Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

See what services are running on your hosts

This series of blogs, Monthly Module Mondays, started on April Fool’s Day 2024 discussing how to Inventory and remediate Red Hat Enterprise Linux with Security Technical Implementation Guides (STIGs) has now reached the 10th installment showcasing a couple of modules to take stock of what services are running on your systems.

Magecart Attack: 'Temporarily Out Of Orbit'

In December 2024, it was reported that the European Space Agency’s (ESA) official online store suffered a Magecart attack aimed at compromising customers’ payment information. The breach involved the injection of malicious JavaScript code into the store’s checkout process, leading to the display of a counterfeit Stripe payment page designed to harvest sensitive data. Image Source: ESA Website.

The Ultimate Guide to the Best SFTP Servers in 2025

Secure File Transfer Protocol (SFTP), also known as SSH File Transfer Protocol, is a robust, encrypted method for transferring files across networks, designed as a more secure alternative to traditional File Transfer Protocol (FTP). Essential for industries handling sensitive data—like finance and healthcare—SFTP protects against unauthorized access and enables efficient file management, making it a critical tool for remote access and data protection.

5 Best Practices for Managing Risk When Trading Cryptocurrency

Cryptocurrency trading offers lucrative opportunities but comes with significant risks due to the market's inherent volatility. Price swings are frequent, and even promising investments can decline unexpectedly, emphasizing the importance of risk management. With Bitcoin ETFs approved and the 2024 Bitcoin Halving, the market is entering a pivotal and exciting phase. A potential bull run could finally boost global adoption, making crypto a cornerstone of financial evolution.
Sponsored Post

Capturing Network Traffic anytime

Capturing network traffic is usually done either for security reasons or to troubleshoot networking issues. But by the time you initiate a network capture (either manually or automatically) it’s often too late already – the train has already left the station. Point in case: Say your SIEM (obviously EventSentry) detects abnormal or suspicious behavior in a log and a network capture is initiated.

Feature Friday #42: ob-cfengine3

For the final post in the Feature Friday series I am here to tell you about something I use nearly hourly, ob-cfengine3 which extends Emacs Org Babel for executing CFEngine policy. ob-cfengine3 has been around for a little over seven years now and it has saved me countless hours, seconds at a time. At it’s core it let’s you type a snippet of policy and execute it directly in your document, sort of like Jupyter.

Essential Tips for Keeping Your Number Plate Safe

Our car's number plate is an important part of its identity that ensures compliance with legal and regulatory standards. Number plates are frequently disregarded in terms of car upkeep and security. Damage, theft, or wear and tear can result in legal troubles, fines, and extra expenses. This article will provide you with some important suggestions and tactics to secure and maintain your number plate. Visit Show Plates for more information about number plates.