Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on CyberSecurity for Applications, Services and Infrastructure, and related technologies.

Multiple Malicious Packages Discovered on PyPI, npm, and RubyGems

Evidence of broad and sustained attacks using several npm, Python, and Ruby packages continues to emerge. A series of malicious packages have been added to the npm, PyPI, and RubyGems package repositories. The attacks have been ongoing for some time, with some seeded years ago. Their aims are manifold, including stealing funds from crypto wallets, deleting codebases, and obtaining Telegram messaging data.

Reliable Dedicated Servers as the Foundation of Scalable DevOps Architecture

Imagine launching a product update at peak traffic time. Your development team pushes the changes, expecting everything to run smoothly. But instead of seamless deployment, the infrastructure buckles-delays spike, user complaints pour in, and error logs flood your screen. Sound familiar? In the world of DevOps, where agility and uptime are non-negotiable, the strength of your backend setup determines how fast-and how safely-you can move. At the heart of this digital engine lies a crucial but often underestimated component: the server. More specifically-reliable dedicated servers.

Community Vigilance, Enterprise Response: Addressing CVE-2024-21626 in Rancher

In backend engineering, many days follow a familiar rhythm: coffee, code reviews, maybe deploying a new feature. But occasionally, the routine is interrupted by a message that signals a different kind of challenge, like a Slack notification from the security team: “Hey, we’ve identified a potential issue. Need to sync up.” This post details one such instance—our journey addressing CVE-2024-21626, a privilege escalation vulnerability reported in Rancher.

SentinelOne Outage: Why Early Detection and Independent Monitoring Matter

When SentinelOne, a leader in cybersecurity and endpoint protection, experienced a major outage last week, thousands of organizations were suddenly left in the dark. With SentinelOne down for hours, IT and security teams scrambled for information and updates. But there was a critical missing piece: SentinelOne has no public status page. This gap left customers frustrated, searching for answers on social media, Reddit, and unofficial channels.

Michael Donovan, VP of Product at Docker, has a hot take on shift left security

Shift left means improving security at the early stages of software development. Is it the best approach? See the full webinar: https:/cloudsmith.com/webinars Get to know Cloudsmith: About Cloudsmith We offer the world's best cloud-native artifact management platform to control, secure, and distribute everything that flows through your software supply chain. Cloudsmith operates at enterprise scale, reduces risk, and streamlines builds.

Top 7 SOAR Tools (as of 2025)

Security Orchestration, Automation, and Response (SOAR) platforms empower security teams to streamline and accelerate their response to cyber threats. By integrating with existing security tools, automating repetitive tasks, and standardizing incident response workflows, SOAR helps organizations proactively defend against attacks while improving operational efficiency.

Regulation Nation: The what, when, why and how of the new CMMC for MSPs

As the cybersecurity landscape continues to evolve, the U.S. Department of Defense (DoD) is ramping up efforts to ensure that contractors and their vendors adhere to robust security standards. One of the key initiatives driving this transformation is the Cybersecurity Maturity Model Certification (CMMC). But what does CMMC mean for Managed Service Providers (MSPs) and IT shops, and how can you ensure your business is prepared to meet these new compliance requirements?

System Hardening Explained: Types, Techniques, Examples & Mistakes to Know

The broad umbrella of today's IT security includes standards, tools, technologies, and human practices that reduce risk and protect your systems. System hardening is one conceptual catch-all for those components of IT security — but what does system hardening mean in relation to your actual day-to-day operations? And how do you achieve system hardening without burdening your whole team?

How to Safeguard Healthcare Data in ITSM: Ivanti and Protecto

The healthcare sector, perhaps more than any other, needs to scrutinize the balance between data utility and data privacy. Healthcare organizations must manage large amounts of sensitive data while complying with stringent regulations such as the Health Insurance Portability and Accountability Act (HIPAA). For IT teams seeking to implement AI-augmented service management, that responsibility weighs heavily.