Security advisory for CVE-2025-67900 affecting NXLog Agent 6.10 and older on Windows

We are committed to the security of our customers, and wish to inform you of CVE-2025-67900, a recently published vulnerability affecting the Windows version of NXLog Agent 6.10 and older. Technical description The Windows version of NXLog Agent 6.10.10368 and older includes a Privilege Escalation vulnerability because it attempts to load an OpenSSL configuration file from the hardcoded and unintended directory C:\nxlog4\x64\ on startup. This is a legacy installation directory that may not exist in clean NXLog Agent installations.

review

2025 and NXLog - a recap

As the new year looms large, we at NXLog are ready for one of the season’s most cherished traditions: reflecting on the year that ends. Coming off a 2024 that was centered on the NXLog Platform release, our 2025 was built on our analysis of the current state of the telemetry landscape. The main conclusion is that while telemetry data is essential for operations and security, 35% of organizations still struggle to collect it at scale.

linux-logs  |  syslog-ng  |  rsyslog  |  comparison

rsyslog vs syslog-ng: Which is the right log shipper?

Well, no doubt logging is the nervous system of any IT infrastructure. From troubleshooting outages to satisfying compliance audits and threat management, having the right log management pipeline can make the difference between smooth operations and chaotic firefighting. For decades, syslog-ng and rsyslog have been two of the most widely used log management tools for Unix and Linux environments. Both provide implementations of the original 1980s syslog protocol and are designed to collect, process, and forward log messages across networks.

releases  |  Platform

Announcing NXLog Platform 1.10

We are happy to announce the latest release of NXLog Platform, version 1.10. This update introduces streamlined TLS certificate management, broader operating system support, and simplified agent configuration. It will now be even faster and easier to deploy and operate your telemetry pipeline. Want a quick overview? Watch a short demo showcasing the new features in this release: Read on for more details about these updates. Centrally managed certificates for data destinations NXLog Platform 1.

iam  |  security  |  compliance

Identity and Access Management (IAM): Guide for 2026

Imagine a typical company: employees join, they move between offices and departments, then they leave. Each of these changes requires a systems access update for email, databases, internal tools, and more. Manually managing these transitions can be burdensome and error-prone. And where you have errors, you have inefficiencies and exposure to security breaches — neither of which is good for your business. This is where Identity and Access Management (IAM) comes in.

windows security  |  windows events

End-to-end Windows file monitoring with FIM and Windows Security Auditing

In the past, we’ve written about monitoring file access in Windows. However, monitoring file access events alone doesn’t capture the full lifecycle of changes that matter for security and compliance. To gain true end-to-end visibility, you need to track not only when a file is accessed, but also when it’s modified, renamed, or deleted. In this guide, we’ll show how combining File Integrity Monitoring (FIM) with Windows Security Auditing delivers a complete file monitoring solution and how NXLog Agent ties these log sources together.

More

Monitoring BIND9 logs: Comparing syslog and dnstap for DNS visibility

Linux security monitoring: Collecting and visualizing events in Elasticsearch and Kibana

The shadow IT haunting your network: A Halloween horror story

Watching the watchers: The need for telemetry system observability

All Posts