Blog Series
Cloud infrastructure
Critical Fluent Bit Vulnerability Affects...
Researchers have identified a critical memory corruption vulnerability in Fluent Bit, a popular logging and metrics utility. Dubbed Linguistic Lumberjack, this flaw exists in Fluent Bit’s embedded HTTP server, specifically...
Ahoi Attacks: A New Threat...
Researchers from ETH Zurich have uncovered a new attack method dubbed “Ahoi Attacks” that threatens the security of confidential virtual machines (CVMs) within cloud environments. Described as a family of...
The Future of CentOS 7...
Cloud infrastructure is the underlying foundation of hardware and software elements that enable the delivery of cloud computing services through the Internet. It offers the tools and services required to...
UNC3944 targets Microsoft Azure admin...
UNC3944 has been using advanced phishing and SIM swapping methods to access Microsoft Azure administrator accounts and infiltrate virtual machines (VMs), gain control of compromised accounts, and maintain a long-term...
10 Top Cloud Security...
Operating in a cloud environment has risks that you need to be aware of, folks. In this article, I’ll be talking about the cloud security threats you should be watching...
Cloud Patching Can Prevent A...
There is one vulnerability exploited every 2 hours and attackers can cause significant disruption, downtime, and revenue loss. Before divulging into the cloud patching know-how, it’s imperative to learn about...
6 Cybersecurity Principles to Avoid...
Critical infrastructure is at the core of a functional society, supplying key utilities such as water, energy, and transport to the nation. It makes infrastructure providers an attractive target, whether...
Enterprises Reassessing the Cloud vs...
The cloud has never been about reducing costs. In fact, even staunch cloud advocates admit it – crunching the numbers just doesn’t make sense financially and it requires heavy mental...