Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Sysdig TRT uncovers massive cryptomining operation leveraging GitHub Actions

The Sysdig Threat Research Team (Sysdig TRT) recently uncovered an extensive and sophisticated active cryptomining operation in which a threat actor is using some of the largest cloud and continuous integration and deployment (CI/CD) service providers; including GitHub, Heroku, Buddy.works, and others to build, run, scale, and operate their massive cloud operation. Because no one has yet reported on this activity and its techniques, we are going to refer to this cluster of activity as PURPLEURCHIN.

Why Security is Central to Citizen Experience Part 3: A Helping Hand from the Private Sector

Building trust in government is both my passion and part of my character. Last year, when I found myself contemplating my next career move, I knew that I wanted to be at an innovative company devoted to rebuilding trust in federal agencies. It didn’t take long for me to realize that Veracode and I were a perfect fit. Immediately I saw how the company’s mission and innovative application-security technology aligned with my values.

Zero trust in the cloud: Best practices and potential pitfalls

Architecturally speaking, cloud-native applications are broken down into smaller components that are highly dynamic, distributed, and ephemeral. Because each of these components is communicating with other components inside or outside the cluster, this architecture introduces new attack vectors that are difficult to protect against using a traditional perimeter-based approach.

Node.js multithreading with worker threads series: worker_threads tutorial

Node.js provides a single-threaded JavaScript run-time surface that prevents code from running multiple operations in parallel. If your application typically employs synchronous execution, you may encounter blocks during long-running operations. However, Node.js itself is a multi-threaded application. This is evident when you use one of the standard library’s asynchronous methods to perform I/O operations, such as reading a file or making a network request.

Top 3 SIEM challenges in multi-cloud environments

Kenneth Buckler, CASP, is a research analyst of information security/risk and compliance management for Enterprise Management Associates, a technology industry analyst and consulting firm. He has also served in technical hands-on roles across the Federal cyber security space and has published three Cyber Security books. Ken holds multiple technical certifications, including CompTIA’s Advanced Security Practitioner (CASP) certification.

A Day in the Life of an Ethical Hacker: Q&A With Professional Hacker Agne Marija Bucyte

Not all hackers are bad. No, really, it's true! We aren't the biggest fan of people who steal your information for nefarious purposes, but there are a ton of upstanding people out there using hacking skills for good. One such person is Agne Marija Bucyte, a Junior Ethical Hacker at Baltic Amadeus who has decided to turn her hacking skills and computer knowledge into her profession.

Amid real estate volatility, cybercriminals are profiting

It is easy to think of cybercrime as a phenomenon only impacting the digital space. However, as trends are showing, digital attacks have a very real and very physical impact. According to the FBI, there has been a surge in rental and real estate property scams conducted via digital means, whether that’s the insertion of rogue actors into the property purchase chain, or hijacking of legitimate websites to promote false, money scamming listings.

Malicious Packages Are a Rising Threat in Software Supply Chain Attacks

Welcome to the first post of the malicious software packages series for the DevOps and DevSecOps community. Each Monday, this technical series will focus on various malicious packages and their effects on the software supply chain, all published over the next four weeks. We’ll dive deeper into malicious packages in each post, including Here we go. Let’s discuss malicious software packages in your software supply chain.

How MSPs can help clients keep their software up to date

Unpatched software vulnerabilities continue to be the most widely used attack vector. There are several factors behind this: SMBs are implementing new software applications in their infrastructure more than ever to simplify business operations and be more efficient. But this reality is changing their organizational landscape, adding more complexity to their security posture.