Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevOps

Kubernetes Security Compliance Frameworks

The challenge of administering security and maintaining compliance in a Kubernetes ecosystem is typically the same: an increasingly dynamic, ever-changing, ephemeral landscape. Changes can be rooted in new approaches to cyberattacks or changing regulations. Kubernetes security requires a complex and multifaceted approach since an effective strategy needs to.

What Risks Do You Run from Brandjacking, and How Do You Overcome Them?

Brandjacking refers to the malicious act of using a brand’s identity to deceive or defraud customers. It usually involves impersonating a reputable brand to gain unauthorized access to sensitive information or exploit the trust associated with the brand. Attackers often leverage the reputation of well-known brands using social engineering techniques, phishing emails, fake websites, and malicious packages in open source repositories.

Introducing JFrog Curation

JFrog Curation is an automated DevSecOps solution designed to thoroughly vet and block malicious open source or third-party software packages and their respective dependencies before entering an organization’s software development environment. With JFrog Curation enterprise companies can: Find out more about what's under the hood with JFrog Curation in this informative webinar.

Getting Started with Persistent Volumes

This is the first of our series on Velero – the open source Kubernetes backup and recovery tool. While it’s powerful and flexible, the initial setup can be daunting to a beginner. Persistent Volumes also require CSI configuration, which varies from provider to provider. In this webinar, we will present all the information you need to get started with Velero. We will walk through the following configuration accompanied by a live demonstration.

RCE vulnerability CVE-2023-36884

A phishing campaign carried out by the threat actor known as Storm-0978 has been detected by Microsoft. The campaign specifically targeted defense and government entities in Europe and North America. It exploited the CVE-2023-36884 vulnerability through Word documents, enabling a remote code execution vulnerability. Notably, the attackers used lures associated with the Ukrainian World Congress before the vulnerability was disclosed to Microsoft.

IP Tagging Rules For GitGuardian Honeytoken Events

Anyone managing your GitGuardian workspace can set up IP tagging rules for honeytokens. Now when someone inside your network triggers a honeytoken, through testing or for any other reason, you will be able to easily identify it as a probable false alarm and not a true code leak, or if it is from a completely unknown, new address that merits further investigation and action.

FYI: the dark side of ChatGPT is in your software supply chain

Let’s face it, the tech world is a whirlwind of constant evolution. AI is no longer just a fancy add-on; it’s shaking things up and becoming part and parcel of various industries, not least software development. One such tech marvel that’s stealthily carving out a significant role in our software supply chain is OpenAI’s impressive language model – ChatGPT.