Blog Series
Month: March 2023
What Red Teams can teach...
“No plan survives contact with the enemy” is one of the truisms of conflict. It’s somewhat (un)surprising how accurately this describes the cybersecurity posture of most organizations. Best laid plans...
Btrfs File System: An...
Btrfs, the short form for “B-Tree File System,” is a Linux kernel-based, state-of-the-art file system that seeks to replace the current standard ext4 file system for Linux distributions while simultaneously...
Maintaining Cyber Hygiene in the...
Reaching an acceptable level of cyber hygiene is a challenge for all healthcare providers, hospitals, and pharmaceutical companies. Many security breaches occur with legacy systems and redundant processes that often...
Icefire ransomware targets Linux enterprise...
Cybersecurity researchers from SentinelLabs discovered a new variant of the Icefire ransomware, with a specific focus on Linux enterprise systems. SentinelLabs was the first to detect the malware, which encrypts...
Vanilla OS 2.0 Adopts Debian...
Vanilla OS 2.0 had been using Ubuntu from its early development stages, but now it is all set to shift to Debian Sid. Vanilla OS 2.0 is one of the...
Everything You Need to Know...
The core reason why organizations utilize CI/CD is that they’re supremely beneficial for system administration, live patching, or patch management, as well as testing code changes through integration and continuous...
Former TikTok employee claims company’s...
A former TikTok risk manager has met with congressional investigators to express his concerns that the company’s plan for protecting user data in the United States is deeply flawed, pointing...
At least one open-source vulnerability...
In the current scenario where almost all software uses open-source code, at least one known open-source vulnerability was detected in 84% of them. The researchers at the application security company...
Why your servers can still...
It’s been about a decade since the discovery of Heartbleed, a dangerous OpenSSL exploit that affected millions of systems – and a vulnerability that made its way into popular news...
Palo Alto’s Unit 42 discovers...
Palo Alto Networks’ Unit42 researchers have discovered a new GoBruteforcer malware that targets phpMyAdmin, MySQL, FTP, and Postgres. The newly discovered Golang-based botnet malware seeks out and infects web servers...
Critical Kernel Vulnerabilities Lead to...
Several critical vulnerabilities were detected in the Linux kernel that could cause a denial of service (DoS), possibly execute arbitrary code, and leak sensitive information. Additionally, important updates for PHP...