think of the modern security stack. It's a fragmented architecture built layer by layer over decades. Tools are siloed, some overlapping, some operating in black boxes, and others that no one remembers installing.