Operations | Monitoring | ITSM | DevOps | Cloud

HAProxy Enterprise WAF Protects Against React2Shell (CVE-2025-55182)

On December 3, 2025, the React team announced a critical security vulnerability in React Server Components (RSC). Identified as CVE-2025-55182 (and covering the now-duplicate CVE-2025-66478), this flaw allows unauthenticated attackers to execute arbitrary JavaScript code on backend servers.

Getting started with Cursor and CircleCI: Adding AI to CI/CD workflows

AI coding assistants have transformed how developers write and debug code. But there’s a gap: these assistants often can’t see what’s happening in your CI/CD pipelines. When a build fails, you’re still stuck switching tabs, hunting through logs, and copying error messages back into your editor. What if your AI assistant could talk directly to CircleCI? In this tutorial, you’ll learn how to connect Cursor, an AI-powered code editor, to CircleCI using the CircleCI MCP server.

How telco companies can reduce 5G infrastructure costs with modern open source cloud-native technologies

5G continues to transform the telecommunications landscape, enabling massive device density, edge computing, and new enterprise use cases. However, operators still face significant cost pressures: from accelerating RAN modernization and 5G SA rollouts to energy demands and the shift to cloud-native network functions (CNFs). As telcos redesign their infrastructure strategies, open source has become a key lever to reduce costs, increase flexibility, and accelerate innovation.

New features: AI SRE, Merge alerts, and Status pages for thousands of services

As we head into the holiday season, the ilert team is doing the opposite of slowing down; we’re ramping up. Over the past weeks, we’ve shipped a wave of impactful improvements across alerting, AI-powered automation, mobile app, and status pages. From major upgrades that reshape how teams triage incidents to smaller refinements that remove daily friction, this release is packed with updates designed to make on-call and operations smoother, smarter, and faster. Let’s dive in.

Using Traces, Metrics, and Logs All in One Place, as Demonstrated by Pipeline Builder

When troubleshooting complex software, it’s important to be able to gain insight via its telemetry quickly and precisely. No one wants to waste time switching between tools or worrying about how to interact with different types of data. At Honeycomb, all your data is available in one place, accessible via our fast query engine. But what does that look like in practice?

DBA vs Developer Dynamics: Bridging the Gap with Database DevOps

Developer velocity and DBA caution are not opposing forces, they reflect two essential priorities that historically lacked a shared process. Database DevOps eliminates tension by introducing automated validation, approvals, and visibility that allow developers to move fast while DBAs safeguard performance and reliability. With platforms like Harness, database change becomes a collaborative workflow instead of a conflict, turning release cycles into a partnership built on trust and predictability.

Data Centre Security Checklist: Executive Oversight for Compliance & Continuity

Compliance requirements and rising risk standards have raised the stakes for data centre security. Without assurance that facilities can resist disruption and protect data, organisations face increased exposure to audit failure, downtime, and reputational damage. For executives and auditors, data centre security is part of wider governance and risk management. Oversight means confirming that physical safeguards, environmental systems, and compliance frameworks are in place and can be trusted.

Seeing Everything: Shedding Light on Shadow IT and AI Usage

I still remember the working with a leading insurance provider on an internal review of their IT estate and discovering a team quietly using an unapproved SaaS tool to speed up their reporting. It wasn’t malicious, they were trying to solve a problem faster. But as we stared at the dashboard, I could see the CIO’s mind racing: What data had they uploaded? Was it encrypted? Were they still compliant?

Perfect Forward Secrecy Made Your Private Keys Boring

For twenty years, a stolen private key was a disaster. It meant total compromise. Every encrypted conversation, password transmitted, API call ever made was readable. Traffic was being recorded all the time, “just in case” your private key leaked out. The NSA even had a name for it: “harvest now, decrypt later.” Record all the encrypted traffic today. Steal the private keys tomorrow. Decrypt everything retroactively.