Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Quantum-Safe Cryptography & Standards: QSC, PQC, QKD & More!

What is “quantum”, really? The emperor's new (quantum) clothes: cutting through the quantum hype It’s hard to move in security circles today without hearing someone pontificating about “quantum”. Maybe you keep hearing how all cryptography and security of the internet will be devastated by a quantum computer.

Kubelet vulnerabilities on Windows nodes: CVE-2023-3676, CVE-2023-3955 and CVE-2023-3893

Recently, the Kubernetes Security Response Committee disclosed three interrelated vulnerabilities affecting the Windows versions of Kubelet and the Kubernetes CSI proxy. These vulnerabilities pose a significant risk, allowing even users with limited permissions to escalate their privileges to administrator level on affected nodes.

Operationalizing Advanced UEBA: Detection Scenarios and UCI Alerts

Netskope has recently released two exciting enhancements to our Advanced UEBA product. The enhancements are: Together, these two new features streamline operationalization of Advanced UEBA by providing operators alerts when it identifies users exhibiting risky behavior and an at-a-glance summary of the risky activity observed for each user.

Windows Server 2012 End of Life

Windows Server 2012, is the sixth version of the Windows Server operating system by Microsoft, as part of the Windows NT family of operating systems. At the time, Windows Server 2012 brought forth an array of enhanced features and refinements, and over the years, it stood as a cornerstone for many organisations, providing a bedrock of reliability, scalability, and adaptability to accommodate applications and workloads.

CVE-2023-38035: Critical Authentication Bypass Vulnerability in Ivanti Sentry

On August 21, 2023, Ivanti published a knowledge base article on a critical authentication bypass vulnerability impacting Ivanti Sentry (CVE-2023-38035). For this vulnerability to be exploited, the System Management Portal which is hosted on port 8443 by default must be exposed to the internet. Successful exploitation of this vulnerability could lead to a remote unauthenticated threat actor making configuration changes to the server and the underlying Operating System (OS) as root.

Streamline dependency updates with Mergify and Snyk

Managing dependencies for a project is a task that requires consistent effort and attention. Surely, you’ve found yourself concerned about any of the following while maintaining a project: Luckily, we’ve been able to use GitHub bots to automate dependency management to an extent with solutions like Dependabot and GreenKeeper. However, these bots mostly automate the creation of a new code pull request that proposes the changes to be made.