Network Security
Which Third-Party Pods Do You Need in Your K8s Cluster?
A production-grade Kubernetes cluster has many requirements. For example, applications and services should be able to communicate across nodes and be served to external users. Traffic from these users should be properly ...
Solarwinds Vulnerabilty: Address the Basics First
The post Solarwinds Vulnerabilty: Address the Basics First appeared first on Fidelis Cybersecurity ...
AT&T Cybersecurity Survey Surfaces Lots of 5G Security Confusion
AT&T Cybersecurity has published a report that suggests more IT organizations are becoming conscious of 5G security issues heading into a year when these services should be employed more widely. Based on ...
What VPNs and Incognito Mode Still Give Away in Your Online Identity
VPN and Incognito Mode reveal a ton of data to visited websites that managed attribution solutions can conceal, manipulate for analyst anonymity ...
Russian Hack of U.S. Federal Agencies Shine Spotlight on SIEM Failures in Cybersecurity
In what the New York Times is calling, “One of the most sophisticated and perhaps largest hacks in more than five years,” malicious adversaries acting on behalf of a foreign government, likely ...
XDR Has Promise – and a Fair Share of Risks
The security industry is often an alphabet soup of confusing acronyms—SIEM, SOAR, SASE—and the latest acronym du jour is XDR. At first glance, you may conflate it with terms such as NDR ...
How the SolarWinds Hackers Bypassed Duo’s Multi-Factor Authentication
This is interesting: Toward the end of the second incident that Volexity worked involving Dark Halo, the actor was observed accessing the e-mail account of a user via OWA. This was unexpected ...
Who Watches the Watchers, Italian Style – Insider IP Theft at Leonardo
Two infosec team members are accused of attacking Leonardo’s systems to perpetrate IP theft, highlighting the real issue of insider threats One question often asked in security is whether an event is ...
SUNBURST: Russia Fingered in ‘Perfect 10’ Supply Chain Attack
Russian spies have been operating inside countless enterprises and government agencies, thanks to a hack of SolarWinds ...
Assessing the New Normal for Cybersecurity
As work from home continues, cyberthreats related to the new normal will remain even post-pandemic “Pandemic” was the word of the year, with runners up including quarantine, coronavirus and asymptomatic. They make ...
