Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Quick Demo: Updated Magisk Systemless Root Detection and Remediation

Magisk is a very sophisticated systemless rooting technique that can bypass Google's SafetyNet attestation and allow apps like Google Pay, many banking apps, and even Fortnite and Pokémon Go games to be installed on a rooted Android device. Rooting an Android device is popular to allow the user to customize and tweak their device by allowing the installation of third-party apps and tools, removavl of bloatware, and speed up the processor and network.

What Is Threat Intelligence?

It's one thing to detect a cyber attack. It's another to know what the attackers are trying to do, which tactics they are using, and what their next move is likely to be. Without that additional information, it's difficult to defend effectively against an attack. You can't reliably stop an attack if you are unable to put yourself in the mindset of the attackers. This is why threat intelligence plays a critical role in modern cybersecurity operations.

Digging into AWS Fargate runtime security approaches: Beyond ptrace and LD_PRELOAD

Fargate offers a great value proposition to AWS users: forget about virtual machines and just provision containers. Amazon will take care of the underlying hosts, so you will be able to focus on writing software instead of maintaining and upgrading a fleet of Linux instances. Fargate brings many benefits to the table, including small maintenance overhead, lower attack surface, and granular pricing. However, as any cloud asset, leaving your AWS Fargate tasks unattended can lead to nasty surprises.

There is only one way to live in peace: Safe password management

In this, our competent blog, we boast of always giving you good advice and providing you with the technological information necessary for your life as a technologist to make sense. Today it is the case again, we will not reveal the hidden secret about the omnipotence of Control/Alt/Delete, but almost. Today in Pandora FMS blog, we give you a few tips for safe password management.

A Threat As Old As The Internet: Why We Still Care About Malware (And Why You Should Too)

Every career has defining moments. Most are spread out over years or even decades, but the cybersecurity world has had two career-defining moments just in the past year. It started with the global shutdown due to the COVID-19 pandemic. Overnight, many organizations were forced to support employees working remotely. CISOs, like me, were expected to keep both our company and its employees safe in a completely unpredictable world.

What Agencies Should Consider Regarding Multi-Cloud Implementations

Multi-cloud architectures have long been hyped for their performance, reliability, and cost savings—and adoption is soaring. According to a 2020 survey from IDG, 55% of organizations use two or more public clouds. Yet 79% of these adopters struggle to achieve synergy across multiple platforms. These concerns are echoed in the public sector.

Keep Calm and Simplify Managing your SIEM events with Siemplify

We created our Logz.io Cloud SIEM with a clear goal: providing a rapidly deploying, flexible, and cost-effect security management tool that can serve broad datasets and withstand the occasional bursts of events without a sweat. However, our users were coming back to us with requests for more. After all, it’s great to proactively detect proliferating security threats, but what’s the next step beyond just identifying the threat?

Better Tools = Better Monitoring

Everyone loves tools. Whether you’re a weekend craftsman, an aspiring chef, or a serious IT professional, the tools you use can make your tasks much easier. Monitoring tools in IT are mainstays when it comes to keeping an eye on network infrastructure and enforcing company security policies. But just like anything in life, not all monitoring tools are built equally—in fact, many can harm your ability to respond to emerging issues within your network.

Understanding The AWS Shared Security Model

Whether you are new to AWS or have been to every re:Invent since 2012 you may have questions about cloud security and how it impacts your valuable technology and data. In particular, you might be wondering where AWS’s security responsibilities end and where yours begin? Which parts of the cloud can you rely on Amazon’s security team and technology to keep safe and which parts must you take care of?