Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CVE-2025-1974: Critical Unauthenticated RCE Vulnerability in Ingress NGINX for Kubernetes

On March 24, 2025, ingress-nginx maintainers released fixes for multiple vulnerabilities that could allow threat actors to take over Kubernetes clusters. Ingress is a Kubernetes feature that defines how workload Pods are exposed to the network, while an Ingress Controller implements those rules by configuring the necessary local or cloud resources. According to Kubernetes, ingress-nginx is deployed in over 40% of Kubernetes clusters.

The Howler - Episode 17: Kerri Shafer Page, Vice President of Incident Response

This month, we sit down with Kerri Shafer-Page, Vice President of Incident Response, as she shares a peak behind the curtain of the day-to-day of her and her team, reflections on being a woman in tech, and so much more! Kerri Shafer-Page serves as the Vice President of Digital Forensics and Incident Response at Arctic Wolf. A proven leader in threat identification, IT security and data privacy incident response and mitigation, Kerri has served in leadership roles at IBM and AIG, overseeing incident response and cybersecurity claims.

Alleged Oracle Cloud Supply Chain Attack: Six Million Records Stolen, 140K Companies Affected

On March 20, 2025, a Breach Forums user, “rose87168,” claimed to have stolen six million records from Oracle Cloud’s SSO and LDAP services and offered the data for sale or in exchange for zero-day exploits. Breach Forums is a known marketplace for cybercriminals to trade stolen data and exploits.

CVE-2025-23120: Critical Remote Code Execution Vulnerability in Veeam Backup & Replication

On March 19, 2025, Veeam published a security advisory for a critical severity vulnerability impacting their Backup & Replication software. The advisory did not provide technical details regarding the vulnerability, although it did mention that it could be exploited by authenticated domain users.

Widespread Fake CAPTCHA Campaign Delivering Malware

Arctic Wolf has recently observed a campaign in which threat actors are compromising widely used websites across various industries and embedding a fake CAPTCHA challenge. When victims visit the site, they are presented with the CAPTCHA challenge or redirected to a site that provides instructions, triggering PowerShell code execution and ultimately leading to the loading of information stealer malware.

Arctic Wolf Incident Response: Advanced Threat Detection

Explore how Arctic Wolf’s experienced IR team helps organizations respond to threats swiftly and effectively. From a threat intelligence perspective, the Arctic Wolf IR team is always on top of new and emerging threats, which allows them to help organizations detect and recover from threats faster and more effectively, regardless of the organization’s environment, location, or specific incident characteristics.

Arctic Wolf Incident Response: Experienced Technical Investigators

Explore how our multi-faceted team of experienced technical investigators handles every part of the IR process, from digital forensics to threat actor negotiation to remediation and recovery. Arctic Wolf offers a full-service IR experience, helping organizations around the globe respond to and recover faster from severe cyber incidents.

How to Get Started with Arctic Wolf Managed Security Awareness

In this demo, see how easy it is to set up and deploy Arctic Wolf's Managed Security Awareness so that your organization can quickly realize the value and work towards ending human risk. Learn more how Arctic Wolf Managed Security Awareness ends human risk by delivering 100% relevant microlearning content.

Arctic Wolf Incident Response: End-to-End Response and Recovery

Explore how Arctic Wolf Incident Response provides 24x7 support to our customers, providing expertise and action when they need it most. The Arctic Wolf IR solution offers a suite of in-house offerings, from digital forensics, to recovery, to threat actor negotiations and data mining. Arctic Wolf is able to come in with our skills and expertise to step up fast, secure the environment, and help organizations restore their environment with speed and efficiency -- all in-house.