Thundra Logo

Which Third-Party Pods Do You Need in Your K8s Cluster?

A production-grade Kubernetes cluster has many requirements. For example, applications and services should be able to communicate across nodes and be served to external users. Traffic from these users should be properly ...
5G

AT&T Cybersecurity Survey Surfaces Lots of 5G Security Confusion

AT&T Cybersecurity has published a report that suggests more IT organizations are becoming conscious of 5G security issues heading into a year when these services should be employed more widely. Based on ...
Security Boulevard
What VPNs and Incognito Mode Still Give Away in Your Online Identity

What VPNs and Incognito Mode Still Give Away in Your Online Identity

VPN and Incognito Mode reveal a ton of data to visited websites that managed attribution solutions can conceal, manipulate for analyst anonymity ...

Russian Hack of U.S. Federal Agencies Shine Spotlight on SIEM Failures in Cybersecurity

In what the New York Times is calling, “One of the most sophisticated and perhaps largest hacks in more than five years,” malicious adversaries acting on behalf of a foreign government, likely ...
XDR

XDR Has Promise – and a Fair Share of Risks

The security industry is often an alphabet soup of confusing acronyms—SIEM, SOAR, SASE—and the latest acronym du jour is XDR. At first glance, you may conflate it with terms such as NDR ...
Security Boulevard

How the SolarWinds Hackers Bypassed Duo’s Multi-Factor Authentication

This is interesting: Toward the end of the second incident that Volexity worked involving Dark Halo, the actor was observed accessing the e-mail account of a user via OWA. This was unexpected ...
IP theft

Who Watches the Watchers, Italian Style – Insider IP Theft at Leonardo

Two infosec team members are accused of attacking Leonardo’s systems to perpetrate IP theft, highlighting the real issue of insider threats One question often asked in security is whether an event is ...
Security Boulevard
Russia

SUNBURST: Russia Fingered in ‘Perfect 10’ Supply Chain Attack

Russian spies have been operating inside countless enterprises and government agencies, thanks to a hack of SolarWinds ...
Security Boulevard
new normal

Assessing the New Normal for Cybersecurity

As work from home continues, cyberthreats related to the new normal will remain even post-pandemic “Pandemic” was the word of the year, with runners up including quarantine, coronavirus and asymptomatic. They make ...
Security Boulevard