Kubernetes security issues: An examination of major attacks

In a never-ending game of cat and mouse, threat actors are exploiting, controlling and maintaining persistent access in compromised cloud infrastructure. While cloud practitioners are armed with best-in-class knowledge, support, and security practices, it is statistically impossible to have a common security posture for all cloud instances worldwide. Attackers know this, and use it to their advantage. By applying evolved tactics, techniques and procedures (TTPs), attackers are exploiting edge cases.

How bots are ruining online gaming for players and publishers

The old saying goes “cheaters never prosper”, but sadly that is not always the case in online gaming. In dark corners of the internet, new ways of cheating at online games – and getting away with it – are being developed on an alarming scale. Both purchasable and “free to play” (F2P) games now offer rewards either in exchange for real world currency or through “grinding” in game, which takes time and effort.

A Zero Trust Security Approach for Government: Increasing Security but also Improving IT Decision Making

Public sector organisations are in the middle of a massive digital transformation. Technology advances like cloud, mobile, microservices and more are transforming the public sector to help them deliver services as efficiently as commercial businesses, meet growing mission-critical demands, and keep up with market expectations and be more agile.

Trickbot Detections: Threat Research Release, July 2021

Criminal gangs are constantly improving their ways of delivering malicious code to victims. The delivery of this code is fundamental in order to subsequently install payloads that maximize the effect of exploitation and allows them to move laterally, and install further crimeware to quickly reap profits such as crypto mining, ransomware, data exfiltration, or even more sophisticated payloads such as banking fraud web injects.

What is HTTPS?

HTTPS (Hypertext Transfer Protocol Secure) is a secured version of HTTP (Hypertext Transfer Protocol). HTTP is a protocol used to transfer data across the Web via a client-server (web browser-web server) model. HTTPS encrypts all data that passes between the browser and server using an encryption protocol called Transport Layer Security (TLS), preceded by Secure Sockets Layer (SSL).

The risks of spreadsheet complacency

Where would we be without our beloved Excel spreadsheets? Since Microsoft first launched its Excel spreadsheet software in 1985, it has grown to arguably become the most important computer program in workplaces globally. The spreadsheet has truly become entrenched in daily business processes as well as critical applications - but the million dollar question is - are spreadsheets secure? Unfortunately when it comes to spreadsheet security, with popularity comes complacency.

DevOps vs. Agile: What Is the Difference?

DevOps and Agile are popular modern software development methodologies. According to the 14th Annual State of Agile Report, 95% and 76% of the respondents stated that their organizations had adopted Agile and DevOps development methods, respectively. Interestingly, both approaches have the same aim: deliver the end product as efficiently and quickly as possible.