RSS for Slack
Icon set with cloud symbols in red, blue, green, and yellow circles connected by lines in a curved layout. upwind is written in the top left corner.
Product

Visualize End-to-End Google Cloud Cross-Account Traffic with Upwind 

We are excited to introduce a major enhancement to the Upwind platform – comprehensive end-to-end traffic visibility across accounts and clusters in Google Cloud. For organizations that build cloud infrastructure hosted in Google Cloud, viewing cross-account and cross-cluster traffic can be a major challenge. Upwind’s latest release solves this problem, offering end-to-end visibility of resource […]

A pink and red gradient graphic with a target symbol at the center. Text reads: OpenSSH Vulnerabilities Enable Man-in-the-Middle and DoS Attacks (CVE-2025-26465 & CVE-2025-26466). The upwind logo is in the top right corner.
Research

OpenSSH Vulnerabilities CVE-2025-26465 and CVE-2025-26466 Enable Man-in-the-Middle and DoS Attacks

On February 18, 2025, two critical vulnerabilities were disclosed in OpenSSH, a widely used secure networking utility suite. These flaws, identified as CVE-2025-26465 and CVE-2025-26466, pose significant security risks: Discovery and Response The vulnerabilities were uncovered by the Qualys Threat Research Unit (TRU). They affect OpenSSH client versions 6.8p1 through 9.9p1 and 9.5p1 through 9.9p1, […]

A colorful flowchart with interconnected circles featuring icons, including a lock, globe, fingerprint, and gears. The chart branches into various paths, visually representing a complex data or process structure.
Product

Easily Prioritize Cloud Misconfigurations with Upwind

We are excited to introduce a new capability in the Upwind platform, automatically prioritizing cloud posture findings by severity based on real environmental variables: Under our Secure Configurations module. This is the first of many CSPM features coming from Upwind in the coming weeks, and it offers a powerful enhancement to posture management that automatically […]

Logos of Upwind, AWS, and Kubernetes on a white background with red diagonal stripes. The Upwind logo is in the top left corner.
Product

Upwind’s EKS Add-On Featured in AWS Marketplace Blog

In March 2024, we announced that Upwind is one of the few ISVs accepted as an AWS Marketplace add-on for Amazon Elastic Kubernetes Service (Amazon EKS). Now, Upwind has been featured by AWS – highlighting the deep runtime container security that Upwind’s EKS Add-on provides. Upwind’s EKS Add-on gives customers the ability to automatically deploy […]

A grid of light purple shopping bag icons with one prominent dark purple bag icon in the center. The word upwind is in the top left corner. The background is white with a mix of solid and outlined icons.
Product

Location and Paths Forensics for your Vulnerability Findings

We are excited to introduce a new functionality in the Upwind platform that directly addresses a key challenge in vulnerability management: quickly pinpointing the location of specific package versions. With this enhancement, you can now effortlessly track where your vulnerabilities reside, eliminating guesswork and speeding up your response time. Understanding the full impact and scope […]

Abstract geometric design with interlocking shapes in shades of blue and white. The word upwind is in the top left corner in black text with a subtle gradient line above it. The composition has a modern, minimalistic style.
Product

Seamlessly Protect Istio Ambient Environments with Upwind

Upwind provides end-to-end network visibility for cloud environments, visualizing the entire network flow including services meshes such as Istio. This deep network visualization enhances security and performance in complex environments, providing real-time context for workload and API traffic. What is Istio? Istio is a service mesh that allows organizations to secure, connect and monitor traffic […]

An orange and yellow background with a stylized white cloud design in the center. The word Upwind is at the top left corner in white text.
Product

Seamlessly Integrate with Cloudflare Through the Upwind Platform

We are thrilled to announce a new integration with Cloudflare, bringing seamless and enhanced API security for Upwind users who leverage Cloudflare. Why Integrate with Cloudflare Cloudflare is an internet infrastructure and security company that helps organizations monitor and manage their API endpoints, providing additional security, monitoring and API traffic optimization. Its robust capabilities include […]

A blue circle with the Kubernetes logo inside is in the center. The background features multiple faded, overlapping Kubernetes logos on a white backdrop. The word upwind is in the top left corner.
Product

Proactively Secure Kubernetes Workloads with Upwind’s Runtime-Powered KSPM

With the rise of containerized environments and Kubernetes adoption, Kubernetes security posture management (KSPM) has risen to the forefront of cloud security posture initiates. KSPM generally requires the use of security tools or processes to help ensure the security of Kubernetes clusters, with most focusing on policies and configurations. However, this focus on static configuration […]

Abstract design featuring large overlapping circles in shades of blue, with hexagonal patterns and a grid background. The word Upwind is in the upper left corner.
Product

Easily Query Kubernetes Objects with Upwind’s Runtime Topology Map 

We’re excited to introduce a powerful new container security capability that makes it easier than ever to view and query Kubernetes objects while exploring the entire exposure path with Upwind’s runtime topology map. Upwind has always provided deep visibility into containerized resources, showing traffic by port, process, and protocol, as well as details into an […]

A red background with a white bug icon symbolizes a critical vulnerability. The text reads: Critical Vulnerability Impacting FortiOS and FortiProxy Systems (CVE-2024-55591) with Upwind logo in the top-right corner.
Research

New CVE-2024-5591 Zero-Day Exploitation of Fortinet Firewalls 

On January 14, 2025, Fortinet announced a critical vulnerability impacting its FortiOS and FortiProxy systems, CVE-2024-55591 is an authentication  bypass zero-day vulnerability that has been actively exploited since mid-November 2024, enabling attackers to hijack Fortinet firewalls and compromise enterprise networks. Successful exploitation grants remote attackers super-admin privileges via malicious requests to the Node.js websocket module. Discovery […]

Add the Upwind RSS Feed to Slack

Connect the Upwind RSS Feed to your Slack.
Follow the how-to here.