Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

DIY Tool Website Greenworks Hacked by Self-Destructing Web-Skimmer

Whilst researching recent client-side attacks our security team observed a highly-sophisticated self-cleaning and self-destructing skimmer on the popular hardware tool website Greenworks. The hack was first spotted by RapidSpike’s Client-Side Security Scanner on June 8th, and at the time of writing, the hack is still live on www.greenworkstools.com/.

Monitoring AWS Fargate with Prometheus and Sysdig

In this article, we will show how it’s easily possible to monitor AWS Fargate with Sysdig Monitor. By leveraging existing Prometheus ingestion in Sysdig, you will be able to monitor serverless services with a single-pane-of-glass approach, giving you confidence in running these services in production.

Four Strategies for Securing the Tactical Edge

The military has invested significant time and money implementing edge computing on the battlefield. The Army’s efforts to leverage the tactical cloud to process data on the edge gets information into soldiers’ hands more quickly, allowing them to make decisions in near-real time. But these benefits come with significant challenges, particularly regarding security. The more endpoints, the larger the potential attack surface and the greater the risk.

Announcing record of remediation & audit logs in Puppet Remediate 1.3

Today we are pleased to announce the release of Puppet Remediate 1.3.0. This release includes new features requested by our customers, including even more capabilities to help you track and trace network activity, and give you more control of the data in your dashboard. Read on for background and a look at the new capabilities.

Announcing Graylog Illuminate for Authentication

Graylog Illuminate for authentication is a brand new offering designed by our Enterprise Intelligence team. It eliminates the manual setup necessary to detect, monitor, and analyze authentication activities and issues across your IT infrastructure by providing pre-built Dashboards, Alerts, and data enrichment. Initially, Graylog Illuminate for Authentication will address Windows authentication issues and activities. We will release additional data sources in the coming weeks so stay tuned!