<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>News on TeraLevel</title><link>https://www.teralevel.com/en/news/</link><description>Recent content in News on TeraLevel</description><language>en-US</language><webMaster>info@teralevel.com (TeraLevel)</webMaster><lastBuildDate>Thu, 19 Feb 2026 10:00:00 +0000</lastBuildDate><atom:link href="https://www.teralevel.com/en/news/index.xml" rel="self" type="application/rss+xml"/><item><title>NIS2 and DORA: the path from regulation to operational maturity</title><link>https://www.teralevel.com/en/news/2026/02/nis2-dora-path-operational-maturity/</link><pubDate>Thu, 19 Feb 2026 10:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2026/02/nis2-dora-path-operational-maturity/</guid><description><![CDATA[ &lt;h4 id=&#34;european-regulation-does-not-introduce-the-risk-but-it-requires-organisations-to-prove-they-can-manage-it&#34;&gt;European regulation does not introduce the risk, but it requires organisations to prove they can manage it.&lt;/h4&gt;
&lt;p&gt;In the previous articles of this series, we analysed the global landscape through the Global Cybersecurity Outlook 2026 and the Spanish 2025 INCIBE report. Both confirmed the same trend: cyber risk is already systemic and operational.&lt;/p&gt;
&lt;p&gt;With &lt;strong&gt;NIS2&lt;/strong&gt; and &lt;strong&gt;DORA&lt;/strong&gt;, that diagnosis becomes a concrete requirement: organisations must demonstrate real capability to manage, respond to and recover from incidents.&lt;/p&gt; ]]></description></item><item><title>Cyber resilience in Spain: from global risk to operational reality</title><link>https://www.teralevel.com/en/news/2026/02/cyber-resilience-spain-incibe-2025-nis2/</link><pubDate>Tue, 10 Feb 2026 10:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2026/02/cyber-resilience-spain-incibe-2025-nis2/</guid><description><![CDATA[ &lt;h4 id=&#34;if-the-world-economic-forum-described-systemic-cyber-risk-at-a-global-level-spains-data-shows-that-this-risk-is-already-operational&#34;&gt;If the World Economic Forum described systemic cyber risk at a global level, Spain’s data shows that this risk is already operational.&lt;/h4&gt;
&lt;p&gt;In our previous article, we examined the international context based on the Global Cybersecurity Outlook 2026. The &lt;strong&gt;2025 Cybersecurity Balance published by INCIBE&lt;/strong&gt; confirms that these trends are now visible at the national level.&lt;/p&gt;
&lt;p&gt;In 2025, INCIBE managed &lt;strong&gt;122,223 cybersecurity incidents&lt;/strong&gt;, a 26% increase compared to 2024, and identified &lt;strong&gt;237,028 vulnerable systems&lt;/strong&gt;. The scale is no longer marginal — it is structural.&lt;/p&gt; ]]></description></item><item><title>Cyber resilience in 2026: from technical risk to systemic risk</title><link>https://www.teralevel.com/en/news/2026/01/cyber-resilience-systemic-risk-2026/</link><pubDate>Fri, 30 Jan 2026 10:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2026/01/cyber-resilience-systemic-risk-2026/</guid><description><![CDATA[ &lt;h4 id=&#34;cybersecurity-is-no-longer-a-purely-technical-issue--it-has-become-a-systemic-risk&#34;&gt;Cybersecurity is no longer a purely technical issue — it has become a systemic risk.&lt;/h4&gt;
&lt;p&gt;The &lt;strong&gt;Global Cybersecurity Outlook 2026&lt;/strong&gt;, published by the &lt;em&gt;World Economic Forum&lt;/em&gt;, outlines a landscape in which cyber incidents no longer affect individual organizations in isolation. Instead, they propagate across entire ecosystems: supply chains, critical infrastructures, and essential services. The combined effects of &lt;strong&gt;artificial intelligence&lt;/strong&gt;, geopolitical fragmentation, and growing reliance on cloud platforms are amplifying the impact of every failure.&lt;/p&gt; ]]></description></item><item><title>SRE and cloud architecture: designing reliability from the ground up</title><link>https://www.teralevel.com/en/news/2026/01/sre-cloud-hybrid-architecture/</link><pubDate>Tue, 20 Jan 2026 10:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2026/01/sre-cloud-hybrid-architecture/</guid><description><![CDATA[ &lt;h4 id=&#34;reliability-is-not-added-at-the-end-of-a-project-it-is-decided-in-the-architecture&#34;&gt;Reliability is not added at the end of a project: it is decided in the architecture.&lt;/h4&gt;
&lt;p&gt;At TeraLevel, we have approached &lt;em&gt;Site Reliability Engineering&lt;/em&gt; from three complementary perspectives. We first explored its conceptual foundations in &lt;strong&gt;&lt;a href=&#34;https://www.teralevel.com/en/news/2025/11/sre-7-principles/&#34;&gt;7 principles of Site Reliability Engineering (SRE)&lt;/a&gt;&lt;/strong&gt;. We then examined how those principles can be applied consistently in real production environments in &lt;strong&gt;&lt;a href=&#34;https://www.teralevel.com/en/news/2025/12/sre-practices-production/&#34;&gt;Applying SRE in production: effective practices, common pitfalls, and key metrics&lt;/a&gt;&lt;/strong&gt;. This article completes the series by addressing the third essential dimension: &lt;strong&gt;how architecture ultimately determines whether SRE can be sustained in cloud and hybrid environments&lt;/strong&gt;.&lt;/p&gt; ]]></description></item><item><title>Applying SRE in production: effective practices, common pitfalls, and key metrics</title><link>https://www.teralevel.com/en/news/2025/12/sre-practices-production/</link><pubDate>Tue, 30 Dec 2025 14:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2025/12/sre-practices-production/</guid><description><![CDATA[ &lt;h4 id=&#34;applying-sre-principles-in-practice-is-where-their-effectiveness-in-production-is-truly-determined&#34;&gt;Applying SRE principles in practice is where their effectiveness in production is truly determined.&lt;/h4&gt;
&lt;p&gt;At TeraLevel, we previously published &lt;strong&gt;&lt;a href=&#34;https://www.teralevel.com/es/noticias/2025/11/sre-7-principios/&#34;&gt;7 principles of Site Reliability Engineering (SRE)&lt;/a&gt;&lt;/strong&gt;, where we reviewed the foundations of &lt;em&gt;Site Reliability Engineering&lt;/em&gt; based on IBM’s perspective on SRE. That article focused on the conceptual baseline—the “what” of reliability in production. This piece addresses the “how”: applying those principles consistently in real-world environments, drawing on operational experience and on the guidance IBM provides in its &lt;strong&gt;&lt;a href=&#34;https://www.ibm.com/es-es/think/insights/sre-principles&#34;&gt;analysis of SRE principles&lt;/a&gt;&lt;/strong&gt;.&lt;/p&gt; ]]></description></item><item><title>2025 Report The cybersecurity paradox: More tools same risks</title><link>https://www.teralevel.com/en/news/2025/12/security-paradox-complexity/</link><pubDate>Thu, 18 Dec 2025 18:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2025/12/security-paradox-complexity/</guid><description><![CDATA[ &lt;h4 id=&#34;the-myth-of-more-is-better-in-cybersecurity&#34;&gt;The Myth of &amp;ldquo;More is Better&amp;rdquo; in Cybersecurity&lt;/h4&gt;
&lt;p&gt;The recent &lt;em&gt;State of Pentesting 2025&lt;/em&gt; report has put numbers to an uncomfortable reality for many tech leaders: accumulating security software does not guarantee immunity. According to survey data, &lt;strong&gt;67% of US enterprises experienced a security breach in the past 24 months&lt;/strong&gt;, even though budgets and tools continue to grow.&lt;/p&gt;
&lt;p&gt;The data reveals a worrying correlation between complexity and responsiveness:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Tool Saturation:&lt;/strong&gt; The average number of security tools in an enterprise is &lt;strong&gt;75 distinct solutions&lt;/strong&gt; , and in large corporations, this number keeps growing.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Alert Fatigue:&lt;/strong&gt; Organizations with over 100 tools face an average of &lt;strong&gt;3,074 weekly alerts&lt;/strong&gt;. This volume of noise makes it humanly impossible to prioritize real threats over false positives.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Real Impact:&lt;/strong&gt; Of those who suffered a breach, 76% reported an impact on data confidentiality or availability, including unplanned downtime and financial loss.&lt;/li&gt;
&lt;/ol&gt;
&lt;h4 id=&#34;simplify-to-protect-the-teralevel-approach&#34;&gt;Simplify to Protect: The TeraLevel Approach&lt;/h4&gt;
&lt;p&gt;At TeraLevel, we believe security shouldn&amp;rsquo;t be measured by the weight of the tech stack, but by the efficiency of its implementation. The &lt;strong&gt;&amp;ldquo;alert fatigue&amp;rdquo;&lt;/strong&gt; described in the report is a classic symptom of a fragmented and reactive infrastructure.&lt;/p&gt; ]]></description></item><item><title>FBI confirms 630 million stolen passwords and its corporate impact</title><link>https://www.teralevel.com/en/news/2025/12/fbi-confirms-stolen-passwords/</link><pubDate>Tue, 16 Dec 2025 18:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2025/12/fbi-confirms-stolen-passwords/</guid><description><![CDATA[ &lt;h4 id=&#34;a-massive-breach-redefining-access-risk&#34;&gt;A Massive Breach Redefining Access Risk&lt;/h4&gt;
&lt;p&gt;The recent confirmation by the FBI regarding the seizure of devices belonging to a single hacker has shaken the cybersecurity landscape. As reported by Forbes, &lt;strong&gt;630 million compromised passwords&lt;/strong&gt; have been recovered and handed over to the &amp;ldquo;Have I Been Pwned&amp;rdquo; (HIBP) service for public identification.&lt;/p&gt;
&lt;p&gt;What is alarming about this news is not just the volume, but the source and the &amp;ldquo;freshness&amp;rdquo; of the data:&lt;/p&gt; ]]></description></item><item><title>Cisco Warns of Critical RCE Vulnerability in React and Next.js</title><link>https://www.teralevel.com/en/news/2025/12/cisco-react-nextjs-rce/</link><pubDate>Mon, 15 Dec 2025 18:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2025/12/cisco-react-nextjs-rce/</guid><description><![CDATA[ &lt;h4 id=&#34;red-alert-react2shell-threatens-web-applications&#34;&gt;Red Alert: &amp;ldquo;React2Shell&amp;rdquo; Threatens Web Applications&lt;/h4&gt;
&lt;p&gt;As reported by &lt;a href=&#34;https://unaaldia.hispasec.com/2025/12/cisco-publica-un-aviso-de-seguridad-sobre-una-vulnerabilidad-critica-de-ejecucion-remota-en-react-y-next-js-cve-2025-55182.html/amp&#34;&gt;Hispasec based on the Cisco advisory&lt;/a&gt;, we are facing one of the most severe vulnerabilities of the year: &lt;strong&gt;CVE-2025-55182&lt;/strong&gt;. With a CVSS score of 10.0, this flaw allows Remote Code Execution (RCE) without authentication on servers running modern React and Next.js components.&lt;/p&gt;
&lt;p&gt;The situation is critical due to the widespread adoption of these frameworks. It is estimated that up to 40% of cloud environments could be affected. Advanced threat groups are already actively exploiting this flaw (known as &amp;ldquo;React2Shell&amp;rdquo;) to compromise infrastructures, leveraging insecure deserialization in the React Server Components Flight protocol.&lt;/p&gt; ]]></description></item><item><title>Npm Malware Uses Prompt Injection to Bypass Cybersecurity AIs</title><link>https://www.teralevel.com/en/news/2025/12/npm-malware-prompt-injection/</link><pubDate>Mon, 15 Dec 2025 18:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2025/12/npm-malware-prompt-injection/</guid><description><![CDATA[ &lt;h4 id=&#34;a-twist-in-supply-chain-security&#34;&gt;A Twist in Supply Chain Security&lt;/h4&gt;
&lt;p&gt;As reported by &lt;a href=&#34;https://unaaldia.hispasec.com/2025/12/alerta-roja-en-npm-malware-utiliza-prompts-ocultos-para-burlar-a-las-ias-de-ciberseguridad.html/amp&#34;&gt;Hispasec&lt;/a&gt;, Koi Security has revealed a worrying evolution in software supply chain attacks. A malicious package has been detected in the npm registry, named &lt;code&gt;eslint-plugin-unicorn-ts-2&lt;/code&gt;, introducing a novel evasion technique: hidden instructions designed to manipulate Artificial Intelligence-based security scanners.&lt;/p&gt;
&lt;p&gt;Unlike traditional code obfuscation methods, this malware includes blocks of inert text with specific instructions for Large Language Models (LLMs). Through &amp;ldquo;Prompt Injection&amp;rdquo; techniques, the code asks the security AI to ignore the malicious content and flag it as benign, attempting to override the judgment of modern automated defense tools.&lt;/p&gt; ]]></description></item><item><title>OWASP Releases Top 10 risks for Agentic AI Security</title><link>https://www.teralevel.com/en/news/2025/12/owasp-agentic-ai-top10/</link><pubDate>Mon, 15 Dec 2025 18:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2025/12/owasp-agentic-ai-top10/</guid><description><![CDATA[ &lt;h4 id=&#34;when-ai-moves-from-speaking-to-acting-new-security-challenges&#34;&gt;When AI Moves from &amp;ldquo;Speaking&amp;rdquo; to &amp;ldquo;Acting&amp;rdquo;: New Security Challenges&lt;/h4&gt;
&lt;p&gt;The global cybersecurity community has taken a crucial step this week. As reported by &lt;a href=&#34;https://www.prnewswire.com/news-releases/owasp-genai-security-project-releases-top-10-risks-and-mitigations-for-agentic-ai-security-302637364.html&#34;&gt;PR Newswire&lt;/a&gt;, the &lt;strong&gt;OWASP GenAI Security Project&lt;/strong&gt; has officially released the &amp;ldquo;Top 10 for Agentic Applications.&amp;rdquo; This document is the result of over a year of research with collaboration from bodies such as NIST and the European Commission.&lt;/p&gt;
&lt;p&gt;The distinction is vital: while the LLM Top 10 focused on text response manipulation, this new list addresses the risks of &lt;strong&gt;Autonomous Agents&lt;/strong&gt; (Agentic AI). These systems do not just generate content; they make decisions, use tools, and execute actions within enterprise infrastructure. Risks such as &amp;ldquo;Agent Behavior Hijacking&amp;rdquo; or &amp;ldquo;Tool Misuse&amp;rdquo; transform AI into an active attack vector within the corporate perimeter.&lt;/p&gt; ]]></description></item><item><title>Shai Hulud V2: The Sophisticated Attack Testing The Security Of GitHub Actions Workflows</title><link>https://www.teralevel.com/en/news/2025/12/shai-hulud-v2-github-actions-attack/</link><pubDate>Tue, 09 Dec 2025 18:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2025/12/shai-hulud-v2-github-actions-attack/</guid><description><![CDATA[ &lt;h4 id=&#34;the-shai-hulud-v2-attack-and-the-supply-chain&#34;&gt;The &amp;ldquo;Shai Hulud v2&amp;rdquo; Attack and the Supply Chain&lt;/h4&gt;
&lt;p&gt;The &lt;strong&gt;&amp;ldquo;Shai Hulud v2&amp;rdquo;&lt;/strong&gt; malware campaign marks a turning point in supply chain attacks, compromising hundreds of packages across the npm and Maven ecosystems. This incident underscores the growing sophistication of threats that directly target development infrastructure.&lt;/p&gt;
&lt;p&gt;Its main attack vector is the exploitation of &lt;strong&gt;GitHub Actions Workflows&lt;/strong&gt;, abusing the &lt;code&gt;pull_request_target&lt;/code&gt; trigger to inject malicious code into critical repositories. The malware employs a stealthy two-stage infection process: an initial script that installs the Bun runtime, followed by an obfuscated payload that operates without leaving traces in build logs.&lt;/p&gt; ]]></description></item><item><title>The Top 10 AWS re:Invent 2025 Cloud Operations Announcements</title><link>https://www.teralevel.com/en/news/2025/12/aws-reinvent-2025-cloud-operations/</link><pubDate>Tue, 09 Dec 2025 18:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2025/12/aws-reinvent-2025-cloud-operations/</guid><description><![CDATA[ &lt;h4 id=&#34;key-aws-cloud-operations-innovations&#34;&gt;Key AWS Cloud Operations Innovations&lt;/h4&gt;
&lt;p&gt;AWS re:Invent 2025 marked a significant leap in Cloud Operations capabilities, focusing on &lt;strong&gt;generative AI observability&lt;/strong&gt; and &lt;strong&gt;accelerated incident resolution&lt;/strong&gt; through Artificial Intelligence (AIOps). These announcements directly address the challenge of managing complexity and the exponential data volume in the modern cloud environment.&lt;/p&gt;
&lt;p&gt;The core innovations focus on:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;AI Observability:&lt;/strong&gt; CloudWatch now offers detailed insights into generative AI workloads (latency, token usage) and traceability of agent workflows (Amazon Bedrock, LangChain), requiring no manual instrumentation.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;AIOps and Incident Management:&lt;/strong&gt; CloudWatch Investigations now integrates &lt;strong&gt;automated incident report generation&lt;/strong&gt; and &lt;strong&gt;“5 Whys” analysis&lt;/strong&gt; based on the AWS COE methodology, transforming reactive response into continuous improvement.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Data Centralization:&lt;/strong&gt; New cross-account and cross-region capabilities were announced to centralize logs (CloudTrail, CloudWatch Logs) and database metrics, simplifying management and reducing ingestion costs.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;DevOps Integration:&lt;/strong&gt; CloudWatch Application Signals added a &lt;strong&gt;GitHub Action&lt;/strong&gt; to embed observability directly into pull requests and CI/CD pipelines, enabling developers to identify performance regressions within their development environment.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;These tools aim to increase efficiency, reduce operational complexity, and empower teams to manage complex distributed systems.&lt;/p&gt; ]]></description></item><item><title>OpenVPN Releases Critical Patches Addressing DoS and Security Bypass Vulnerabilities</title><link>https://www.teralevel.com/en/news/2025/12/openvpn-vulnerabilities-dos-bypass-security/</link><pubDate>Tue, 09 Dec 2025 00:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2025/12/openvpn-vulnerabilities-dos-bypass-security/</guid><description><![CDATA[ &lt;h4 id=&#34;critical-alert-in-openvpn-dos-and-security-bypass&#34;&gt;Critical Alert in OpenVPN: DoS and Security Bypass&lt;/h4&gt;
&lt;p&gt;OpenVPN has issued a critical alert requiring immediate attention from all administrators. The new stable (2.6.17) and development (2.7_rc3) versions fix three significant vulnerabilities that jeopardize the availability and security of VPN connections.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Key Vulnerabilities Include:&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th style=&#34;text-align: left&#34;&gt;CVE ID&lt;/th&gt;
          &lt;th style=&#34;text-align: left&#34;&gt;Primary Impact&lt;/th&gt;
          &lt;th style=&#34;text-align: left&#34;&gt;Affected Branches&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;strong&gt;CVE-2025-13751&lt;/strong&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;Local Denial-of-Service (DoS). Causes complete service crash in Windows environments.&lt;/td&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;2.6 and 2.7 (rc2)&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;strong&gt;CVE-2025-13086&lt;/strong&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;Security Bypass in HMAC verification. Allows attackers to open TLS sessions without source IP validation.&lt;/td&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;2.6 (up to 2.6.15)&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;strong&gt;CVE-2025-12106&lt;/strong&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;Memory Safety issue (Buffer Over-read) in IPv6 handling.&lt;/td&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;2.7 branch only (rc1)&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;The most serious flaw for perimeter security is &lt;strong&gt;CVE-2025-13086&lt;/strong&gt;, which effectively nullifies the HMAC cookie validation during the three-way handshake. This allows malicious actors to bypass the initial check and consume server resources without a legitimate connection. Administrators must immediately migrate to the patched versions to restore service integrity and stability, especially in critical infrastructures that rely on OpenVPN for secure remote access.&lt;/p&gt; ]]></description></item><item><title>Heading to 2026: AI, Green IT, and Cybersecurity in Spanish business</title><link>https://www.teralevel.com/en/news/2025/12/tech-trends-spanish-companies-2026/</link><pubDate>Mon, 01 Dec 2025 18:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2025/12/tech-trends-spanish-companies-2026/</guid><description><![CDATA[ &lt;h4 id=&#34;the-2026-horizon-innovation-with-purpose&#34;&gt;The 2026 Horizon: Innovation with Purpose&lt;/h4&gt;
&lt;p&gt;The recent report &lt;em&gt;&amp;ldquo;Trends 2026: Technologies that Drive, People who Transform&amp;rdquo;&lt;/em&gt; by Experis, highlighted by Infobae and Europa Press, outlines a scenario where technology ceases to be an end and becomes a strategic means. For Spanish companies, success will no longer depend solely on adopting tools, but on how they are integrated ethically and sustainably.&lt;/p&gt;
&lt;p&gt;The study highlights six fundamental pillars that will mark the business roadmap:&lt;/p&gt; ]]></description></item><item><title>International Information Security Day: A collective digital shield</title><link>https://www.teralevel.com/en/news/2025/12/infosec-day-2025/</link><pubDate>Mon, 01 Dec 2025 18:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2025/12/infosec-day-2025/</guid><description><![CDATA[ &lt;h4 id=&#34;the-evolution-of-cyber-awareness&#34;&gt;The Evolution of Cyber Awareness&lt;/h4&gt;
&lt;p&gt;Since 1988, following the &amp;ldquo;Morris Worm&amp;rdquo; incident, &lt;strong&gt;International Information Security Day&lt;/strong&gt; reminds us that data protection is not optional, but a structural necessity. Cybersecurity has evolved from a technical niche into a pillar of national and corporate security.&lt;/p&gt;
&lt;h4 id=&#34;key-highlights-of-the-2025-celebration&#34;&gt;Key Highlights of the 2025 Celebration&lt;/h4&gt;
&lt;p&gt;The Department of National Security (DSN) and entities like CCN-CERT have focused this year on collaboration and preventive culture:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Flagship Event:&lt;/strong&gt; The XIX STIC CCN-CERT Days (held November 26-28 in Madrid) gathered experts from 42 countries under the motto &lt;em&gt;&amp;ldquo;A digital shield for an interconnected Spain.&amp;rdquo;&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Available Resources:&lt;/strong&gt; INCIBE reinforces its support with the 017 helpline and best practice guides for companies and citizens.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Legal Framework:&lt;/strong&gt; The National Security Strategy identifies technology and infrastructure as strategic assets requiring a multidisciplinary approach.&lt;/li&gt;
&lt;/ul&gt;
&lt;table&gt;
  &lt;thead&gt;
      &lt;tr&gt;
          &lt;th style=&#34;text-align: left&#34;&gt;Entity&lt;/th&gt;
          &lt;th style=&#34;text-align: left&#34;&gt;Main Role&lt;/th&gt;
          &lt;th style=&#34;text-align: left&#34;&gt;2025 Objective&lt;/th&gt;
      &lt;/tr&gt;
  &lt;/thead&gt;
  &lt;tbody&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;strong&gt;DSN&lt;/strong&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;Strategy &amp;amp; Legal Framework&lt;/td&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;Foster a National Security Culture.&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;strong&gt;CCN-CERT&lt;/strong&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;Incident Management&lt;/td&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;Create an interconnected &amp;ldquo;Digital Shield.&amp;rdquo;&lt;/td&gt;
      &lt;/tr&gt;
      &lt;tr&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;&lt;strong&gt;INCIBE&lt;/strong&gt;&lt;/td&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;Awareness &amp;amp; Support&lt;/td&gt;
          &lt;td style=&#34;text-align: left&#34;&gt;Protection of citizens and the private sector.&lt;/td&gt;
      &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;
&lt;hr&gt;
&lt;h4 id=&#34;from-compliance-to-resilience&#34;&gt;From Compliance to Resilience&lt;/h4&gt;
&lt;p&gt;The news highlights a fundamental concept: the &lt;strong&gt;&amp;ldquo;Digital Shield.&amp;rdquo;&lt;/strong&gt; In today&amp;rsquo;s corporate environment, this shield is not built with firewalls alone, but with intelligent and proactive architecture. The DSN&amp;rsquo;s call for &amp;ldquo;collective responsibility&amp;rdquo; resonates directly with our work philosophy.&lt;/p&gt; ]]></description></item><item><title>7 Principles of Site Reliability Engineering (SRE)</title><link>https://www.teralevel.com/en/news/2025/11/sre-7-principles/</link><pubDate>Fri, 28 Nov 2025 18:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2025/11/sre-7-principles/</guid><description><![CDATA[ &lt;p&gt;&lt;strong&gt;Site Reliability Engineering (SRE)&lt;/strong&gt; is an increasingly critical discipline in the modern DevOps environment. Originated at Google in 2003, this methodology proposes treating operations as if they were software problems. According to a recent article published by &lt;strong&gt;IBM&lt;/strong&gt;, there are seven fundamental principles that guide teams toward operational success.&lt;/p&gt;
&lt;p&gt;It is important to highlight that, according to the authors of Google&amp;rsquo;s SRE guide, &lt;strong&gt;between 40% and 90% of the total costs of a system are incurred after its creation&lt;/strong&gt;. Therefore, SRE focuses on maximizing the utility and stability of the product throughout its lifespan.&lt;/p&gt; ]]></description></item><item><title>Cloud and DevOps trends 2025 AI Agents and Platform Engineering</title><link>https://www.teralevel.com/en/news/2025/11/infoq-cloud-devops-trends-2025/</link><pubDate>Fri, 28 Nov 2025 18:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2025/11/infoq-cloud-devops-trends-2025/</guid><description><![CDATA[ &lt;p&gt;The technology landscape is at a turning point where artificial intelligence is moving from conversational to executive, and where enterprises are looking to consolidate their tools in the face of growing complexity. The &lt;strong&gt;InfoQ Cloud and DevOps Trends Report 2025&lt;/strong&gt; offers a detailed view on which technologies are crossing the chasm into mass adoption and which are emerging as disruptive innovations.&lt;/p&gt;
&lt;p&gt;Below, we analyze the key highlights of this report.&lt;/p&gt; ]]></description></item><item><title>Would your business survive a Black Friday cyberattack?</title><link>https://www.teralevel.com/en/news/2025/11/business-survive-black-friday-cyberattack/</link><pubDate>Tue, 25 Nov 2025 18:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2025/11/business-survive-black-friday-cyberattack/</guid><description><![CDATA[ &lt;p&gt;&lt;strong&gt;Black Friday&lt;/strong&gt; and &lt;strong&gt;Cyber Monday&lt;/strong&gt; make or break the year for retailers. Sales soar and carts fill, but the same things that drive growth also draw in malefactors. According to a recent analysis by &lt;strong&gt;Thales&lt;/strong&gt;, every click or login is an opportunity for cybercriminals to slip unnoticed into systems full of sensitive data.&lt;/p&gt;
&lt;p&gt;If your retail business went offline during Thanksgiving weekend, how long would it take to recover? The loss of trust and money could be devastating.&lt;/p&gt; ]]></description></item><item><title>CNCF retires the Ingress Nginx Controller for Kubernetes</title><link>https://www.teralevel.com/en/news/2025/11/cncf-retires-ingress-nginx/</link><pubDate>Mon, 24 Nov 2025 18:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2025/11/cncf-retires-ingress-nginx/</guid><description><![CDATA[ &lt;h4 id=&#34;the-end-of-an-era-for-ingress-nginx&#34;&gt;The End of an Era for Ingress Nginx&lt;/h4&gt;
&lt;p&gt;The Cloud Native Computing Foundation (CNCF) has officially announced the retirement of the &lt;strong&gt;Ingress Nginx Controller&lt;/strong&gt; for Kubernetes. The deadline is set for &lt;strong&gt;March 2026&lt;/strong&gt;. After this date, the software will no longer receive support, security updates, or bug fixes, meaning any continued use will be at the user&amp;rsquo;s own risk.&lt;/p&gt;
&lt;h4 id=&#34;why-the-change&#34;&gt;Why the Change?&lt;/h4&gt;
&lt;p&gt;The decision is driven by several critical factors:&lt;/p&gt; ]]></description></item><item><title>Critical Alert: RCE Vulnerability in Fortinet FortiWeb</title><link>https://www.teralevel.com/en/news/2025/11/fortiweb-vulnerability-cve-2025/</link><pubDate>Tue, 18 Nov 2025 18:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2025/11/fortiweb-vulnerability-cve-2025/</guid><description><![CDATA[ &lt;h4 id=&#34;the-gatekeeper-compromised&#34;&gt;The Gatekeeper Compromised&lt;/h4&gt;
&lt;p&gt;Fortinet has released a high-priority security advisory regarding its Web Application Firewall (WAF) solution, &lt;strong&gt;FortiWeb&lt;/strong&gt;. A critical vulnerability (identified as &lt;strong&gt;CVE-2025-64446&lt;/strong&gt;) has been discovered that could allow an attacker to take full control of the device without needing a username or password.&lt;/p&gt;
&lt;p&gt;The flaw is described as a &lt;em&gt;Relative Path Traversal&lt;/em&gt;. By sending specifically crafted HTTP or HTTPS requests, a cybercriminal can bypass web directory restrictions and execute arbitrary commands on the underlying operating system with &lt;strong&gt;administrator&lt;/strong&gt; privileges.&lt;/p&gt; ]]></description></item><item><title>Active exploitation of two critical Windows vulnerabilities: One is a Multi-Year Zero-Day</title><link>https://www.teralevel.com/en/news/2025/11/two-windows-vulnerabilities-active-exploitation/</link><pubDate>Sat, 01 Nov 2025 18:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2025/11/two-windows-vulnerabilities-active-exploitation/</guid><description><![CDATA[ &lt;p&gt;Security researchers have issued a critical alert regarding the active and widespread exploitation of &lt;strong&gt;two serious Windows vulnerabilities&lt;/strong&gt;. Most worryingly, one of them is a zero-day (a flaw unknown to the vendor) that, according to investigations, has been used by attackers since &lt;strong&gt;2017&lt;/strong&gt;, and remains unpatched by Microsoft.&lt;/p&gt;
&lt;p&gt;The attacks are targeting a wide range of users and organizations, suggesting a coordinated, large-scale operation.&lt;/p&gt;
&lt;hr&gt;
&lt;h4 id=&#34;1-the-shortcut-zero-day-lnk---cve-2025-9491&#34;&gt;1. The Shortcut Zero-Day (&lt;code&gt;.lnk&lt;/code&gt;) - CVE-2025-9491&lt;/h4&gt;
&lt;p&gt;This flaw, now tracked as &lt;strong&gt;CVE-2025-9491&lt;/strong&gt;, resides in the binary format of &lt;strong&gt;Windows Shortcuts (.lnk)&lt;/strong&gt;, the component that enables fast access to applications or files.&lt;/p&gt; ]]></description></item><item><title>More than 86,000 downloads of malicious packages on NPM</title><link>https://www.teralevel.com/en/news/2025/10/npm-alert-malicious-packages/</link><pubDate>Thu, 30 Oct 2025 18:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2025/10/npm-alert-malicious-packages/</guid><description><![CDATA[ &lt;h4 id=&#34;critical-vulnerability-the-dark-side-of-code-dependencies&#34;&gt;Critical Vulnerability: The Dark Side of Code Dependencies&lt;/h4&gt;
&lt;p&gt;The modern development ecosystem, built on the use of repositories like &lt;strong&gt;NPM&lt;/strong&gt; (Node Package Manager), relies on trust and efficiency. However, a recent report from the security firm Koi has sounded the alarm, revealing a massive cyberattack campaign, tracked as &lt;strong&gt;PhantomRaven&lt;/strong&gt;, that has successfully compromised over &lt;strong&gt;126 malicious packages&lt;/strong&gt;. These packages have been downloaded &lt;strong&gt;more than 86,000 times&lt;/strong&gt; since August, largely flying under the radar.&lt;/p&gt; ]]></description></item><item><title>New Nation-State Attacks: Hackers distribute invisible malware from Blockchains</title><link>https://www.teralevel.com/en/news/2025/10/malware-on-blockchains-etherhiding/</link><pubDate>Fri, 17 Oct 2025 18:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2025/10/malware-on-blockchains-etherhiding/</guid><description><![CDATA[ &lt;h4 id=&#34;malware-moves-to-the-blockchain-introducing-the-etherhiding-technique&#34;&gt;Malware Moves to the Blockchain: Introducing the EtherHiding Technique&lt;/h4&gt;
&lt;p&gt;Google Threat Intelligence researchers have identified a concerning evolution in the threat landscape: hacker groups linked to nation-states (including the North Korean group &lt;strong&gt;UNC5342&lt;/strong&gt;) are using public cryptocurrency blockchains like &lt;strong&gt;Ethereum&lt;/strong&gt; and &lt;strong&gt;BNB Smart Chain&lt;/strong&gt; to host and distribute malware.&lt;/p&gt;
&lt;p&gt;This technique, dubbed &lt;strong&gt;EtherHiding&lt;/strong&gt;, represents the &lt;strong&gt;&amp;ldquo;next-generation of bulletproof hosting,&amp;rdquo;&lt;/strong&gt; offering attackers cheap and impossible-to-remove infrastructure.&lt;/p&gt;
&lt;hr&gt;
&lt;h4 id=&#34;what-makes-the-blockchain-bulletproof&#34;&gt;What Makes the Blockchain &amp;ldquo;Bulletproof&amp;rdquo;?&lt;/h4&gt;
&lt;p&gt;Traditionally, bulletproof hosting was located in countries without extradition treaties. EtherHiding leverages the fundamental properties of blockchain technology to achieve the same goal:&lt;/p&gt; ]]></description></item><item><title>Report: Full-Stack observability cuts downtime costs</title><link>https://www.teralevel.com/en/news/2025/10/full-stack-observability-cuts-downtime/</link><pubDate>Wed, 08 Oct 2025 18:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2025/10/full-stack-observability-cuts-downtime/</guid><description><![CDATA[ &lt;h4 id=&#34;the-sobering-cost-of-downtime&#34;&gt;The Sobering Cost of Downtime&lt;/h4&gt;
&lt;p&gt;The numbers are stark. A new global survey from New Relic pegs the median cost of a high-impact IT outage at &lt;strong&gt;$2 million per hour&lt;/strong&gt; (roughly $33,333 a minute), with a median annual hit of $76 million. This operational risk lands just as enterprises are layering in agentic and LLM-powered services, adding speed and complexity to already distributed stacks.&lt;/p&gt;
&lt;h4 id=&#34;the-full-stack-advantage&#34;&gt;The Full-Stack Advantage&lt;/h4&gt;
&lt;p&gt;One lever stands out: &lt;strong&gt;full-stack observability&lt;/strong&gt;. Defined as visibility spanning infrastructure, applications, security, digital experience (DEM), and logs, it offers tangible benefits:&lt;/p&gt; ]]></description></item><item><title>GitHub secures npm after 'Shai-Hulud' attack</title><link>https://www.teralevel.com/en/news/2025/09/github-secures-npm-shai-hulud/</link><pubDate>Sat, 27 Sep 2025 18:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2025/09/github-secures-npm-shai-hulud/</guid><description><![CDATA[ &lt;h4 id=&#34;the-attack-that-changed-everything&#34;&gt;The Attack That Changed Everything&lt;/h4&gt;
&lt;p&gt;The npm registry recently weathered one of its most sophisticated attacks. On September 14, 2025, the &lt;strong&gt;Shai-Hulud worm&lt;/strong&gt; infiltrated the JavaScript ecosystem by compromising maintainer accounts. Unlike typical malware, this worm was self-replicating, using post-install scripts to turn trusted packages into attack vectors. GitHub moved quickly to remove over 500 packages, but the damage highlighted a harsh reality: current authentication methods are insufficient.&lt;/p&gt;
&lt;h4 id=&#34;a-new-security-roadmap&#34;&gt;A New Security Roadmap&lt;/h4&gt;
&lt;p&gt;GitHub has announced immediate and drastic changes to secure the supply chain:&lt;/p&gt; ]]></description></item><item><title>New Cryptojacking campaign exploits DevOps Tools</title><link>https://www.teralevel.com/en/news/2025/09/cryptojacking-devops-jinx/</link><pubDate>Thu, 04 Sep 2025 18:00:00 +0000</pubDate><author>info@teralevel.com (TeraLevel)</author><guid>https://www.teralevel.com/en/news/2025/09/cryptojacking-devops-jinx/</guid><description><![CDATA[ &lt;h4 id=&#34;targeting-the-heart-of-development&#34;&gt;Targeting the Heart of Development&lt;/h4&gt;
&lt;p&gt;Security researchers at Wiz have uncovered a widespread attack dubbed &lt;strong&gt;JINX-0132&lt;/strong&gt;, representing a calculated shift in how threat actors target development environments. Unlike traditional attacks on end-users, this operation specifically targets the core technologies of DevOps workflows: &lt;strong&gt;HashiCorp Nomad, Consul, Gitea, and Docker API servers&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The campaign is notable for its stealth. Instead of custom malware, the attackers download legitimate tools (like standard releases of XMRig) directly from public GitHub repositories. By blending in with legitimate traffic and using trusted sources, they operate under the radar of many modern security tools.&lt;/p&gt; ]]></description></item></channel></rss>