Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Protecting NATO Secret and Foreign Government Information

We’ve talked a lot on this blog about protecting controlled unclassified information, and we’ve mentioned in places some other kinds of information, like classified and secret information, covered defense information, and other protected information. There’s one thing all of this information has in common: it’s generated by the United States government.

Handala's Wiper: Threat Analysis and Detections

On July 19, 2024, CrowdStrike released configuration updates for its Windows sensor, aiming to enhance security and performance. Unfortunately, this update inadvertently led to widespread downtime, manifesting as Blue Screen of Death (BSOD) on millions of machines worldwide. The BSOD, a critical system error screen, halts all operations, rendering affected systems inoperable until resolved.

Hypervisor Development in Rust for Security Researchers (Part 1)

In the ever-evolving field of information security, curiosity and continuous learning drive innovation. This blog series is tailored for those deeply engaged in experimental projects, leveraging Rust's capabilities to push the boundaries of what's possible. The focus on Rust, after exploring various programming languages, has led to the creation of several cutting-edge projects that are highlighted in this report.

CISA's Secure By Design: A Year Later

In April this year, the CISA Secure By Design initiative turned one. The initiative calls for the public and private sectors to work together to challenge and encourage software manufacturing companies to adopt principles to ensure their software is developed and produced as securely as possible. The initiative tracks seven goals that software manufacturers can pledge to develop and transparently track progress towards those goals.

Cybersecurity Threat Briefing for Organizations Under the SOCI in Australia

The Security of Critical Infrastructure (SOCI) Act in Australia mandates that organizations operating within critical infrastructure sectors implement robust cybersecurity measures to protect against an increasingly diverse and sophisticated range of cyber threats. These sectors, which include energy, water, communications, healthcare, transport, and other essential services, are vital to national security, public safety, and economic stability.

Manage Open Source Dependency Licenses Easier With GitGuardian SCA

Get better insight into your third-party licenses and easily stay on top of any changes with GitGuardian Software Composition Analysis (SCA), you can now get a thorough view of all the licenses used by your applications' dependencies from a single view. In your dashboard under the SCA Dependencies view you can easily filter by each particular license used by the components in your applications. Easily check for any unexpected entries from the convenience of the GitGuardian workspace.

Migrate VMs from VMWare ESXi to Proxmox VE

VM migration from VMware to Proxmox can be necessary whether an organization is diversifying its infrastructure or completely moving its production workloads to a new platform. There are two main methods to migrate virtual machines from VMware ESXi hosts to Proxmox VE hosts: manually and with special tools. This blog post provides a detailed step-by-step tutorial for the successful migration of virtual machines to Proxmox VE using the 2 methods.