When you start using a new reverse engineering platform for the first time, it can be hard…
Cloud Security
Knowing how difficult it is to stay up to date with all the different news and releases occurring in Cloud Security industry, I hope this will be helpful for other people who are particularly interested in this corner of the security scenario.
Let’s dive into the interesting details, breaking down the general ideas into 18 concrete container security best…
Summary: In this article we will demonstrate how to trigger an automated end to end data loading,…
On December 20, Citizenlab published “The Great iPwn”, detailing how “Journalists [were] Hacked with Suspected NSO Group iMessage…
VPCs by default use the Amazon-provided DNS which can be used to bypass some network-level protection mechanisms (e.g. NACLs or SGs) or monitoring (e.g. VPC Flow Logs).
The client, a global leader in the import and marketing of high-quality tires, offers wholesale tire dealers…
VPCs by default use the Amazon-provided DNS which can be used to bypass some network-level protection mechanisms…
Late in 2019, I was hired at a streaming service focused on short form content to help…
Summary The REvil ransomware (a.k.a Sodinokibi) is a threat group that operates in the RaaS (Ransomware-as-a-Service) model, where the…
The process of writing code and delivering it to AWS Lambda is as straightforward as making a…
According to a cybersecurity specialist who responded to the attack, the hack that brought down the country’s…
VMware is actively exploiting a vulnerability with a severity rating of 9.8 out of 10. At least…
For companies running their own datacenter, setting up internal DNS infrastructure is essential for performance and ease…
Cloudflare Tunnel allows you to connect applications securely and quickly to Cloudflare’s edge. With Cloudflare Tunnel, teams…
Prosus, the company which develops online programming education programmes, said that it has inked a deal to…
I recently came across Staying safe with .NET containers on Hacker News. It’s an excellent post that goes into…
To be able to trust cloud computing, you need to be able to trust it less. Here’s…
The pandemic has turned 2020 into a year of medicine and information technology. The remarkable surge in…
2021 has started with a sudden change in how IT and computing work. Remote work culture and…
Engineers configuring security groups and firewalls tend to focus on inbound/ingress rules to restrict the networks from…
If there is a single best practice for container security, it is to avoid running containers as…
If you are running Google Kubernetes Engine (GKE) Clusters with Basic Authentication, you’ll want to consider removing those credentials from your clusters. This post aims to outline the risks and considerations for remediation.
Cloud identity permissions are complex. So complex, that innocent looking permissions provided to 3rd party vendors can…
As a Google Cloud Administrator planning your IAM strategy for how to best use the built-in Google…
If an attacker compromises a Google Cloud Platform (GCP) user’s device, he can easily steal and abuse…
For many in the world of data science, distributed training can seem a daunting task. In addition…
Cloud storage enables organizations to reduce costs and operational burden, scale faster, and unlock other cloud computing…
Here are my views on the “Top Ten” AWS Security, Identity and Compliance updates from AWS re:Invent…
In an ideal world HashiCorp Vault is neither the first nor last line of defense against an…
Infrastructure as code (IaC) is undoubtedly changing how engineers approach the cloud. IaC, when coupled with dev…