DevOps/SRE Blog Scanner
Dark/Light

TTR: the out-of-control metric

- surfingcomplexity.blog - November 23, 2024

I'm currently reading The Machine That Changed The World. This is a book written back in 1990 comparing Toyota's approach to automobile manufacturing to the approach used by American ca…

From Contractors to OAuth: Emerging SDLC Threats for 2025

- thenewstack.io devops - November 23, 2024

Contractor pipelines, OAuth phishing, and team mismanagement are becoming key entry points for SDLC breaches.

North Korea's Sapphire Sleet stole $10M in crypto using LinkedIn scams, AI tools, and malware.

Microsoft and Google expose China-based cyber threats Storm-2077 and GLASSBRIDGE, targeting U.S. agencies and amplifying propaganda globally.

Ambassador post by Leo Pahlke, CNCF Ambassador and CNCF TAG Environmental Sustainability Chair Open source is a fascinating space, where you are surrounded by emerging technologies and where you can…

Amazon Q Developer Agent for code transformation is an AI-powered tool which modernizes code bases from Java 8 and Java 11 to Java 17. Integrated into VS Code and IntelliJ, Amazon Q simplifies the migration process and reduce the time and effort compared to manual process. It proposes and verifies code changes, using AI to […]

Gain centralized visibility and control over AWS, on-premises, and multicloud compute at scale with the new AWS Systems Manager. Featuring a unified dashboard, one-click agent remediation, Amazon Q Developer integration for natural language queries, and cross-account/Region management - all at no extra cost.

In today's data-driven business landscape, organizations are increasingly relying on massive data lakes to store, process, and analyze vast amounts of information. However, as these data repositories grow to petabyte scale, a key challenge for businesses is implementing transactional capabilities on their data lakes efficiently. The sheer volume of data requires immense computational power and […]

This post is written by Uma Ramadoss, Principal Specialist SA, Serverless and Dhiraj Mahapatro, Principal Specialist SA, Amazon Bedrock AWS Step Functions is introducing variables and JSONata data transformations. Variables allow developers to assign data in one state and reference it in any subsequent steps, simplifying state payload management without the need to pass data […]

Today, we're announcing Amazon Application Recovery Controller (ARC) zonal shift support for Application Load Balancers (ALB) with cross-zone load balancing enabled. This complements the support for Network Load Balancers (NLB) using cross-zone load balancing we announced previously. Now you can use zonal shift with both NLBs and ALBs, with or without cross-zone load balancing configured, […]

AWS leads in hybrid infrastructure with top ratings from Gartner for edge computing, AI/ML, and hybrid management; recognized for global support and fully managed offerings like Outposts, expanding consistent cloud experience to on-premises and edge locations.

Identity management revamped: Amazon Cognito unveils customizable login flows, passwordless options, and tiered pricing for tailored authentication experiences.

TAG-112 hacks Tibetan websites, using fake TLS certificates to deliver Cobalt Strike malware payloads.

APT-K-47, aka Mysterious Elephant, exploits Hajj themes and Asyncshell malware in Pakistan-targeted cyberattacks.

Use These DevOps Pipelines To Cut Automation Tool Costs

- thenewstack.io devops - November 22, 2024

Reduce license dependencies by integrating GitHub Actions for automation testing.

How Vodafone is using gen AI to enhance network lifecycle

- GCP networking blogs - November 22, 2024

Vodafone and Google Cloud deployed generative AI to unlock new levels of efficiency, creativity, and customer satisfaction through network automation.

This post is written by Tarun Rai Madan, Principal Product Manager – Serverless, and Rajesh Kumar Pandey, Principal Software Engineer, Serverless Today, AWS is announcing new opt-in Amazon CloudWatch metrics for AWS Lambda Event Source Mappings that subscribe to Amazon Simple Queue Service (Amazon SQS), Amazon Kinesis, and Amazon DynamoDB event sources. These metrics include PolledEventCount, […]

Member post by John Matthews, and Savitha Raghunathan, Red Hat Migrating legacy software to modern platforms has long been a challenging endeavor for businesses. Companies often need to move decades…

Dapr Graduates CNCF and Connects to WebAssembly

- thenewstack.io kubernetes - November 22, 2024

The Microsoft-led Dapr project has achieved several significant milestones, including its graduation from CNCF and its growing use of WebAssembly.

The Tidal Wave of API Drift: Use Mocking To Stay Afloat

- thenewstack.io ci-cd - November 22, 2024

Mocking helps developers standardize API interactions, guaranteeing that the functionality they are creating matches the intended specs of the API.

AWS Identity and Access Management (IAM) now supports centralized management of root access for member accounts in AWS Organizations. With this capability, you can remove unnecessary root user credentials for your member accounts and automate some routine tasks that previously required root user credentials, such as restoring access to Amazon Simple Storage Service (Amazon S3) […]

The CNCF has made available an update to its Jaeger distributed tracing project that uses OpenTelemetry agent software to collect data.

This article underscores the importance of having a reliable backup for your Google Workspace data. Learn more.

Russia-linked TAG-110 hacks 62 victims across 11 nations using HATVIBE and CHERRYSPY malware.

Configuring a CI pipeline to invoke automation tests can help reduce license costs. CI tools sit in front of automation test tools.

Microsoft, Meta, and DOJ disrupt global cybercrime operations, including ONNX phishing scams and PopeyeTools fraud.

Fake Python libraries on PyPI impersonate AI tools like GPT-4 and Claude, spreading JarkaStealer malware.

In this post we explain how you can use Amazon Virtual Private Cloud (Amazon VPC) security group associations and security group sharing to configure consistent security rules across your workloads in multiple VPCs and accounts on AWS. We outline the steps to configure the two new security group features, their use cases, and best practices for […]

Fundrise is a financial technology company that brings alternative investments directly to individual investors. With more than 2 million users, Fundrise is one of the leading platforms of its kind in the United States. The challenge of providing a smooth, secure, and transparent experience for millions of users is largely unprecedented in the alternative investment […]

This blog is co-authored by Jooyoung Kim, Senior Containers Specialist Solutions Architect, Abhishek Nautiyal, Senior Product Manager, Amazon ECS and Ankur Sethi, Senior Product Manager, Amazon EC2. Introduction Amazon Elastic Container Service (Amazon ECS) is an opinionated, easy-to-use container orchestration service with deep AWS integrations that streamlines the deployment and management of containerized applications at […]

CloudTrail Lake updates simplify auditing with AI-powered queries, summarization, and enhanced dashboards for deeper AWS activity insights.

Feds Charge Five Men in 'Scattered Spider' Roundup

- krebsonsecurity.com - November 21, 2024

Federal prosecutors in Los Angeles this week unsealed criminal charges against five men alleged to be members of a hacking group responsible for dozens of cyber intrusions at major U.S. technology companies between 2021 and 2023, including LastPass, MailChimp, Okta,…

Platform Engineering: A Workshop to Help Map Your Strategy

- thenewstack.io devops - November 21, 2024

Stakeholders from across an organization can decide together what their internal developer platform should do, in this new game-like workshop by Mia-Platform.

Gain deep visibility into AWS Lambda performance with CloudWatch Application Signals, eliminating manual monitoring complexities and improving serverless app health.

Stop Losing Users: The Load-Balancing Fix Your Website Needs

- thenewstack.io devops - November 21, 2024

A two-second delay could cost you customers — invest in load-balancing solutions.

This post is written by Heeki Park, Principal Solutions Architect Amazon API Gateway is introducing custom domain name support for private REST API endpoints. Customers choose private REST API endpoints when they want endpoints that are only callable from within their Amazon VPC. Custom domain names are simpler and more intuitive URLs that you can […]

It's that time of the year again. The annual AWS re:Invent conference is just around the corner. Still need to save your spot? You can register here. This year's DevOps and Developer Productivity (DOP) track features an impressive lineup, including 11 breakout sessions, 14 chalk talks, 2 code talks, 8 workshops, 3 builder sessions, and […]

Today we are announcing the integration of AWS CloudFormation Hooks with AWS Cloud Control API (CCAPI). This integration enables the use of hooks to validate the configuration of resources being provisioned through CCAPI. In this blog post, we will explore the integration between CloudFormation Hooks and CCAPI by configuring an existing hook to work with […]

Checkmarx this week extended the scope of its ability to protect software supply chains with tools that access how secure a repository is.

MIAMI, Florida, 21st November 2024, CyberNewsWire

Workload Identity Federation for GKE is now even easier to use with deeper IAM integration. Here's what you need to know.

By Nate Waddington, Head of Mentorship and Documentation, CNCF Open source projects rely on strong communities. Mentorship programs like LFX Mentorship and Google Summer of Code offer maintainers a…

Member post originally published on Fastly's blog by Hannah Aubry About five years ago, Fastly had a problem with scale. No, not our network. Fastly's network continues to scale effortlessly…

Palo Alto Networks urges fixes as 2,000 devices are hacked in exploits targeting critical flaws.

Gelsemium debuts Linux malware WolfsBane in cyber espionage attacks on East Asia, ESET reveals.

Kueue Can Now Schedule Kubernetes Batch Jobs Across Clusters

- thenewstack.io kubernetes - November 21, 2024

The "MultiKueue" beta multicluster job dispatching feature allows admins to place workloads on remote clusters.

A new intuitive AWS console design enhances readability, reduces complexity for improved task focus and efficiency while maintaining familiarity across AWS experiences.

Reduce cybersecurity risks and streamline compliance with PAM solutions. Discover 10 ways PAM enhances your security.

North Korea exploits fake IT firms and workers globally to fund weapons programs, evade sanctions, and conduct cyberattacks.

Cyber Story Time: The Boy Who Cried "Secure!"

- thehackernews.com - November 21, 2024

Learn why Automated Security Validation is critical for cybersecurity, addressing false positives and hidden threats.

More than 145,000 internet-exposed ICS devices found globally, revealing significant vulnerabilities in critical infrastructure.

Five hackers indicted in U.S. for phishing attacks, stealing $11M in cryptocurrency, and data breaches.

Google's AI tool OSS-Fuzz uncovers 26 vulnerabilities, including a decades-old OpenSSL flaw, boosting open-source security.

NodeStealer malware targets Facebook Ads accounts, harvesting credit card data and spreading via malvertising

This post is written by Julian Wood, Principal Developer Advocate, and Andrea Amorosi, Senior SA Engineer. You can now develop AWS Lambda functions using the Node.js 22 runtime, which is in active LTS status and ready for production use. Node.js 22 includes a number of additions to the language, including require()ing ES modules, as well as changes to the runtime […]

Introduction This post was co-authored by John Lewis (SW R&D Director in HP), Gajanan Chandgadkar (Principal Cloud Operations Architect, HP), Rutvij Dave (Sr. Solutions Architect at AWS), Ratnopam Chakrabarti (Sr. Solutions Architect, Containers and Open-Source technologies at AWS), Apeksha Chouhan(Senior Technical Account Manager at AWS) and Chance Lee (Sr. Container Specialist Solutions Architect at AWS) […]

This blog is authored by Colin Putney (ML Engineer at Vannevar Labs), Shivam Dubey (Specialist SA Containers at AWS), Apoorva Kulkarni (Sr.Specialist SA, Containers at AWS), and Rama Ponnuswami (Principal Container Specialist at AWS). Vannevar Labs is a defense tech startup, successfully cut machine learning (ML) inference costs by 45% using Ray and Karpenter on Amazon Elastic Kubernetes Service (Amazon EKS). […]

Starting today, Amazon CloudFront supports anycast IPs, a set of dedicated IP addresses that the customers can use to access CloudFront POPs for delivery of zero-rated traffic into the network carriers. For end-customers accessing your application, you now can collaborate with network carriers to exempt data charges from your end-customers' data limits or implement distinct […]

Starting today, Amazon CloudFront introduced CloudFront Virtual Private Cloud (VPC) Origins, a new feature that allows users to use CloudFront to deliver content from applications hosted in a VPC private subnet. VPC Origins eliminates the need for applications to be exposed on the public internet by restricting access solely through users' CloudFront distributions. This is […]

Securely deliver high-performance web apps with CloudFront VPC origins; serve content directly from private subnets, eliminating undifferentiated work.

Unlock high-performance APIs with gRPC on Amazon CloudFront. Reduce latency via a global CDN, secure traffic at the edge, and benefit from DDoS protection.

Member post originally published on the ngrok blog by Joel Hans Developers love a groove. No, I don't mean a touch of jazz to class up your workday, but the specific patterns you rely on for building…

Observe Simplifies K8s Troubleshooting With Kubernetes Explorer

- thenewstack.io kubernetes - November 20, 2024

New Observability experience enhances visibility and visualization for faster, better troubleshooting.

AWS CloudFormation is a service that allows you to define, manage, and provision your AWS cloud infrastructure using code. To enhance this process and ensure your infrastructure meets your organization's standards, AWS offers CloudFormation Hooks. These Hooks are extension points that allow you to invoke custom logic at specific points during CloudFormation stack operations, enabling […]

In today's cloud-driven world, maintaining compliance and enforcing organizational policies across your infrastructure is more critical than ever. AWS CloudFormation, a service that enables you to model, provision, and manage AWS and third-party resources through Infrastructure as Code (IaC), has been a cornerstone for automating cloud deployments. While CloudFormation simplifies resource management, ensuring compliance with […]

Member post by Gabriele Bartolini, VP Chief Architect of Kubernetes at EDB This article delves into the concept of cloud neutrality— a term I prefer over agnosticism— in PostgreSQL deployments.

Today we are excited to announce that you can now easily ingest Amazon EBS detailed performance statistics from your Amazon Elastic Kubernetes Service (Amazon EKS) workloads into an Amazon Managed Service for Prometheus workspace. We recently announced the availability of EBS detailed performance statistics, which gives you real-time visibility into the performance of your EBS […]

Hackers exploit NFC technology and mobile payments, enabling global fraud through Google Pay and Apple Pay.

Microsoft is launching a new Windows Resiliency Initiative to enhance security and system integrity.

NHIs Are the Future of Cybersecurity: Meet NHIDR

- thehackernews.com - November 20, 2024

NHIDR secures non-human identities with real-time detection and automated response, preventing sophisticated breaches

Critical Ubuntu needrestart flaws allow local root privilege escalation; update immediately to safeguard systems.

China-linked "Liminal Panda" exploits telecom vulnerabilities in South Asia and Africa, using advanced malware for espionage since 2020.

Apple issues security updates for iOS, macOS, and Safari to fix two active zero-day exploits.

Member post by Jatinder Singh Purba, Principal, Infosys; Krishnakumar V, Principal, Infosys; Prabhat Kumar, Senior Industry Principal, Infosys; and Shreshta Shyamsundar, Distinguished Technologist…

Critical flaw CVE-2024-21287 in Oracle Agile PLM allows unauthenticated file leaks; urgent patch advised.

Retrieval-Augmented Generative (RAG) applications enhance the responses retrieved from large language models (LLMs) by integrating external data such as downloaded files, web scrapings, and user-contributed data pools. This integration improves the models' performance by adding relevant context to the prompt. While RAG applications are a powerful way to dynamically add additional context to an LLM's prompt […]

In the earliest days of Amazon Virtual Private Cloud (Amazon VPC), we thought customers would only ever need a single VPC. We've learned a lot since then. Today, the AWS Well-Architected Framework describes a single account with a single VPC as an anti-pattern. With a growing number of accounts and network paths in the AWS […]

Recently, Amazon Q Developer announced expanded support for account resource awareness with Amazon Q in the AWS Management Console along with the general availability of Amazon Q Developer in AWS Chatbot, enabling you to ask questions from Microsoft Teams or Slack. Additionally, Amazon Q will now provide context-aware assistance for your questions about resources in your account […]

WebAssembly Won't Replace Docker Anytime Soon: Docker CTO

- thenewstack.io containers - November 19, 2024

At KubeCon, Docker CTO Justin Cormack discussed the potential value of WebAssembly, as well as Docker's new AI catalog.

AWS re:Invent 2024 offers an extensive selection of serverless and application integration content. AWS re:Invent Banner For detailed descriptions and schedule, visit the AWS re:Invent Session Catalog. Join AWS serverless experts and community members at the AWS Modern Apps and Open Source Zone in the AWS Expo Village. This serves as a hub for serverless […]

Under the hood, MKE is shifting from its basis from Docker Swarm to the k0s cloud-friendly Kubernetes distribution.

Advanced L7 routing, authentication and authorization using IAM Policies, and deep observability are key capabilities offered by Amazon VPC Lattice. With VPC Lattice now integrated into Amazon Elastic Container Service (Amazon ECS), you can easily migrate service-to-service communication from using internal Elastic Load Balancing (ELB) to VPC Lattice. This allows you to benefit from VPC Lattice […]

AWS IAM Identity Center is streamlining its AWS CloudTrail events by including only essential fields that are necessary for workflows like audit and incident response. This change simplifies user identification in CloudTrail, addressing customer feedback. It also enhances correlation between IAM Identity Center users and external directory services, such as Okta Universal Directory or Microsoft […]

The 2024 State of Platform Engineering? Fledgling at Best

- thenewstack.io platform-engineering - November 19, 2024

The failures of DevOps continue to push organizations to form platform teams. But many aren't measuring results, says the latest report from Gitpod and Humanitec.

Selecting the right IT provider is about building a strategic partnership that aligns with your business goals, fosters innovation, ensures cultural compatibility, and drives long-term growth.

NetApp Volumes now available for OpenShift on Google Cloud

- GCP containers blogs - November 19, 2024

With Google Cloud NetApp Volumes in OpenShift, you get the benefits of a managed storage service with enterprise-grade NetApp storage capabilities.

Keycloak completes fuzzing audit

- cncf.io - November 19, 2024

Community post by Adam Korczynski, ADA Logics The Keycloak has completed its fuzzing audit. The audit was carried out by Ada Logics, a UK-based security firm with deep expertise in fuzz testing…

Kubestronaut in Orbit: Dmitri Telinov

- cncf.io - November 19, 2024

This week's Kubestronaut in Orbit, Dmitri Telinov, a Senior DevOps Engineer in Chișinău, Moldova, is a curious and avid learner and considered himself a complete beginner in Kubernetes only 3 years…

Introduction Running microservice-style architectures in the cloud can quickly become a complex operation. Teams must account for a growing number of moving pieces such as multiple instances of independent workloads, along with their infrastructure dependencies. These components can then be distributed across different topology domains, such as multiple Amazon Elastic Compute Cloud (Amazon EC2) instances, […]

Hackers hijack Jupyter Notebooks to exploit FFmpeg for illegal sports streaming, posing serious risks.

Ngioweb malware fuels NSOCKS proxy service, exploiting IoT vulnerabilities for botnet monetization in minutes

Discover why managing privileged access isn't enough and learn strategies to secure privileged accounts

Despite the widespread use of GenAI-based solutions for building and delivering applications, significant security challenges still persist.

Helldown ransomware targets VMware and Linux systems using Zyxel flaws, disrupting IT, healthcare, and more.

T-Mobile targeted in Chinese cyber espionage campaign stealing telecom data; U.S. warns of ongoing threats.

Critical flaws in Progress Kemp LoadMaster and VMware vCenter Server are under active exploitation, warns CISA.

Fintech Giant Finastra Investigating Data Breach

- krebsonsecurity.com - November 19, 2024

The financial technology firm Finastra is investigating the alleged large-scale theft of information from its internal file transfer platform, KrebsOnSecurity has learned. Finastra, which provides software and services to 45 of the world's top 50 banks, notified customers of a…

Introduction Amazon Elastic Kubernetes Service (Amazon EKS) is a managed Kubernetes service to run Kubernetes in the AWS cloud and on-premises data centers. In the cloud, Amazon EKS automatically manages the availability and scalability of the Kubernetes control plane nodes responsible for scheduling containers, managing application availability, storing cluster data, and other key tasks. However, maintaining […]

This post is written by Michael Haken, Senior Principal Solutions Architect, AWS Today, we're announcing support for zonal shift in Amazon EC2 Auto Scaling. Zonal shift gives allows you to rapidly recover from application impairments in a single Availability Zone (AZ) impacting your Auto Scaling Group (ASG) resources. In this post, we describe how performing […]

Simplify networking for containerized apps with native VPC Lattice-ECS integration, boosting productivity and flexibility across services.

AWS Lambda SnapStart boosts Python and .NET functions' startup times to sub-second levels, often with minimal code changes, enabling highly responsive and scalable serverless apps.

Keeping Amazon Machine Image (AMI) up-to-date with the latest patches and updates is a critical task for organizations using AWS Auto Scaling group . However, manually patching AMIs and updating Auto Scaling groups can be time-consuming for your teams and error-prone. This blog post presents a solution to automate the process of updating AMIs for […]

Explore the journey of AWS Lambda, the pioneering serverless computing service, from its 2013 inception to powering over two million users and tens of trillions of function invocations monthly.

Unleash your inner developer with AWS App Studio, the generative AI-powered application builder. Turn your idea into fully-fledged, intelligent, custom, secure, and scalable software in minutes.

79% of IT leaders face secrets leaks with 12.7M credentials exposed on GitHub. Learn solutions now.

This week, we wrapped up the final 2024 Latin America Amazon Web Services (AWS) Community Days of the year in Brazil, with multiple parallel events taking place. In Goiânia, we had Marcelo Palladino, senior developer advocate, and Marcelo Paiva, AWS Community Builder, as keynote speakers. Florianópolis feature Ana Cunha, senior developer advocate, and in Santiago […]

New stealthy malware loader BabbleLoader evades antivirus and sandboxes, delivering WhiteSnake and Meduza stealers globally.

Member post originally published in the Cerbos blog by James Walker If you want to make your authorization more scalable, easier to maintain, and simpler to integrate with your components…

Kubernetes Runtime Defense Evolves Beyond eBPF

- thenewstack.io kubernetes - November 18, 2024

Operant AI's 3D Runtime Defense Suite gives developers an option beyond eBPF to stop threats in real time against inherently unpredictable LLMs.

Platform Engineering offers notable pay and flexibility advantages compared to DevOps roles, according to Q3 2024 data.

79% of IT leaders face secrets leaks with 12.7M credentials exposed on GitHub. Learn solutions now.

As generative AI models become increasingly integrated into business applications, it's crucial to evaluate the potential security risks they introduce. At AWS re:Invent 2023, we presented on this topic, helping hundreds of customers maintain high-velocity decision-making for adopting new technologies securely. Customers who attended this session were able to better understand our recommended approach for […]

Ready to outsmart the hackers? Dive into this week's must-know updates.

Google launches Shielded Email, enabling unique aliases for sign-ups to boost privacy and reduce spam.

Cut pen testing costs by 60% with automated solutions like vPenTest. Achieve frequent, real-time network security beyond compliance schedules

New phishing campaign targets Black Friday e-commerce shoppers in Europe and US, stealing personal and financial data via fake brand websites.

The success of any app modernization project hinges on which technologies you choose to implement and how you implement them.

Five Great DevOps Job Opportunities - DevOps.com

- devops.com - November 18, 2024

Looking to change employer? The five DevOps job postings shared this week include roles at Tesla, TransUnion and Taylor Made Golf Company.

NSO Group exploited WhatsApp to install Pegasus spyware even after Meta sued, controlling operations themselves, not clients, legal documents reveal.

Critical vulnerability (CVE-2024-10924) in Really Simple Security plugin allows attackers admin access to WordPress sites. Over 4 million affected.

My last few blog posts have been about how I used TLA+ to gain a better understanding of database transaction consistency models. This post will be in the same spirit, but I'll be using a dif…

SRE Weekly Issue #451 – SRE WEEKLY

- sreweekly.com - November 17, 2024

Most fascinating air incident report I've seen in awhile! The pilots deviated from the non-normal checklist, and it immediately made me think of runbooks. On the one hand, you want the runbook to be simple and easy to handle in an incident. On the other hand, it can be very useful to tell the operator

Backstage Multicluster UI for Cloud Foundry and Kubernetes

- thenewstack.io kubernetes - November 16, 2024

A hands-on guide to adding Stratos, a multicluster UI, into Backstage's developer portal framework.

Palo Alto Networks confirms active exploitation of a critical zero-day in PAN-OS firewalls; users urged to secure interfaces immediately.

BrazenBamboo exploits an unpatched FortiClient flaw to steal VPN credentials using DEEPDATA malware. Fortinet users advised to stay alert.

Introduction AWS re:Invent 2024, the annual Amazon Web Services conference, is fast approaching. This year's event will feature a full track of sessions focused on Kubernetes and other cloud-native technologies. To help you navigate the extensive session catalog, we've compiled a list of sessions around Kubernetes and cloud-native related topics. They have been grouped by […]

It's fitting that on the last day of KubeCon it was time to celebrate the community and the 10th anniversary of Kubernetes. A packed ballroom at the Salt Palace Convention Center was treated to a lot…

SUSE Says Rancher Observability Is Better Than Pure Plays

- thenewstack.io kubernetes - November 15, 2024

SUSE Cloud Observability is touted as an all-encompassing platform for SUSE and Rancher environments.

Amazon Data Firehose introduces a new capability that captures database changes and streams updates to a data lake or warehouse, supporting PostgreSQL, MySQL, Oracle, SQL Server, and MongoDB, with automatic scaling and minimal impact on transaction performance.

Splunk has made a bevy of updates to its observability platforms, including a revamped user interface that provides a consistent experience.

WezRat malware, linked to Iranian hackers, uses phishing and Trojanized Chrome installers to steal data.

At Amazon Web Services (AWS), we've built our services with secure by design principles from day one, including features that set a high bar for our customers' default security posture. Strong authentication is a foundational component in overall account security, and the use of multi-factor authentication (MFA) is one of the simplest and most effective […]

Ephemeral Environments Are Better for Scaling DevOps Tests

- thenewstack.io devops - November 15, 2024

Ephemeral environments allow DevOps teams to test features faster without impacting shared resources.

Shift-left your cloud compliance auditing with Audit Manager

- GCP security blogs - November 15, 2024

Our Audit Manager service, which can digitize and help streamline the compliance auditing process, is now generally available.

What's new with HPC

- GCP compute blogs - November 15, 2024

As we get ready for Supercomputing 2024 in Atlanta, here are the latest developments from Google Cloud in the high performance computing space.

In today's digital landscape, businesses rely on consistent and secure backups for data protection and disaster recovery (DR). A centralized backup policy enables organizations to enforce uniform data protection standards across departments and workloads, helping to maintain compliance and minimize risks. In the cloud, organizations use backup policies to manage data protection from a central […]

Eliminate long-term root credentials, perform privileged tasks via short-lived sessions, and centrally manage root access - aligning with security best practices.

Akka, formerly Lightbend, today at the KubeCon + CloudNativeCon 2024 conference unfurled PaaS for building distributed Java applications.

OpenTelemetry (also known as OTel) is an open-source observability framework with tools, libraries, APIs, and SDKs for collecting, processing, and exporting rich telemetry data such as traces, metrics…

Backstage is an open-source framework for building developer portals, created by Spotify, designed to streamline the process of building software and digital products. Backstage restores order to…

Kyverno is an open-source policy engine designed for Kubernetes that allows teams to validate, mutate, and generate configurations, enabling the automation of security policies as code…

Planning a large conference like KubeCon + CloudNativeCon Europe or North America is a complex endeavor that begins years in advance. The venue and date selection process is an exercise in compromise…

2025 is right around the corner, and we're thrilled to announce the CNCF 2025 lineup of events! Next year, we are expanding our reach and will host our first-ever KubeCon + CloudNativeCon in Japan.

Internal Developer Portals Should Be Internal Developer Hubs

- thenewstack.io devops - November 15, 2024

Many IDPs function as passive portals, adding complexity without real developer benefit.

Our mission at AWS Security Assurance Services is to assist with Payment Card Industry Data Security Standard (PCI DSS) compliance for Amazon Web Services (AWS) customers. We work closely with AWS customers to answer their questions about compliance on the AWS Cloud, finding and implementing solutions, and optimizing their controls and assessments. We've compiled the […]

As organizations continue to roll out cloud-connected Internet-of-Things (IoT) applications, the need for accurate and reliable time synchronization has become increasingly critical. Although Amazon Web Services (AWS) provides the Amazon Time Sync Service for basic Network Time Protocol (NTP) needs, some IoT scenarios need a custom NTP solution. For example, users want to serve many IoT […]

CNCF Sics Developers on Kubernetes Patent Trolls

- thenewstack.io kubernetes - November 15, 2024

Patent trolls are shaking down Kubernetes developers and users, so the CNCF and friends are going after them.

Two Vertex AI flaws let attackers escalate privileges and exfiltrate sensitive ML models. Risks now mitigated.

Learn how automation, crypto agility, and best practices can tackle certificate revocation risks.

Vietnam-linked hackers target Europe and Asia with PXA Stealer malware, stealing credentials and Facebook ad data.

How AI Is Transforming IAM and Identity Security

- thehackernews.com - November 15, 2024

AI revolutionizes IAM by enabling real-time monitoring, anomaly detection, and adaptive governance for better security.

The iterative process is greatly enhanced by data-driven feedback loops, which allow teams to act on data to inform product decisions.

Critical PostgreSQL flaw (CVE-2024-10979) patched; update now to prevent code execution and data breaches.

Bitfinex hacker Ilya Lichtenstein sentenced for laundering $10.5B in bitcoin from 2016 crypto heist

Critical Palo Alto Expedition flaws exploited in attacks; CISA mandates urgent patch by December 5

On the second day of KubeCon, nearly 9,200 attendees had the opportunity to focus on the theme of the day – security – while attending sessions, visiting the Sponsor Showcase, and networking.

GitOps provides a pathway to stable, dependable, and predictable cloud native infrastructure and workflows. Over the past few years GitOps and Argo have grown hand in hand as ArgoCD has become a…

Planning to join us in Las Vegas from Dec 2 to Dec 6 at AWS re:Invent 2024 and looking to learn more about monitoring and observability? If you are, this blog highlights Cloud Operations sessions that focus on monitoring and observability at re:Invent 2024! Monitoring and Observability allows you to understand the health of your applications and […]

We are so excited to see you at our annual cloud computing conference, AWS re:Invent 2024 in Las Vegas from Dec 2 to Dec 6. At AWS re:Invent, cloud enthusiasts from all over the world will gather together to collaborate and learn from one another! You will have the opportunity to meet with AWS experts, […]

Customers operate hundreds of applications and often those applications consist of hundreds to thousands of resources. This can get complex and overwhelming having to monitor and manage individual resources and identifying what resources are tied to an application while making sure their applications are available, secure, cost-optimized, and performing optimally. The underlying concept of applications […]

We are so excited to see you at our annual cloud computing conference, AWS re:Invent 2024 in Las Vegas from Dec 2 to Dec 6. At this conference, you'll have the opportunity to attend thought-provoking keynotes, dive deep into our services, and meet with fellow cloud enthusiasts! No matter your level of expertise, we'll have sessions […]

Cybercriminals exploit 'Sitting Ducks' attacks, hijacking thousands of domains for phishing and fraud, Infoblox reports.

A new Google survey shines a light onto the high security costs of legacy tech, explain Phil Venables and Andy Wen. Here's what you should know.

A new ebook, Building a Secure Data Platform with Google Cloud, details the tools available to protect your data as you use it to grow your business.

How System Initiative Treats AWS Components as Digital Twins

- thenewstack.io devops - November 14, 2024

System Initiative is a set of graphical components intended to represent their AWS equivalents as digital twins. We take it for a spin.

Google exposes cloaking scams targeting users with fake sites and AI-driven fraud, bolstering defenses with real-time scam detection.

This post is written by Julian Wood, Principal Developer Advocate, and Leandro Cavalcante Damascena, Senior Solutions Architect Engineer. AWS Lambda now supports Python 3.13 as both a managed runtime and container base image. Python is a popular language for building serverless applications. The Python 3.13 release includes a number of changes to the language, the implementation, and the […]

How can developers use CI/CD to improve their database software deployment process, and where should they begin?

5 BCDR Oversights That Leave You Exposed to Ransomware

- thehackernews.com - November 14, 2024

This article highlights the top five BCDR mistakes businesses make that leave them vulnerable to ransomware attacks. Learn more.

A guide to assist leaders in the facilitation of their organization's success in the endeavor of agile transformation.

TikTok Pixel Privacy Nightmare: A New Case Study

- thehackernews.com - November 14, 2024

Reflectiz identified a TikTok pixel misconfiguration at a travel site, preventing a costly GDPR breach.

North Korean Lazarus Group uses extended macOS file attributes to deliver RustyAttr malware to unsuspecting users

Russian actors exploit NTLM flaw in attacks on Ukraine, patched by Microsoft this week

More than 9,000 people convened at the Salt Palace Convention Center in Salt Lake City for the first day of KubeCon + CloudNativeCon North America. The mood was energetic and lively and the audience…

An Interview With the Target & Home Depot Hacker

- krebsonsecurity.com - November 14, 2024

In December 2023, KrebsOnSecurity revealed the real-life identity of Rescator, the nickname used by a Russian cybercriminal who sold more than 100 million payment cards stolen from Target and Home Depot between 2013 and 2014. Moscow resident Mikhail Shefel, who…

Devtron's Kubernetes Dashboard Tracks GitOps-Driven Apps

- thenewstack.io kubernetes - November 13, 2024

An open source project, Devtron provides an end-to-end CI/CD pipeline enabling a no code software delivery workflow for Kubernetes through Helm or GitOps with ArgoCD.

Improve data loading times for ML inference apps on GKE

- GCP containers blogs - November 13, 2024

When running AI/ML inference workloads on GKE, learn how to accelerate data loading for inference serving containers and downloading models + weights.

Kloudfuse 3.0: an All-in-One Observability Platform Emerges

- thenewstack.io observability - November 13, 2024

The startup rolled out its latest version at KubeCon + CloudNativeCon this week, setting up a challenge to the dominance of Datadog, Grafana and other platforms.

Project post from the LitmusChaos Community As enterprises continue to scale their systems, resilience and stability remain crucial. Testing these under real-world failure scenarios without impacting…

MinIO Unveils AIStor: A Potential Object Storage Game-Changer

- thenewstack.io storage - November 13, 2024

MiniO is betting that with the rise of artificial intelligence, object storage will become more important than ever.

Our next Security Talks is coming on November 19. This free, day-long virtual event is packed with security insights and strategies.

Build multi-cluster infrastructure with GKE fleets and Argo CD

- GCP containers blogs - November 13, 2024

Set up a team-centric multi-cluster infrastructure with Google Kubernetes Engine (GKE) fleets and Argo CD, plus Connect Gateway and Workload Identity.

Proactive dependency management isn't just best practice, so implement these strategies in your projects to stay ahead of potential issues.

We're thrilled to share the details of the inaugural contest in our Cloud Native Heroes Challenge program, a series of crowdsourced "prior art" contests in which cloud native developers can earn swag…

Project post by Alexander Schwartz, Keycloak Maintainer Keycloak brings scalable and customizable authentication to your environment! The team is thrilled to announce the release of Keycloak 26 which…

Today at KubeCon+CloudNativeCon North America 2024, CNCF announced the Cloud Native Heroes Challenge, a patent troll bounty program in which cloud native developers and technologists can earn swag and…

Announcing the release of KubeVirt v1.4

- cncf.io - November 13, 2024

Project post from the Kubevirt Community The KubeVirt Community is proud to announce the release of v1.4. This release aligns with Kubernetes v1.31 and is the sixth KubeVirt release to follow the…

Hamas-linked cyber group WIRTE expands attacks on Israeli entities, using wipers and phishing tools.

Google Kubernetes Engine supports 65,000-node clusters

- GCP containers blogs - November 13, 2024

With support for 65,000-node clusters, Google Kubernetes Engine offers more than 10X larger scale than the other two largest public cloud providers.

Trillium MLPerf 4.1 training benchmarks

- GCP compute blogs - November 13, 2024

MLPerf 4.1 training benchmarks show that Trillium delivers up to 1.8x better performance-per-dollar vs. Cloud TPU v5p and 99% scaling efficiency.

Scarf today revealed it has integrated its platform for tracking consumption of open source software with the Salesforce CRM platform.

Analysis finds that IT professionals specializing in DevOps move into leadership roles within their organizations within two to three years.

Bitdefender releases a free tool to decrypt ShrinkLocker ransomware, targeting systems using BitLocker

We're thrilled to announce the finalists for the DevOps Dozen Awards 2024, recognizing this year's top innovators and their standout contributions in the

Big Bang vs. Incremental Migration: Which Cloud Strategy Wins?

- thenewstack.io observability - November 13, 2024

Effective cloud migration is about steady progress, proper monitoring, and adjusting to new insights.

LayerX's guide helps CISOs secure browsers, addressing data leakage, credential theft, and SaaS access

10 critical OvrC flaws risk remote control of IoT devices; CISA warns on urgent security fixes

Microsoft's November Patch Tuesday addresses 90 security flaws, including actively exploited NTLM and Task Scheduler vulnerabilities.

Iran's TA455 hackers target aerospace with fake jobs and SnailResin malware, emulating North Korean tactics.

Thousands of KubeCon + CloudNativecon North America attendees braved cold rain – and even snow – to attend 16 co-located events in the Salt Palace Convention Center in Salt Lake City.

New Resource Control Policies let you centrally restrict AWS service access across accounts, bolstering security with preventative controls that supersede permissive policies - even for external users. See how these powerful governance tools complement Service Control Policies and integrate with AWS services.

Today, Amazon Web Services (AWS) announced the launch and general availability of Amazon Q Developer plugins for Datadog and Wiz in the AWS Management Console. When chatting with Amazon Q in the console, customers can access a subset of information from Datadog and Wiz services using natural language. Ask questions like @datadog do I have […]

Orchestration Is Your Secret Weapon for Smoother Workflows

- thenewstack.io devops - November 12, 2024

Shifting from isolated tools to unified orchestration enables real-time adaptability and faster decision-making.

Amazon Web Services (AWS) customers use various AWS services to migrate, build, and innovate in the AWS Cloud. To align with compliance requirements, customers need to monitor, evaluate, and detect changes made to AWS resources. AWS Config continuously audits, assesses, and evaluates the configurations of your AWS resources. AWS Config rules continuously evaluate your AWS […]

Using AI for DevOps: What Developers and Ops Need To Know

- thenewstack.io devops - November 12, 2024

For insights on what developers should consider when using AI with DevOps, we collected perspectives from DevOps experts and developers.

Project post by the Jaeger maintainers Jaeger, the popular open-source distributed tracing platform, has had a successful 9 year history as being one of the first graduated projects in the Cloud…

We're excited to share the Cilium project journey report! Cilium is an open source platform designed for cloud-native networking, security, and observability, leveraging eBPF technology.

Pulumi Centralizes Kubernetes Management with Native Tools

- thenewstack.io kubernetes - November 12, 2024

Infrastructure as Code (IaC) platform now offers a Kubernetes-native deployment agent for improved security and scalability.

Managing threat intelligence in Falco

- cncf.io - November 12, 2024

Falco has become a vital tool for security practitioners seeking to safeguard containerized and cloud-native environments. Leveraging the power of eBPF (Extended Berkeley Packet Filter)…

AWS Snow device updates | Amazon Web Services

- AWS storage blogs - November 12, 2024

Since its launch in 2015, customers have used AWS Snow devices to move data to the AWS Cloud or run compute and processing workloads at the edge. Our innovations since have made moving data to AWS and running workloads at the edge, faster, more efficient, and more cost effective. During the same time, network bandwidth […]

The CNCF Technical Oversight Committee (TOC) has voted to accept wasmCloud as a CNCF incubating project. wasmCloud, an open source project from the Cloud Native Computing Foundation (CNCF)…

GoIssue enables targeted phishing on GitHub users, risking data theft and developer breache

Critical flaw in Citrix Apps enables RCE attacks; hotfixes now available to mitigate risks

North Korean hackers deploy Flutter-based malware targeting Apple macOS, evading detection in cryptocurrency attacks.

Behavioral analytics is transforming SOC workflows, enhancing accuracy, reducing false positives, and improving response times.

Ymir ransomware exploits memory management to evade detection, targeting credentials for stealthy network breaches

These policies are essential to ensure optimal API performance, security and alignment with evolving business and technical demands.

Customers often spend time finding and managing individual resources within their applications. They need to find various applications, manage and perform application tasks, and monitor resources during different stages of the application lifecycle. Customers usually have hundreds to thousands of resources within even a single AWS account. This requires navigating across multiple AWS services pages […]

Microsoft Patch Tuesday, November 2024 Edition

- krebsonsecurity.com - November 12, 2024

Microsoft today released updates to plug at least 89 security holes in its Windows operating systems and other software. November's patch batch includes fixes for two zero-day vulnerabilities that are already being exploited by attackers, as well as two other…

AWS CloudFormation makes it easy to model and provision your cloud application infrastructure as code. CloudFormation templates can be written directly in JSON or YAML, or they can be generated by tools like the AWS Cloud Development Kit (CDK). These templates are submitted to the CloudFormation service and the resources are deployed together as stacks, […]

Dataplex discovers and catalogs Cloud Storage data

- GCP storage blogs - November 11, 2024

Dataplex can now automatically discover and catalog Google Cloud Storage data, extracting metadata, and creating BigQuery and BigLake tables.

Google Cloud expands CVE program

- GCP security blogs - November 11, 2024

As part of our commitment to security and transparency on vulnerabilities found in our products and services, we now will issue CVEs for critical Google Cloud vulnerabilities.

New DNS-based endpoint for the GKE control plane

- GCP containers blogs - November 11, 2024

A new DNS-based endpoint for GKE clusters provides enhanced flexibility when accessing the control plane and configuring security.

Companies like ad-tech firm Verve are reducing latency, improving performance, and saving costs with C4 machines, GKE gateway, and custom compute classes.

Happy 20th Anniversary of the AWS News Blog! 🎉🥳🎊 On November 9, 2004, Jeff Barr published his first blog post. At the time, he started a personal blog site using TypePad. He wanted to speak to his readers with his personal voice, not the company or team. On April 29, 2014, we created a new […]

AWS BuilderCards 2nd Edition: Gamify AWS learning with enhanced design, new mission cards, generative AI deck, and improved game mechanics for seamless architecturing fun.

Member post originally published on the Redpill Linpro blog by Amelie Löwe In this blog post, we'll explore how to get involved in CNCF (Cloud Native Computing Foundation) open source projects…

TEL AVIV, Israel, 11th November 2024, CyberNewsWire

Bengal cat ownership searches in Australia lead to GootLoader malware, Sophos reveals.

AWS re:Invent 2024, which takes place December 2–6 in Las Vegas, will be packed with invaluable sessions for security professionals, cloud architects, and compliance leaders who are eager to learn about the latest security innovations. This year's event puts best practices for zero trust, generative AI–driven security, identity and access management (IAM), DevSecOps, network and […]

Boost Your Shipping Velocity With Argo and Buildpacks

- thenewstack.io devops - November 11, 2024

Learn how to use CNCF incubating project Buildpacks, an application definition, and image build to skip the Dockerfile step and increase developer productivity.

Dive into this week's wildest cyber threats and top defense tips in my recap!

Discover how DTCC leverages automated security validation to enhance resilience, cut costs, and reduce cyber risks

Company releases 'Am I Isolated', an open source container security benchmark and Rust-based container runtime scanner.

HPE addresses critical flaws in Aruba Access Points, preventing remote code execution for secure networking

Over 20 vulnerabilities found in ML open-source tools pose severe risks, including server hijacking and data breaches.

Five Great DevOps Job Opportunities - DevOps.com

- devops.com - November 11, 2024

Are you at a crossroads in your career? This week our highlighted DevOps job opportunities include a director role at Harley-Davidson.

Fileless Remcos RAT spreads through Excel phishing, exploiting remote code flaws to steal data undetected.

SRE Weekly Issue #450 – SRE WEEKLY

- sreweekly.com - November 10, 2024

If you're heading to KubeCon this week, here are some talks to consider.

FBI: Spike in Hacked Police Emails, Fake Subpoenas

- krebsonsecurity.com - November 09, 2024

The Federal Bureau of Investigation (FBI) is urging police departments and governments worldwide to beef up security around their email systems, citing a recent increase in cybercriminal services that use hacked police email accounts to send unauthorized subpoenas and customer…

Firewall deployment patterns - Digi Hunch

- digihunch.com - November 09, 2024

Firewall deployment an important design area in cloud networking infrastructure. This article reviews a few firewall deployment patterns

Palo Alto urges securing PAN-OS interface amid RCE claim; CISA flags new vulnerability

Bitcoin Fog founder sentenced to 12 years for laundering $400M in criminal proceeds using his darknet mixer.

Introduction Amazon Elastic Kubernetes Service (Amazon EKS) now supports Amazon Application Recovery Controller (ARC). ARC is an AWS service that allows you to prepare for and recover from AWS Region or Availability Zone (AZ) impairments. ARC provides two sets of capabilities: Multi-AZ recovery, which includes zonal shift and zonal autoshift, and multi-Region recovery, which includes routing […]

Amazon Location unveils 17 new APIs with enhanced route optimization, toll cost calculations, GPS trace snapping, proximity search, predictive suggestions, and static/dynamic map rendering - streamlining developer experiences across a wide range of location-based applications.

A survey of DevOps practitioners finds 59% work for organizations that have a sustainability initiative tied to application development.

By embracing chaos engineering, companies can avoid outages and ensure a seamless experience for their users, even when disruptions occur.

Just as you ensure a physical store is fully staffed and stocked for Black Friday, you must also ensure your digital presence is ready.

Member post originally published on the Devtron blog by Siddhant Khisty While working with Kubernetes, the cluster has many tiny internal components that all work together to deploy and manage your…

AndroxGh0st malware integrates Mozi botnet to exploit IoT vulnerabilities, expanding attacks on critical infrastructure

Redgate this week previewed machine learning capabilities that it is adding to its test data management and database monitoring platforms.

Roblox users at risk as fake NPM packages install data-stealing malware, exploiting open-source trust

Pakistan's Transparent Tribe and China-linked IcePeony target India, leveraging advanced malware tools for cyber espionage.

vCISO Academy equips MSPs with expertise to meet growing SMB cybersecurity demands. Learn to scale services

Improve Microservices With These New Load Balancing Strategies

- thenewstack.io devops - November 08, 2024

Ensuring proper load distribution on both the client side with tools like Ribbon and on the server side using Nginx enhances system scalability and resilience.

Discover Huntress SAT's storytelling approach to cybersecurity training, making security awareness engaging and memorable.

New CRON#TRAP malware installs a Linux VM backdoor on Windows, evading antivirus, and allowing hidden control over compromised systems.

CISA alerts to active exploits in Palo Alto, CyberPanel, and Android, urging urgent fixes

When deploying software, it's critical to have visibility into all stages of the deployment process. Knowing the status of ongoing deployments, troubleshooting issues when things go wrong, and having an audit trail of past deployments are essential for ensuring a safe and reliable release process. Amazon Elastic Container Service (Amazon ECS) now provides enhanced observability […]

Project post by Lin Sun, Solo.io, for the Istio Steering and Technical Oversight Committees We are proud to announce that Istio's ambient data plane mode has reached General Availability…

Delhivery is one of the largest third-party logistics providers in India. It fulfills millions of packages every day, servicing over 18,000 pin codes in India and powered by more than 20 automated sort centers, 90 warehouses, with over 2800 delivery centers. Data is at the core of the Delhivery's business. In response to recent regulatory […]

With 3x throughput, 20x faster scaling, and 90% reduced recovery time, Express brokers deliver unmatched performance for Apache Kafka on AWS, streamlining operations while cutting infrastructure costs by 50%.

From VPC firewall rules to Cloud NGFW Network Firewall Policies

- GCP networking blogs - November 07, 2024

Learn how and why to migrate to Cloud NGFW Network Firewall Policies from VPC firewall rules for a more powerful network security solution.

Service Extensions plugins for Application Load Balancers

- GCP networking blogs - November 07, 2024

Service Extensions plugins for Application Load Balancers let you run custom code directly in the request/response path in a managed environment.

Announcing Kyverno release 1.13!

- cncf.io - November 07, 2024

Project post originally published on the Kyverno blog Kyverno 1.13 released with Sigstore bundle verification, exceptions for validatingAdmissionPolicies, new assertion trees, generate enhancments…

Community post originally published on Medium by Giorgi Keratishvili If you have worked on Kubernetes production systems at any time during the last 10 years and needed to check your pods or…

SlateDB: 'Bottomless' Databases Built on Cloud Object Stores

- thenewstack.io storage - November 07, 2024

SlateDB can dramatically cut costs of running a key-value store in the cloud, as long as users don't mind a bit of latency.

North Korean hackers launch Hidden Risk malware targeting macOS devices in crypto firms via fake PDFs.

PartyRock is an intuitive, hands-on generative AI app-building playground based on Amazon Bedrock. It allows users to experiment with generative AI technologies and build fun applications without coding, such as quiz generators or resume optimizers. Although providing a free generative AI playground online offers immense value to builders, it also presents significant security challenges. In […]

IBM Research is testing a set of AI agents that discovers bugs in code found in a GitHub repository and recommendations to remediate them.

A survey of leaders and practitioners finds more than 76% work for organizations that have made software supply chain security a priority.

A Hacker's Guide to Password Cracking

- thehackernews.com - November 07, 2024

Learn hackers' tactics for cracking passwords and how to defend your organization from breaches

MirrorFace, a China-linked hacking group, expands operations to Europe, targeting EU diplomats via Expo 2025 phishing.

5 Most Common Malware Techniques in 2024

- thehackernews.com - November 07, 2024

ANY.RUN's Q3 2024 report reveals malware's top techniques, from disabling event logs to using PowerShell

Phishing attacks disguise as copyright claims to spread Rhadamanthys and SteelFox malware globally.

Malicious PyPI package 'fabrice' has exfiltrated AWS credentials from thousands of users undetected for three years.

Cisco's critical update fixes a security flaw in URWB Access Points, blocking remote code execution.

Canada orders TikTok shutdown over national security risks but allows app access for users.

This post is written by Jeremy Girven, Solutions Architect at AWS. Amazon Web Services (AWS) and AMD have collaborated since 2018 to deliver cost effective performance for a broad variety of Microsoft workloads, such as Microsoft SQL Server, Microsoft Exchange Server, Microsoft SharePoint Server, Microsoft Systems Center suite, Active Directory, and many other Microsoft workload […]

As we gear up ahead of AWS re:Invent 2024, we're thrilled to announce our final cohort of new AWS Heroes! These individuals exemplify expertise and dedication to leveraging AWS technologies and sharing knowledge. Their contributions to the AWS community are greatly appreciated, and today we're excited to celebrate them. Ayyanar Jeyakrishnan – Bengaluru, India Machine […]

VEILDrive exploits Microsoft SaaS services to launch undetected malware attacks on U.S. infrastructure.

This post is written by Ballu Singh, Principal Solutions Architect at AWS, Ankush Goyal, Enterprise Support Lead in AWS Enterprise Support, Hasan Tariq, Principal Solutions Architect with AWS and Ninad Joshi, Senior Solutions Architect at AWS. The On-Demand Capacity Reservations (ODCR) allows you to reserve compute capacity for your Amazon Elastic Compute Cloud (Amazon EC2) […]

Project post by the Falco Team and Nigel Douglas Falco achieved CNCF Graduation status on February 29, 2024. Following the celebration of this significant milestone at KubeCon EU in Paris earlier this…

Symbiotic Security emerged from stealth to launch a namesake platform that enables application developers to remediate errors in real-time.

Project post originally on the Litmus blog by Sayan Mondal, Community Manager and Maintainer Over the past few years, LitmusChaos has evolved tremendously, becoming a leading open-source tool for…

Member post by Rajdeep Saha, Principal Solutions Architect, AWS and Praseeda Sathaye, Principal SA, Containers & OSS, AWS Karpenter is an open-source project that provides node lifecycle management to…

Cybersecurity experts warn that Winos 4.0 malware is spreading via gaming apps, targeting gamers to steal data using advanced techniques.

Kloudfuse updated its observability platform to add support for continuous profiling and RUM along with analytics and AI capabilities.

Balancing agility and security in DevSecOps is achievable with the right mix of automation, collaboration and continuous feedback.

9 Steps to Get CTEM on Your 2025 Budgetary Radar

- thehackernews.com - November 06, 2024

CTEM provides proactive threat management and cost savings. Here's why it should top your 2025 budget

Observability in 2030 will require integrated telemetry across layers, events for context, and decoupling telemetry collection from analysis,

The true business value of providing a best-in-class developer experience is not being articulated enough, as that is a profit driver.

Agile Data Management Explained and Demystified

- thenewstack.io devops - November 06, 2024

Achieve data efficiency and adaptability by applying agile principles thoughtfully.

INTERPOL dismantles 22,000 cyber threat servers in a global operation, seizing devices and arresting suspects.

Incredibuild has acquired Garden, a provider of an open-source framework making it simpler to track relationships between software components.

Meta fined $15.67M in South Korea for illegal data collection and sharing sensitive user data.

Google Cloud enforces mandatory MFA by 2025 to boost global account security and counter cyber threats.

This post was created in collaboration with Infinitium Engineering Team. Introduction Infinitium (a Euronet Company) is a leading digital payments company in Southeast Asia, specializing in secure online payment solutions and risk management services. With a strong presence across the Asia Pacific region, Infinitium offers cutting-edge technologies such as 3D Secure (3DS) authentication, fraud detection […]

Canadian Man Arrested in Snowflake Data Extortions

- krebsonsecurity.com - November 05, 2024

A 26-year-old man in Ontario, Canada has been arrested for allegedly stealing data from and extorting more than 160 companies that used the cloud data service Snowflake. On October 30, Canadian authorities arrested Alexander Moucka, a.k.a. Connor Riley Moucka of…

This post is co-written with Nicolas Trettel, Cloud Engineering Senior Advisor at Cigna. Monitoring applications and alerting on issues is crucial for building resilient systems. Amazon CloudWatch is a service that monitors applications, responds to performance changes, optimizes resource use, and provides insights into operational health. By collecting data across AWS resources, CloudWatch gives visibility […]

10 Tips for Kubernetes Architects on K8s' 10th Birthday

- thenewstack.io kubernetes - November 05, 2024

In this interview, CNCF head of Ecosystem Taylor Dolezal provides ten tips for architects to navigate Kubernetes and its ecosystem.

Vulnerability management is a vital part of network, application, and infrastructure security, and its goal is to protect an organization from inadvertent access and exposure of sensitive data and infrastructure. As part of vulnerability management, organizations typically perform a risk assessment to determine which vulnerabilities pose the greatest risk, evaluate their impact on business goals […]

AWS Config is a fully managed service that provides customers with resource inventory, configuration monitoring, and configuration change notifications to support security, governance, and compliance for workloads in AWS. An AWS Config rule represents desired configurations for a resource and evaluates changes in near real-time and records the compliance history in AWS Config. Using AWS […]

Usage of serverless technology in regulated industries like financial services is growing. This growth demands robust resilience validation. Chaos engineering for Serverless has become crucial for ensuring reliable and available serverless applications. By purposefully injecting failures and stresses into serverless components, teams can uncover hidden weaknesses and validate the fault tolerance of their systems. Previously, […]

This post is written by Rafet Ducic, Senior Solutions Architect at Amazon Web Services (AWS) Introduction Amazon Elastic Compute Cloud (Amazon EC2) now lets you modify CPU configurations after an instance has launched. With this new feature, users can change instance CPU settings either by directly modifying the CPU configuration, or when changing instance size […]

From December 2nd to December 6th, AWS will hold its annual premier learning event: re:Invent. At this event, attendees can become stronger and more proficient in any area of AWS technology through a variety of experiences: large keynotes given by AWS leaders, smaller innovation talks and interactive working sessions given by AWS experts, and fun […]

FBI seeks public help on global cyberattacks involving Chinese APTs using edge device exploits

Data security and data authorization, as distinct from user authorization, is a critical component of business workload architectures. Its importance has grown with the evolution of artificial intelligence (AI) technology, with generative AI introducing new opportunities to use internal data sources with large language models (LLMs) and multimodal foundation models (FMs) to augment model outputs. […]

Kubestronaut in Orbit: Rishabh Sharma

- cncf.io - November 05, 2024

Get to know Rishabh This week's Kubestronaut in Orbit, Rishabh Sharma, our first Kubestonaut from Finland, is a senior software development engineer where he manages cloud native tech solutions for…

Member post by Stanislava Racheva, DevOps & Cloud engineer at ITGix In modern Kubernetes environments, managing container images and ensuring that applications are always running the latest…

We are delighted to announce our new DEI Community Hub at KubeCon + CloudNativeCon North America, sponsored by Google Cloud, a physical space to connect, learn, and celebrate diversity, equity…

Adapting to AI in means rethinking our CI/CD flows, embracing new testing methodologies, and constantly evaluating AI outputs.

AI agents can transform DevOps practices, leading to efficient operations while freeing human engineers to focus on strategic tasks.

The Birth and Continuing Evolution of Platform Engineering

- thenewstack.io platform-engineering - November 05, 2024

How tech trends involving Google, the cloud, and Kubernetes came together to inspire the creation of platform engineering.

When building software, especially SaaS, sticking to manual processes in DevOps is like bringing a knife to a gunfight.

ToxicPanda, a new Android malware, bypasses 2FA and exploits accessibility services to steal funds.

Why Companies Are Ditching the Cloud: The Rise of Cloud Repatriation

- thenewstack.io cloud-native - November 05, 2024

Major organizations like 37signals and GEICO highlight the economic and strategic reasons to reconsider cloud infrastructure.

Leveraging Wazuh for Zero Trust security

- thehackernews.com - November 05, 2024

Learn how Zero Trust security protects organizations by eliminating implicit trust, enabling continuous monitoring, and enhancing incident response

Top Costly Cloud Mistakes — and How To Sidestep Them

- thenewstack.io devops - November 05, 2024

Build a cost-aware developer culture by focusing on teamwork and embracing shared responsibility.

Synology addresses a critical zero-click RCE flaw, CVE-2024-10443, impacting millions of NAS devices. Update now.

Broadcom today revealed it is adding a raft of additional capabilities to the optional portfolio of services it makes available on top of VCF,

New npm malware campaign uses Ethereum smart contracts for resilient C2, impacting 287 packages

Canadian authorities arrest Alexander "Connor" Moucka for alleged Snowflake breach linked to data extortion.

Google warns of CVE-2024-43093, a privilege escalation flaw in Android, now under active exploitation.

Cloud Apps Slow? Network Throttling Could Be Why

- thenewstack.io devops - November 04, 2024

Network throttling often goes unnoticed in cloud systems, yet it can drastically affect application performance and user experience.

The spooky season has come and gone now. While there aren't any Halloween-themed releases, AWS has celebrated it in big style by having a plethora of exciting releases last week! I think it's safe to say that we have truly entered the 'pre' re:Invent stage as more and more interesting things are being released every […]

To help keep our customers secure, starting in 2025 we will require them to use MFA when accessing Google Cloud.

Co-chairs: Megan Reynolds, Kelsey Hightower November 12, 2024 Salt Lake City, Utah At the Cloud Native StartupFest expect to get inspired by hearing from successful cloud native entrepreneurs…

DevOps Moves Beyond Automation to Tackle New Challenges

- thenewstack.io devops - November 04, 2024

As basic DevOps adoption becomes widespread, organizations are shifting focus to new frontiers including security integration, resilience, and organizational transformation.

The Modern Stack 2024 - DevOps.com

- devops.com - November 04, 2024

So much technology, so little understanding.

Ollama AI faces six critical vulnerabilities, including DoS, model theft, and poisoning. Experts urge immediate measures to protect 9,831 exposed serv

Security is a shared responsibility between Amazon Web Services (AWS) and you, the customer. As a customer, the services you choose, how you connect them, and how you run your solutions can impact your security posture. To help customers fulfill their responsibilities and find the right balance for their business, under the shared responsibility model, […]

SIG post by Dotan Horovits and Adriel Perkins, Project Leads, SIG CI/CD Observability, OpenTelemetry We've been talking about the need for a common "language" for reporting and observing CI/

This week, we're diving into the chaos as hackers ramp up attacks, including North Korean ransomware collaboration and evasive password spraying tacti

German authorities disrupt dstat[.]cc, a DDoS-for-hire platform; two suspects arrested amid crackdown.

Five Great DevOps Job Opportunities - DevOps.com

- devops.com - November 04, 2024

Thinking of a career change? The five selected DevOps job postings this week include roles at Frontdoor, Unum and Northrup Grumman.

Prepare for holiday cybersecurity threats. Imperva highlights AI-driven attacks, including business logic abuse & DDoS

Google's Big Sleep AI framework uncovers a zero-day vulnerability in SQLite, showcasing AI-driven security potential.

Discover how the advanced FakeCall Android malware employs vishing to hijack calls and steal data

Extending MVCC to be serializable, in TLA+

- surfingcomplexity.blog - November 03, 2024

In the previous blog post, we saw how a transaction isolation strategy built on multi-version concurrency control (MVCC) does not implement the serializable isolation level. Instead, it implements …

SRE Weekly Issue #449 – SRE WEEKLY

- sreweekly.com - November 03, 2024

This new series seems promising! I won't link to every article in the series here, but if you're an early SRE, the intro-level articles published so far in this series are definitely worth a read.

Etckeeper: Back Your/etc/Files to Git for Safekeeping

- thenewstack.io storage - November 02, 2024

This tutorial will you how to install and use etckeeper so you can keep tabs on the comings and goings of your /etc/ directory.

Proactive Monitoring Will Maximize Your Cloud Storage Efficiency

- thenewstack.io devops - November 02, 2024

Effective cloud storage monitoring strategies are essential for protecting data, ensuring compliance, and reducing operational costs.

AI Testing: More Coverage, Fewer Bugs, New Risks

- thenewstack.io devops - November 02, 2024

AI tools are reshaping software testing with faster automation, round-the-clock coverage, and improved accuracy.

Booking.com Phishers May Leave You With Reservations

- krebsonsecurity.com - November 01, 2024

A number of cybercriminal innovations are making it easier for scammers to cash in on your upcoming travel plans. This story examines a recent spear-phishing campaign that ensued when a California hotel had its booking.com credentials stolen. We'll also explore…

AWS re:Invent is the premier learning conference hosted by AWS for the global cloud computing community. This year the Amazon Elastic Container Service (Amazon ECS) and AWS Fargate teams will share the latest trends, innovations, best practices, and tips to help you increase productivity, optimize costs, and enhance business agility. Join us in Las Vegas […]

Unlock Anthropic's Claude 3 Haiku model's full potential with Amazon Bedrock's fine-tuning for enhanced accuracy and customization.

New Relic unfurled a revamped observability platform based on an AI engine that enables anyone to employ natural language to surface insights.

DataStax has extended its support for the GitHub Copilot GenAI tool to now include the ability to write data to its Astra DBaaS platform.

Member post originally published on Middleware's blog In the world of cloud-native applications, Kubernetes stands as the go-to platform for container orchestration (the automated process of managing…

Member post originally published on Tetrate's blog by Cristofer TenEyck and Jimmy Song In the evolving landscape of cloud-native applications, securing service meshes across multiple clusters is…

New FBI, Israel Cyber Directorate advisory reveals Iranian cyber plot targeting 2024 Olympics, Israel's participation

Introduction Software development is complex and time consuming. Developers frequently need to stop building to get answers to hard, technical questions. What is the error in my code? How do I debug the logic? Where do I go to find this information? In 2024 Stack Overflow Developer Survey 53% of respondents agreed that waiting on […]

A global survey finds on average teams are grappling with 280 hours of median annual downtime a year, which equates to a third of their time.

EMERALDWHALE campaign exploits Git configurations, compromising 10,000+ repos and 15,000 credentials for phishing.

5 SaaS Misconfigurations Leading to Major Fu*%@ Ups

- thehackernews.com - November 01, 2024

Discover five critical SaaS misconfigurations that lead to security risks and learn prevention tactics

Platform Engineering's Most Critical First Decision

- thenewstack.io platform-engineering - November 01, 2024

This critical decision will likely determine the success or failure of your company's platform engineering project from the start. You do not want to get it wrong.

Chinese botnet Storm-0940 exploits routers, targets Microsoft users with covert password spray attacks.

How To Fail at Microservices

- thenewstack.io devops - November 01, 2024

Don't hold off fixing problems until they become too big and difficult to manage.

Microsoft delays Windows Copilot+ Recall feature to enhance privacy, with a new release slated for December.

Gain expert insights on securing identity systems from advanced threats in this free webinar.

Discover how the new Xiū gǒu phishing kit threatens users in multiple countries since September 2024.

In this post, we review the most common Domain Name System (DNS) strategies to migrate your applications to Amazon VPC Lattice in a phased approach. These options allow you to reduce downtime, minimize overhead, and maintain consistent DNS resolution for your clients and applications on AWS. VPC Lattice is a fully managed end-to-end application networking […]

Education is critical to effective security. As organizations migrate, modernize, and build with Amazon Web Services (AWS), engineering and development teams need specific skills and knowledge to embed security into workloads. Lack of support for these skills can increase the likelihood of security incidents. AWS has partnered with SANS Institute to create SEC480: AWS Secure Builder—a […]

OpenCost advances to the CNCF Incubator

- cncf.io - October 31, 2024

Cross-posted on the OpenCost blog by Ajay Tripathy The OpenCost project proudly announces that we've reached CNCF Incubating status! This milestone in our journey underscores the significant…

Uncover hidden insights with AWS Supply Chain Analytics, powered by Amazon QuickSight, enabling custom reporting and data visualization for smarter supply chain management.

Flatcar Container Linux Hitches a Ride With the CNCF

- thenewstack.io cloud-native - October 31, 2024

Unlike traditional Linux distributions, Flatcar is container-centric, making it a suitable candidate for a cloud native stack.

This post was co-authored by: Ashish Kumar, Senior Product Manager; Blayze Stefaniak, Senior Solutions Architect; Natti Swaminathan, Senior Solutions Architect; and Yogesh Patel, Senior Solutions Architect In this post, we review how you can leverage AWS PrivateLink support for User Datagram Protocol (UDP) services, and accelerate Internet Protocol version 6 (IPv6) migrations with UDP support […]

Generative AI can streamline the Correction of Errors process, saving time and resources. By using generative AI to leverage large language models, combined with the Correction of Errors process, businesses can expedite the identification and documentation of the cause of errors, while saving time and resources. Purpose and set-up The purpose of this blog is […]

AWS Lambda is introducing an enhanced local IDE experience to simplify Lambda-based application development. The new features help developers to author, build, debug, test, and deploy Lambda applications more efficiently in their local IDE when using Visual Studio Code (VS Code). Overview The IDE experience is part of the AWS Toolkit for Visual Studio Code. […]

Recently, we launched a new AWS Cloud Development Kit (CDK) L2 construct for Amazon CloudFront Origin Access Control (OAC). This construct simplifies the configuration and maintenance of securing Amazon Simple Storage Service (Amazon S3) CloudFront origins with CDK. Launched in 2022, OAC is the recommended way to secure your CloudFront distributions due to additional security features compared […]

A Git functionality shortcoming means Git calculates changes between different versions of the same file, which creates repository bloat.

AWS Control Tower is the easiest way to set up and govern a security, multi-account AWS environment. A key feature of AWS Control Tower is to deploy and manage controls at scale across an entire AWS Organizations. These controls are categorized based on their behavior and guidance. The behavior of each control is one of […]

Aurora PostgreSQL Limitless enables massive horizontal scaling for write throughput and storage by distributing workloads across multiple Aurora instances while using standard PostgreSQL queries and syntax.

Co-chairs: Christian Hernandez, Dan Garfield, Tim Collins November 12, 2024 Salt Lake City, Utah The Argo Project consists of 4 related, but separate, toolsets. So it's not just about GitOps…

Community post by Or Weis Discover how leveraging a policy-as-code platform helps foster an engineering culture focused on efficient authorization and access control. Platform engineering is rooted in…

Discover the latest LightSpy iOS spyware, featuring expanded capabilities and destructive functions.

Ansible-runner

- cncf.io - October 31, 2024

Originally published on the Redpill Linpro blog by Daniel Buøy-Vehn The command is part of the Ansible automation platform. If you have got installed Ansible, then you probably have already installed…

LottieFiles warns users of a compromised npm package, urging updates to prevent crypto wallet theft.

Discover the latest insights on enterprise identity risks and the need for stronger security strategies

High-severity flaw in LiteSpeed Cache plugin allows unauthorized access. Update to version 6.5.2 now!

Multi-version concurrency control in TLA+

- surfingcomplexity.blog - October 31, 2024

In a previous blog post, I talked about how we can use TLA+ to specify the serializability isolation level. In this post, we'll see how we can use TLA+ to describe multi-version concurrency c…

This year, the CNCF refreshed the KCD (Kubernetes Community Days) program for 2025, offering more support to our organizers and their communities, including, but not limited to, financial assistance…

DNS is a key component of modern computing, a phone book for IP addresses. It is distinct from other protocols in the application stack. Because it is queried early in the request by a client, DNS is well suited to relay application-specific information back to a client as early as possible. This additional data can […]

A survey of IT leaders published today finds that 79% have experienced or are aware of secrets leaking within their organizations.

Why Platform Engineers Are Embracing WebAssembly for Serverless

- thenewstack.io devops - October 30, 2024

From AWS Lambda to SpinKube, WebAssembly introduces an evolution in serverless with unmatched startup speeds and infrastructure flexibility.

Over the last 20+ years, commercially available compute virtualization solutions such as VMware have become powerful tools used to lower costs, improve efficiency, ease management tasks, and improve on-premises flexibility. Over time, most cloud providers have added advanced storage, efficiency, and management capabilities to their hypervisors that match or exceed those available to traditional on-premises […]

Deploy static sites with streamlined configuration, custom domains, SSL, CDN, and one-click updates using Amazon S3 with AWS Amplify Hosting.

North Korean threat actor Jumpy Pisces collaborates with Play ransomware, marking a significant cyber threat.

From IaC to Cloud Management: Pulumi's Evolution Story

- thenewstack.io cloud-native - October 30, 2024

The company has been an Infrastructure as Code player for several years but is now expanding to include security and cloud management as the other two legs of a stool.

Cross-Cloud Network enhancements for distributed workloads

- GCP networking blogs - October 30, 2024

New Cross-Cloud Network capabilities address application awareness, unpredictable bandwidth costs, hybrid observability, and service networking.

Jupiter now scales to 13 Petabits per second

- GCP networking blogs - October 30, 2024

Google networking leaders reflect on the milestones that led to Jupiter supporting 13 petabits per second bandwidth, and what comes next.

Guest columnist Anton Chuvakin talks about 10 leading indicators you can use to make cyber-physical systems more resilient in this newsletter.

Try C4A, the first Google Axion Processor

- GCP compute blogs - October 30, 2024

The custom Arm-based processor is designed for general-purpose workloads like web and app servers, databases, analytics, CPU-based AI, and more.

Trillium sixth-generation TPU is in preview

- GCP compute blogs - October 30, 2024

AI Hypercomputer can now include Trillium TPUs in preview, Axion-powered C4A VMs in GA, and coming soon, A3 Ultra VMs powered by NVIDIA H200 GPUs.

Update (9/22/2023): Step 6b updated to automatically detect and update the Amazon Athena table schema when crawler detects large data transfer values reported in bytes that would consume the table's maximum integer value while storing data. As customers scale their migration of large datasets with millions of files across multiple data transfers, they are faced […]

Community post originally published on Medium by Giorgi Keratishvili So want to pass CGOA exam but not sure where to start? Don't worry I will help you with what to pay attention to and will share my…

Sicredi: From Manual Banking to Platform Engineering

- thenewstack.io platform-engineering - October 30, 2024

Demand for new fintech features from customers of the Brazilian credit union meant that Sicredi had to up its software development game big time.

Change Healthcare Breach Hits 100M Americans

- krebsonsecurity.com - October 30, 2024

Change Healthcare says it has notified approximately 100 million Americans that their personal, financial and healthcare records may have been stolen in a February 2024 ransomware attack that caused the largest ever known data breach of protected health information.

Opera's recent patch fixes a security flaw that exposed users to malicious extensions and data theft.

Uncover the latest on SYS01stealer malware and phishing scams abusing platforms like Meta and Eventbrite.

Lessons From Humana's Migration to HCP Terraform Cloud

- thenewstack.io cloud-native - October 30, 2024

Humana's Yvette Villanueva shared how the healthcare insurer migrated from Terraform Enterprise to HashiCorp's cloud-based solution.

Malicious Python package "CryptoAITools" targets crypto wallets, stealing sensitive data on Windows and macOS.

Streamline your compliance journey with Intruder's automated vulnerability management and reporting tools.

The release of Amazon Q Developer and its ability to be integrated into AWS Chatbot allows users who use Microsoft Teams or Slack to stay within their communication platform and interact with a conversational generative artificial intelligence (AI) AWS expert. Amazon Q Developer is a conversational generative AI chatbot that provides AWS assistance in the form of […]

Any organization that manages software libraries and applications needs a standardized way to catalog, reference, import, fix bugs and update the versions of those libraries and applications. Semantic Versioning enables developers, testers, and project managers to have a more standardized process for committing code and managing different versions. It's benefits also extend beyond development teams […]

GitHub revealed it is adding support for the Claude Sonnet 3.5 LLM from Anthropic and the Gemini Pro 1.5 LLM from Google to its AI platform.

Use These AI Workflows To Reduce Your Technical Debt

- thenewstack.io devops - October 29, 2024

Using AI and Dagger, self-healing workflows hold the promise of improving code quality by automating error detection, generating test coverage, and optimizing code iteratively.

Announcing Vitess 21

- cncf.io - October 29, 2024

Project post by the Vitess Maintainers We're delighted to announce the release of Vitess 21 along with version 2.14.0 of the Vitess Kubernetes Operator. Version 21 focuses on enhancing query…

Community post by Pavan Navarathna Devaraj and Shwetha Subramanian AI is an exciting, rapidly evolving world that has the potential to enhance every major enterprise application. It can enhance cloud…

Member post originally published on Elastisys's blog by Cristian Klein I hear too many stories of platform teams being under-resourced. This usually manifests itself as an overworked platform team…

The CNCF Technical Oversight Committee (TOC) has voted to accept Flatcar as a CNCF incubating project. Flatcar is a zero-touch, minimal operating system (OS) for containerized workloads…

As organizations increasingly adopt Amazon Elastic Kubernetes Service (Amazon EKS) to manage their containerized applications, implementing robust security measures and maintaining compliance become critical. The scalable and flexible nature of Amazon EKS has made it a popular choice for businesses seeking to streamline their application deployment and management processes. However, with this adoption comes the […]

We will be highlighting Projen's powerful features that cater to various aspects of project management and development. We'll examine how Projen enhances polyglot programming within Amazon Web Services (AWS) Cloud Development Kit constructs. We'll also touch on its built-in support for common development tools and practices. In our previous blog, we introduced you to the […]

Repositories rarely rivet and rope themselves together quite like the union that has been forming between JFrog and GitHub.

Discover critical vulnerabilities in open-source AI tools that could lead to data theft and code execution. Update your software now!

Earlier today, Amazon Q Developer announced support for inline chat. Inline chat combines the benefits of in-IDE chat with the ability to directly update code, allowing developers to describe issues or ideas directly in the code editor, and receive AI-generated responses that are seamlessly integrated into their codebase. In this post, I will introduce the […]

Tabnine today previewed an AI agent that ensures code adheres to an organization's policies and software development standards.

Instabug today revealed that it has added the ability to leverage Generative AI (GenAI) to automatically fix mobile applications.

Crowdbotics has available an extension for GitHub Copilot that makes it simpler to generate code using higher-quality requirements documents.

International law enforcement disrupts RedLine and MetaStealer infrastructure, seizing servers and arresting key suspects.

Discover how exposure validation enhances cybersecurity by prioritizing exploitable vulnerabilities and reducing risks effectively.

In this blog, we will look at how to run containers inside a Kubernetes pod run as a

U.S. government updates Traffic Light Protocol guidance to enhance cybersecurity information sharing and collaboration.

Discover how new research shows AMD and Intel processors remain vulnerable to speculative execution attacks.

The carefulness knob

- surfingcomplexity.blog - October 29, 2024

A play in one act Dramatis personae EM, an engineering manager TL, the tech lead for the team X, an engineering manager from a different team Scene 1: A meeting room in an office. The walls are ado…

Recently, passwordless authentication has gained popularity compared to traditional password-based authentication methods. Application owners can add user management to their applications while offloading most of the security heavy-lifting to Amazon Cognito. You can use Amazon Cognito to customize user authentication flow by implementing passwordless authentication. Amazon Cognito enhances the security posture of your applications because […]

Amazon Web Services (AWS) is pleased to announce that three new AWS services have been added to the scope of our Payment Card Industry Data Security Standard (PCI DSS) and Payment Card Industry Three Domain Secure (PCI 3DS) certifications: Amazon DataZone Amazon DevOps Guru Amazon Managed Grafana You can see the full list of services […]

Evasive Panda targets Taiwan with CloudScout malware, enabling data theft from cloud services.

Whether you choose to operate entirely on AWS or in multicloud and hybrid environments, one of the primary reasons to adopt AWS is the broad choice of services we offer, enabling you to explore, build, deploy, and monitor your workloads. Amazon S3 is a great option for Dropbox users seeking a comprehensive storage solution. Amazon […]

Amazon Web Services (AWS) recently released AWS IAM Identity Center trusted identity propagation to create identity-enhanced IAM role sessions when requesting access to AWS services as well as to trusted token issuers. These two features can help customers build custom applications on top of AWS, which requires fine-grained access to data analytics-focused AWS services such […]

A decade of AWS innovation: Amazon ECS evolved from simplifying container orchestration to powering massive operations like Prime Day and enabling customers like SmugMug to seamlessly migrate petabytes of data and scale efficiently with "blazingly-fast" performance.

Two weeks ago, I had the wonderful opportunity to host subject matter experts from across Asia Pacific in the global 24 Hours of Amazon Q live stream event. This continuous 24-hour stream offered insights from AWS experts on Amazon Q Developer and Amazon Q Business, featuring use cases, product demos, and Q&A sessions. The highlight for […]

Don't Trust Security in AI-Generated Code

- thenewstack.io devops - October 28, 2024

While AI tools like Copilot provide efficient coding solutions, research indicates a troubling increase in security vulnerabilities among AI-assisted code.

Member post originally posted on the Logz.io blog by Asaf Yigal GenAI promises evolutionary changes in how we use observability tools, but meeting expectations means heeding the lessons of our AIOps…

Co-chairs: Tina Tsou and Mars Toktonaliev November 12, 2024 Salt Lake City, Utah Kubernetes on Edge Day demonstrates edge computing is here, and it's powered by Kubernetes. We're showcasing real-world…

DORA 2024: AI and Platform Engineering Fall Short

- thenewstack.io devops - October 28, 2024

The 2024 DORA Report dives deep into AI, platform engineering and the developer experience to seriously mixed results.

Malicious npm packages linked to North Korean hackers discovered, posing risks to developers.

Discover how UNC5812 exploits Telegram to deliver malware targeting Ukrainian military personnel.

AI manipulation, cloud storage flaws, and a major AWS vulnerability - this week's cybersecurity recap is packed!

Beware of rising phishing attacks using Webflow as cybercriminals target crypto wallets and sensitive info.

Explore SSH's PrivX OT Edition, transforming OT security for maritime and industrial operations globally.

Our weekly insight into DevOps job opportunities that are currently available, including this week, positions at Lockheed Martin and Moody's.

By embracing both approaches, organizations can achieve a balance between incremental and breakthrough advancements.

Discover how a new attack technique bypasses Microsoft's security, enabling OS downgrade attacks on Windows.

In this blog we will look at detailed steps to provision different types of persistent volume on EKS

Specifying serializability in TLA+

- surfingcomplexity.blog - October 28, 2024

Concurrency is really, really difficult for humans to reason about. TLA+ itself was borne out of Leslie Lamport's frustration with the difficulty of write error-free concurrent algorithms: Wh…

SRE Weekly Issue #448 – SRE WEEKLY

- sreweekly.com - October 27, 2024

They traded their monolith for microservices in a quest for scalability, but they got complexity along with it.

TrueNAS, a Linux Distro for Low Cost Network-Attached Storage

- thenewstack.io networking - October 26, 2024

With minimal configuration work for the installation, we had an instance of TrueNAS up and running within about 2 minutes.

TeamTNT launches new attacks on cloud environments, exploiting Docker vulnerabilities to mine cryptocurrency and rent out breached servers.

Four REvil ransomware operatives are sentenced in Russia, marking a significant step against cybercrime.

Ukraine's CERT reveals a malicious email campaign targeting agencies with RDP files, linked to Russian hackers.

Updates to AI Hypercomputer software stack

- GCP compute blogs - October 25, 2024

AI Hypercomputer software layer updates improve training and inference performance and resiliency. Plus, there's a new centralized resource hub.

If you are new to AWS WAF and are interested in learning how to mitigate bot traffic by implementing Challenge actions in your AWS WAF custom rules, here is a basic, cost-effective way of using this action to help you reduce the impact of bot traffic in your applications. We also cover the basics of […]

A survey of DevOps practitioners surfaces a spike in organizations that will be making additional investments in observability.

What is zero trust authorization?

- cncf.io - October 25, 2024

Member post originally published on Cerbos's blog by Twain Taylor Traditional security models, which rely on perimeter-based defenses, have proven to be quite inadequate in the face of sophisticated…

Member post originally published on the EJBCA by Keyfactor and Chainloop blogs by Ben Dewberry, Product Manager, Signing and Key Management, Keyfactor and Miguel Martinez Trivino, Co-founder…

Local attackers can exploit a vulnerability in the Wi-Fi Test Suite to gain root access.

Explore Apple's Private Cloud Compute, inviting researchers to verify its privacy and security claims.

Combat AI impersonation fraud with Beyond Identity's RealityCheck—your shield against deepfake attacks.

SEC charges four companies for misleading disclosures regarding the SolarWinds cyberattack, imposing fines totaling $6 million.

How To Backup And Restore EKS Cluster Using Velero

- devopscube.com - October 25, 2024

In this blog, we will look at step by step instructions to backup and restore EKS cluster using

LinkedIn has been fined €310 million for breaching GDPR regulations concerning user privacy.

Platform Engineering: Why You're Doing It Wrong

- thenewstack.io platform-engineering - October 24, 2024

Authors of a new book on platform engineering discuss why so many platform teams are building ill-considered IDPs, often by not listening to developers and other stakeholders.

This post is co-written with Cody Rioux, Staff Engineer at Stripe and Michael Cowgill, Staff engineer at Stripe Stripe powers online and in-person payment processing and provides financial solutions for businesses of all sizes. Stripe operates a sophisticated microservice environment built on top of AWS. In this blog post we will cover the journey and […]

We have many exciting new events happening in this Salt Lake City KubeCon, as well as a number of unique Experiences, and we don't want you to miss anything. Here's everything you need to know. Also…

Why Duplicating Environments for Microservices Backfires

- thenewstack.io microservices - October 24, 2024

Typical ways of testing microservices are too slow and unsustainable as engineering teams grow and architectures grow more complex.

Discover the advanced Qilin.B ransomware variant, featuring enhanced encryption and evasion tactics targeting healthcare systems.

APT29 aka Midnight Blizzard recently attempted to phish thousands of people. Building on work by CERT-UA, Amazon recently identified internet domains abused by APT29, a group widely attributed to Russia's Foreign Intelligence Service (SVR). In this instance, their targets were associated with government agencies, enterprises, and militaries, and the phishing campaign was apparently aimed at […]

Augment Code unveiled an AI tool designed for software engineering teams to employ LLMs specifically trained to generate code.

By Jorge Castro, Developer Relations at CNCF The Project Pavilion is our dedicated space on the show floor for CNCF Projects. Since there are over 200 projects this can make the Pavilion a rapidly…

AWS re:Invent 2024, a learning conference hosted by Amazon Web Services (AWS) for the global cloud computing community, will take place December 2–6, 2024, in Las Vegas, Nevada, across multiple venues. At re:Invent, you can join cloud enthusiasts from around the world to hear the latest cloud industry innovations, meet with AWS experts, and build […]

Cisco updates address critical security flaws in ASA and VPN services, urging users to act swiftly.

Critical security flaw in AWS CDK could allow account takeovers; users must update to the latest version.

Zencoder today made available an AI platform that in addition to generating code is also able to repair and optimize code and create tests.

Urgent: Transition to phishing-resistant MFA as ransomware payments soar 500%. Protect your organization today!

The development process at SpaceX is a source of inspiration for software teams as the company's engineers adopted a DevOps-like approach.

Lazarus Group exploits a Chrome flaw via a fake game site, targeting cryptocurrency users with malware.

Discover critical details on Fortinet's FortiManager vulnerability (CVE-2024-47575) and essential mitigation strategies.

LLo11yPop: Nvidia, Grafana Working on LLM for Observability

- thenewstack.io observability - October 23, 2024

The two companies are creating a number of projects aimed at giving engineers a better sense of how AI model training is progressing and solve other observability pain points.

Anthropic has developed and released a new batch of enhanced artificial intelligence models designed to autonomously perform tasks.

New variants of Grandoreiro malware emerge, using advanced tactics to evade detection and targeting banks globally.

Streamline workflows, automate installs like Xcode, and centralize management across operating systems. Set up pipelines building versioned, validated AMIs for your macOS workloads.

Sonar revealed this week that it has discovered a flaw in a widely used tool for generating application programming interfaces (APIs)

Tuning the GKE HPA to run inference on GPUs

- GCP compute blogs - October 23, 2024

Learn how best to tune Google Kubernetes Engine (GKE) Horizontal Pod Autoscaler (HPA) settings to tune it for running an inference server on GPUs.

Google has made a notable jump in the report to be placed ahead of Microsoft in 'ability to execute' and ahead of AWS in 'completeness of vision'.

Community post originally published on Medium by Giorgi Keratishvili Most probably if you have been working in IT over last decate you would heared such words as containers, docker, cloud native…

The Kubestronaut origin story

- cncf.io - October 23, 2024

A special thanks to one of our CNCF Ambassadors, Ramesh Kumar for inspiring us to create the Kubestronaut program. We recently interviewed Ramesh to ask about how the Kubestronaut program came to be.

Explore rising identity security concerns and key insights from Permiso's latest report on breaches.

CISA alerts on active exploitation of a SharePoint flaw, urging federal agencies to apply patches quickly.

The Global Surveillance Free-for-All in Mobile Ad Data

- krebsonsecurity.com - October 23, 2024

Not long ago, the ability to remotely track someone's daily movements just by knowing their home address, employer, or place of worship was considered a powerful surveillance tool that should only be in the purview of nation states. But a…

Kindo today revealed that WhiteRabbitNeo, an open-source DevSecOps platform, has been updated to take advantage of large language models.

Discover how organizational culture impacts SaaS security and why proactive measures are essential for protection.

Discover the new "Deceptive Delight" technique for jailbreaking AI models, posing significant cybersecurity risks.

Threat actors exploit Amazon S3 in ransomware attacks, using AWS credentials for data theft.

The software development industry could use a rewards program when it comes to ensuring a 'security first' mindset among developers.

Introduction Today, organizations prioritize managing their applications over infrastructure, focusing on business outcomes while leveraging automation and cloud services to handle the underlying infrastructure. They seek to consolidate key application metrics like health, security, cost, and performance from AWS services such as AWS Security Hub or Amazon CloudWatch. These organizations also need to ensure their […]

Understanding risk and identifying the root cause of an issue in a timely manner is critical to businesses. Amazon Web Services (AWS) offers multiple security services that you can use together to perform more timely investigations and improve the mean time to remediate issues. In this blog post, you will learn how to integrate Amazon […]

AWS Lambda recently announced a new code editor based on Code-OSS. Like the previous version, the new editor includes Amazon Q Developer. Amazon Q Developer is a generative AI-powered assistant for software development that can help you build and debug Lambda functions more quickly. In this post, I provide an overview of Amazon Q Developer's […]

A survey of IT and business execs finds 71% are working for orgs that have integrated some form of AI and GenAI capability into their operation.

Four months ago, we introduced Anthropic's Claude 3.5 in Amazon Bedrock, raising the industry bar for AI model intelligence while maintaining the speed and cost of Claude 3 Sonnet. Today, I am excited to announce three new capabilities for the Claude 3.5 model family in Amazon Bedrock: Upgraded Claude 3.5 Sonnet – You now have […]

AWS Lambda is introducing a new code editing experience in the AWS console based on the popular Code-OSS, Visual Studio Code Open Source code editor. This brings the familiar Visual Studio Code interface and many of the features directly into the Lambda console, allowing developers to use their preferred coding environment and tools in the cloud. […]

Google's HEART framework helps platform engineers measure and improve developer experience - how developers feel about and interact with a platform.

A new phishing campaign targets Russian-speaking users, spreading DCRat and PowerRAT via Gophish toolkit.

Announcing the 2024 DORA report

- GCP devops/sre blogs - October 22, 2024

Key takeaways from the 2024 Google Cloud DORA report that focused on the last decade of DORA, AI, platform engineering and developer experience.

The annual DORA report published by Google finds that while GenAI is leading to moderate gains in productivity, it appears to be slowing the software delivery rate.

Cary, NC, 22nd October 2024, CyberNewsWire

Member post by Ranjan Parthasarathy, CPO/CTO of Apica Telemetry data is to your system what sensors are to an automobile. Put simply, it is vital. However, handling telemetry data is cumbersome…

Kubestronaut in Orbit: Maria Salcedo

- cncf.io - October 22, 2024

This week's Kubestronaut in Orbit, Maria Salcedo, is a full stack DevOps backend engineer in Germany with experience in cloud native Kubernetes deployments. Maria is passionate about GitOps…

Co-chairs: Amber Graner, Rajas Kakodkar, Ricardo Rocha, Yuan Tang November 12, 2024 Salt Lake City, Utah Cloud Native & Kubernetes AI Day brings together a diverse range of technical enthusiasts…

Security vulnerability in Styra's OPA could expose NTLM hashes; patch released to mitigate risks.

Docker API servers are under attack as hackers deploy SRBMiner to mine XRP illicitly. Learn more about this threat.

Amazon Virtual Private Cloud (Amazon VPC) endpoints—powered by AWS PrivateLink—enable customers to establish private connectivity to supported AWS services, enterprise services, and third-party services by using private IP addresses. There are three types of VPC endpoints: interface endpoints, Gateway Load Balancer endpoints, and gateway endpoints. An interface VPC endpoint, in particular, allows customers to design […]

Learn how to locate and secure service accounts in Active Directory, and discover Silverfort's automated protection.

Malware families Bumblebee and Latrodectus resurface in phishing campaigns targeting personal data and financial sectors.

New npm packages discovered stealing Ethereum keys and enabling SSH access. Developers urged to review usage.

VMware releases a patch for critical vCenter Server vulnerability CVE-2024-38812, urging users to update now.

CISA adds ScienceLogic SL1 zero-day flaw to its exploited vulnerabilities list after active attacks.

Modern applications are expected to be available every minute of every day. Achieving the highest levels of availability requires more than setting up redundant hardware, networking, power, and other infrastructure components. You need to architect from the ground up to ensure availability in the event of natural disasters and technology failures. On-premises, this involves setting […]

Amazon Web Services (AWS) is excited to announce that 170 AWS services have achieved HITRUST certification for the 2024 assessment cycle, including the following 12 services that were certified for the first time: AWS AppFabric AWS Application Migration Service Amazon Bedrock (Including the Titan Model) AWS Clean Rooms Amazon DataZone AWS Entity Resolution AWS HealthImaging […]

Agentic workflows are quickly becoming a cornerstone of AI innovation, enabling intelligent systems to autonomously handle and refine complex tasks in a way that mirrors human problem-solving. Last week, we launched Serverless Agentic Workflows with Amazon Bedrock, a new short course developed in collaboration with Dr. Andrew Ng and DeepLearning.AI. This hands-on course, taught by […]

Businesses that use data lakes, machine learning (ML), and analytics need scalable data storage. However, not all stored data is accessed equally. Some portions of data may be accessed often, while whereas other portions of data are rarely accessed. Modern cloud storage allows users to move infrequently used, cold data to lower-cost storage classes. This […]

Understand how Observability 2.0 addresses technical debt and optimizes developer workflows.

Point-in-time 'snapshots' enable administrators, developers, testers, and end users to quickly access a storage volume or share how it was at an earlier point-in-time. They are a longstanding approach to data protection and recovery, tracking changes within a storage system to reduce both Recovery Point Objective (RTO) and Recovery Time Objective (RTO). However, traditional snapshots […]

Confidential VMs are now available with built-in CPU acceleration with Intel AMX. Which one is suited for AI? Check out our test results.

Community post by Dave Smith-Uchida, Technical Leader, Veeam (Linkedin, GitHub) Data on Kubernetes is growing with databases, object stores, and other stateful applications moving to the platform.

Dilli Hai Dilwalon Ki

- cncf.io - October 21, 2024

A Delhi guide by Kunal Kushwaha, Field CTO at Civo The capital city of India, Delhi, has roots that trace back thousands of years. Known as Indraprastha in ancient texts dating as far back as 400 BCE…

APT41 hackers infiltrate the gaming industry, using advanced tactics to bypass defenses and steal data.

Welcome to the second post in our series on Security Guardians, a mechanism to distribute security ownership at Amazon Web Services (AWS) that trains, develops, and empowers builder teams to make security decisions about the software that they create. In the previous post, you learned the importance of building a culture of security ownership to […]

Discover why pentest checklists are essential for identifying vulnerabilities across all attack surfaces

DevOps.com is now providing a weekly DevOps jobs report through which opportunities for DevOps professionals will be highlighted as part of an effort to

Resourcely has added a free tier option for its platform for safely configuring and deploying cloud resources using a set of templates and guardrails for app developers.

This week in cybersecurity: Hackers are getting smarter, but so are we! From macOS flaws to TrickMo Android trojans, here's what you need to know to s

Critical cryptographic flaws in top E2EE cloud platforms risk user data, allowing file tampering and injection.

Honeycomb Says Don't Give Up on Frontend Observability

- thenewstack.io observability - October 20, 2024

Honeycomb's new frontend observability tool taps OpenTelemetry to provide developers with deeper insights and faster debugging of web performance issues.

Unknown hackers exploited a patched Roundcube XSS flaw in phishing attacks to steal sensitive credentials.

SRE Weekly Issue #447 – SRE WEEKLY

- sreweekly.com - October 20, 2024

There are quite a few pitfalls waiting for you if you try to implement SLOs for your mobile app. This article explains and offers strategies.

Spacedrive, A Cross Platform File Manager for the Modern Era

- thenewstack.io storage - October 19, 2024

This cross-platform file manager, for both Linux and Mac, shows serious promise once a few rough edges are smoothed out.

Learn to demystify data security acronyms, align tools, and protect your business with simple strategies.

Crypt Ghouls target Russian businesses and agencies using LockBit 3.0 and Babuk ransomware for financial gain.

Hybrid Cloud Made Simple: Steps To Transform Your VM Fleet

- thenewstack.io devops - October 18, 2024

Assess assets, leverage partners, and diversify platforms to modernize your VM fleet for hybrid cloud.

Enterprises use block storage such as Amazon Elastic Block Store (Amazon EBS) for mission-critical workloads because it provides high performance, low latency, and reliable data access needed for demanding applications like databases, ERP systems, and real-time analytics. As EBS volumes often contain critical application data, configurations, or operating system files, backing up and restoring these […]

This post is co-written with Jacob Rickerd, Principal Security Engineer at Attentive. The post walks through an example dashboard that Attentive, an AI-powered mobile marketing platform, uses for resource inventory, serving as a starting point for you to build comprehensive dashboards tailored to your environment and tag policies. Attentive is the AI-powered SMS and email […]

HashiCorp announcements include updates to its Terraform Infrastructure-as-Code cloud provisioning technology and its HCP Waypoint tool.

Member post originally published on Tetrate's blog The industry is embracing Generative AI functionality, and we need to evolve how we handle traffic on an industry-wide scale.

Community post originally published on Medium/IT Next by Giorgi Keratishvili Over the last five years, GitOps has emerged as one of the most interesting implementations of using GIT in the Kubernetes…

Brazil Arrests 'USDoD,' Hacker in FBI Infragard Breach

- krebsonsecurity.com - October 18, 2024

Brazilian authorities reportedly have arrested a 33-year-old man on suspicion of being "USDoD," a prolific cybercriminal who rose to infamy in 2022 after infiltrating the FBI's InfraGard program and leaking contact information for 80,000 members. More recently, USDoD was behind…

What Is the Future of the .io Domain?

- thenewstack.io networking - October 18, 2024

As per the regulations, ICANN should discontinue the .io domain should the British Indian Ocean Territory cease to exist. Or will it change its policy so that thousands of websites (including ours) won't lose their domain names?

Community post by Dan Garfield For the very first time, KubeCon + CloudNativeCon North America is traveling to where I live! Hi, my name is Dan Garfield, I'm an Argo Maintainer for Codefresh and…

North Korean IT workers posing as freelancers steal data from Western firms, demanding ransoms for its return.

On Oct. 1, GitHub launched a public beta for a "major evolution of issues and projects," promising highly requested enhancements that "make it easier than ever to break down work, visualize progress, categorize and find just the right issue in GitHub."

Multiple popular browsers have announced that they will no longer trust public certificates issued by Entrust later this year. Certificates that are issued by Entrust on dates up to and including October 31, 2024 will continue to be trusted until they expire, according to current information from browser makers. Certificates issued by Entrust after that date […]

BMC CEO Aman Sayed is predicting that as the global economy continues to stabilize, there are enough signs to suggest the company year will see a wave of growth.

The Open Mainframe Project has updated its open source Zowe project to add support for IntelliJ, an integrated development environment.

Boost data security with DSPM. Uncover hidden data, prevent risks, and ensure compliance—register now

Iranian cyber actors target healthcare, IT, and energy sectors via brute force, MFA fatigue, and C2 tools.

Fake Google Meet pages deliver malware targeting Windows and macOS, spreading infostealers via ClickFix campaign.

Microsoft uncovers a macOS flaw allowing unauthorized access to sensitive data. Update your device now!

Ward Christensen, co-creator of the first bulletin board system and inventor of the XMODEM data transfer protocol, pioneered today's internet has died.

This post is written by Shridhar Pandey, Senior Product Manager, AWS Lambda Today, AWS is announcing two new features which make it easier for developers and operators to build and operate serverless applications using AWS Lambda. First, the Lambda console now natively supports Amazon CloudWatch Logs Live Tail which provides you real-time visibility into Lambda […]

The role cybersecurity teams play in ensuring applications are secure is about to become a lot more proactive in the age of AI.

After careful consideration, we have made the decision to discontinue CloudWatch Evidently, effective 10/17/2025. Active customers will be able to use the service as normal until 10/17/2025, when support for the service will end. During this period, we will continue to provide critical security patches, but will no longer support any limit increase requests. On […]

RomCom cyber attacks target Ukraine with new SingleCamper RAT, aiming for espionage and ransomware.

Sudanese Brothers Arrested in 'AnonSudan' Takedown

- krebsonsecurity.com - October 17, 2024

The U.S. government on Wednesday announced the arrest and charging of two Sudanese brothers accused of running Anonymous Sudan (a.k.a. AnonSudan), a cybercrime business known for launching powerful distributed denial-of-service (DDoS) attacks against a range of targets, including dozens of…

Check out Chrome Enterprise Premium's latest innovations

- GCP security blogs - October 17, 2024

Chrome Enterprise, the most trusted enterprise browser, recently introduced powerful new capabilities that can enhance security, threat detection, and usability. Let's check them out.

Learn why and how to benchmark end-users' perceived performance using the open-source Locust tool to simulate complex user behavior.

Member post originally published on Devtron's blog by Bhushan Nemade In the previous blog on Jenkins, we already covered how to set up a Jenkins pipeline, and the pros and cons of Jenkins for CI/

Community post originally published on Medium by Dotan Horovits PromCon Europe 2024 just wrapped up in Berlin, and this year's edition was a big one. Not just because the Prometheus community gathered…

Cloud native technology adoption continues to increase across all enterprises, with most new applications being built on cloud native platforms and, in particular, being built on Kubernetes.

Data Observability: Multicloud, GenAI Make Challenges Harder

- thenewstack.io observability - October 17, 2024

The sheer volume of data, compliance issues and complex deployment environments cause headaches for enterprises, said Rohit Choudhary, of Acceldata, on this episode of The New Stack Makers.

Group-IB reveals Cicada3301 ransomware's affiliate panel, targeting U.S. and U.K. sectors with cross-platform attacks.

During a recent visit to the Defense Advanced Research Projects Agency (DARPA), I mentioned a trend that piqued their interest: Over the last 10 years of applying automated reasoning at Amazon Web Services (AWS), we've found that formally verified code is often more performant than the unverified code it replaces. The reason is that the […]

SideWinder APT launches stealthy multi-stage attacks, deploying StealerBot malware against critical entities in the Middle East and Africa.

Sudanese brothers charged for 35,000 DDoS attacks targeting Microsoft, hospitals, and global networks in 2023.

Critical Kubernetes Image Builder vulnerability CVE-2024-9486 patched to prevent root access via default credentials.

If you don't examine what worked, how will you know what works?

- surfingcomplexity.blog - October 17, 2024

This is one of my favorite bits from fellow anglophone Québécois Norm McDonald: Norm: not a lung expert One of the goals I believe that we all share for post-incident work is to improve the system.…

This blog post guides you through implementing a generative AI intelligent chatbot using Amazon Bedrock and AWS services, including developer lifecycle changes. It covers creating a scalable chatbot infrastructure with Terraform, using services like Amazon Bedrock Agents, Amazon Bedrock Knowledge Bases, OpenSearch Service, Lambda, Amazon S3, and IAM. The focus on IaC and automation brings key DevOps benefits: version control, consistent deployments, reduced errors, faster provisioning, and improved collaboration.

New Terraform Features Manage Migrations, Modules

- thenewstack.io cloud-native - October 16, 2024

Hashicorp co-founder and CTO Armon Dadgar fleshed out the new Stacks and other features in Terraform and explained Nomad's GPU management.

Introduction Earlier this year we announced support for Amazon EKS optimized AL2023 AMIs that provided many enhancements in terms of security and performance. Amazon Linux 2023 (AL2023) is the next generation of Amazon Linux from Amazon Web Services (AWS) and is designed to provide a secure, stable, and high-performance environment to develop and run your […]

It's an established practice for development teams to build deployment pipelines, with services such as AWS CodePipeline, to increase the quality of application and infrastructure releases through reliable, repeatable and consistent automation. Automating the deployment process helps build quality into our products by introducing continuous integration to build and test code, however enterprises may sometimes […]

Many organizations are building artificial intelligence (AI) applications using Large Language Models (LLMs) to deliver new experiences to their customers, from content creation to customer service and data analysis. However, the substantial size and intensive computational requirements of these models may have challenges in configuring, deploying, and scaling them effectively on graphic processing units (GPUs). […]

BMC Software has unveiled a GenAI assistant that makes it simpler to invoke a range of AI capabilities in mainframe environments.

Cybercriminals abuse EDRSilencer to disable endpoint detection tools, making malicious activity harder to detect.

Co-chairs: Paula Kennedy, Stacey Potter, Vijay Chintha November 12, 2024 Salt Lake City, Utah Platform Engineering Day focuses on solutions over tooling. We believe that Platform Engineering is a…

Member post originally published on ngrok's blog by Mike Coleman MicroK8s is a lightweight, efficient, and easy-to-use Kubernetes distribution that enables users to deploy and manage containerized…

FIDO Alliance proposes secure credential exchange protocol to improve passkey transfers and enhance adoption.

How To Increase Plasticity in LLMs and AI Applications

- thenewstack.io devops - October 16, 2024

To optimize plasticity — an AI model's ability to adapt to new information — here are some tools and techniques for AI engineers.

Google Cloud Security is committed to helping government agencies and organizations strengthen their defenses. Here's how we can help.

If you haven't yet evaluated and chosen an AI coding assistant for your team, you may quickly find yourself in the minority.

From Misuse to Abuse: AI Risks and Attacks

- thehackernews.com - October 16, 2024

Cybercriminals exploit AI tools like GPTs, phishing emails, and deepfakes in attacks, raising security risks.

A primary objective of software developers is to develop products that uphold the highest standards of data privacy and security, fostering trust and confidence among their users and customers. Developers seek to secure their software by identifying and mitigating security vulnerabilities in their codebase, thereby enhancing its resilience against cyber threats. Amazon Q Developer, a […]

Practical improvement and optimization of software quality requires expert-level knowledge across various subjects. As such, in this blog we shall look at how Amazon Q Developer can help improve your development team productivity and application stability by enabling automation around code optimization by improving your code's quality, performance, application infrastructure specifications. The blog will also look […]

For several years, AWS Solutions Constructs have helped thousands of AWS Cloud Development Kit (CDK) users accelerate their creation of well-architected workloads by providing small, composable patterns linking two or more AWS services, such as an Amazon S3 bucket triggering an AWS Lambda function. Over this time, customers with use cases that don't match an […]

ScarCruft exploits a patched Windows zero-day, CVE-2024-38178, infecting devices with RokRAT malware.

5 Techniques for Collecting Cyber Threat Intelligence

- thehackernews.com - October 16, 2024

Enhance threat investigations with ANY.RUN's TI Lookup, using IPs, MITRE TTPs, YARA rules, and more.

Tools and processes to stress test the code and reduce risk with software deployments are critical for achieving success in AI coding.

A spear-phishing campaign in Brazil uses fake tax files to deliver Astaroth malware, impacting key industries.

Update GitHub Enterprise Server to patch critical SSO bypass vulnerability (CVE-2024-9487). Protect against unauthorized access.

CISA flags critical SolarWinds Web Help Desk flaw, urging U.S. agencies to patch by Nov 5, 2024.

In Part 1, we explored Moka's high-level design and logging infrastructure, showcasing how AWS for Fluent Bit, Amazon S3, and a robust logging framework make sure of operational visibility and facilitate issue resolution. For more details, read part 1 here. Introduction As we transition to the second part of our series, our focus shifts to […]

This is Part 1 of the blog post. Introduction Pinterest is a visual search and curation platform focused on inspiring users to create a life they love. Critical to the service are data insights, recommendations and machine learning (ML) models that are produced by synthesizing insights provided by the over 500 million monthly active users […]

A liveness example in TLA+

- surfingcomplexity.blog - October 16, 2024

If you've ever sat at a stop light that was just stuck on red, where there was clearly a problem with the light where it wasn't ever switching green, you've encountered a liveness…

Terraform Beta Supports Multicloud, Complex Environments

- thenewstack.io cloud-native - October 15, 2024

Stacks, a new offering for Terraform users, helps with provisioning and managing multiple resources across multiple Terraform configurations.

Unlock insights instantly with Amazon Redshift's new zero-ETL integrations for Aurora PostgreSQL and DynamoDB, eliminating complex ETL pipelines.

TrickMo Android malware now steals unlock patterns, PINs, and more, posing a severe threat to mobile banking.

KubeEdge Extends Cloud Native Beyond the Data Center

- thenewstack.io kubernetes - October 15, 2024

The new CNCF graduate technology has already found a home in electric cars, satellites and logistics.

We recently found, fixed, and disclosed vulnerabilities in our Vertex AI platform. Google Cloud CISO Phil Venables explains why all AI vendors should share their vulnerability research.

Nico Verbert is a Senior Staff Technical Marketing Engineer at Isovalent at Cisco and one of the creators of the Cilium Certified Associate Certification (CCA). Nico is a leading cloud and networking…

North Korean hackers deploy Linux-based FASTCash malware to exploit ATMs globally, enabling fraudulent withdrawals.

PureCrypter delivers DarkVision RAT, a versatile malware offering keylogging, remote access, and password theft.

Linux: Sync Files Between Servers With Syncthing

- thenewstack.io storage - October 15, 2024

Easier to set up and use than NFS or Samba, Syncthing is the way to go when you need to keep data between machines in a constant state of sync.

How OVHcloud Made Its 800 Databases More Efficient

- thenewstack.io observability - October 15, 2024

Monitoring tools such as Grafana and the fostering of SQL skills within the company generated big reductions in slow queries and improved resilience.

A survey of developers finds nearly two-thirds can now produce an API in less than a week but only 33% can deploy an API in less than a week.

Protect against zero-day attacks with NDR's proactive AI-driven detection. Learn how traditional solutions fall short

China's CVERC accuses U.S. of fabricating Volt Typhoon cyberattack claims to conceal global cyber espionage.

Cyber researchers warn of new malware campaign using Hijack Loader and XWorm, evading detection with code-signed certificates.

Jetpack releases a critical security update to fix a vulnerability affecting 27 million WordPress sites.

This post is written by Paul Tran, Senior Specialist SA; Asif Mujawar, Specialist SA Leader; Abdullatif AlRashdan, Specialist SA; and Shivagami Gugan, Enterprise Technologist. Technology Innovation Institute (TII) has developed Falcon 2 11B foundation model (FM), a next-generation AI model that can be now deployed on Amazon Elastic Compute Cloud (Amazon EC2) c7i instances, which support […]

Boost Your Shipping Velocity With Argo and Buildpacks

- thenewstack.io devops - October 14, 2024

Learn how to use CNCF incubating project Buildpacks, an application definition, and image build to skip the Dockerfile step and increase developer productivity.

Customers who are building their "Golden Image" Amazon Machine Images (AMIs) using EC2 Image Builder may wish to extend their Image Builder pipelines to build out their Amazon Elastic Kubernetes Service (Amazon EKS) worker nodes as well. In this blog, we will show you how to do this and provide you with AWS CloudFormation templates […]

Last week, AWS hosted free half-day conferences in London and Paris. My colleagues and I demonstrated how developers can use generative AI tools to speed up their design, analysis, code writing, debugging, and deployment workflows. These events were held at the GenAI Lofts. These lofts are open until October 25 (London) and November 5 (Paris). […]

Community post originally published on Medium by Giorgi Keratishvili Over the last five years, security has emerged as one of the most demanding skills in IT. When combined with the equally sought…

Coming to KubeCon + CloudNativeCon North America in Salt Lake City next month? Members of the CNCF End User Technical Advisory Board (TAB) pulled together their top talk recommendations with insights…

Chair: Sebastian Stadil November 12, 2024 Salt Lake City, Utah OpenTofu Day is the best place to meet and learn from OpenTofu developers and users from around the world. This is the second time this…

Nation-state hackers exploit Ivanti Cloud Appliance zero-day vulnerabilities for unauthorized access, credential theft, and persistence.

Master real-time cloud security by following these five steps to enhance detection and response strategies.

From zero-day exploits to North Korean hackers targeting developers, and AI tools gone rogue, we've got the latest threats.

Cybersecurity experts uncover entry-point vulnerabilities in popular developer tools, enabling stealthy supply chain attacks

Cybercriminals exploit CVE-2024-40711 in Veeam to deploy ransomware, targeting unpatched systems and compromised VPNs.

Organizations that focus on innovation have started adopting CodeOps to enhance their digital product engineering processes.

Looking to move jobs? Maybe one of these Devops roles will pique your interest, including engineer roles at Series Entertainment and Visa.

What Platform Engineering Meant for Adidas's SREs

- thenewstack.io platform-engineering - October 13, 2024

Moving from monolithic to microservices architecture demands platform engineering and observability, but brought new challenges to Adidas's site reliability engineering team.

OilRig exploits a Windows kernel flaw in a cyber espionage campaign targeting UAE networks, leveraging backdoors and privilege escalation.

SRE Weekly Issue #446 – SRE WEEKLY

- sreweekly.com - October 13, 2024

This one is a direct response to an

How to Ensure Cloud Native Architectures Are Resilient and Secure

- thenewstack.io cloud-native - October 12, 2024

The rush to prioritize agility and scalability often leaves security as an afterthought.

Linux: Create System Backups With rsnapshot

- thenewstack.io storage - October 12, 2024

Rsnapshot works as a wrapper for the widely used rsync tool and is fairly easy to install and configure. Start here to learn more.

U.S. DoJ charges 18 in a $25M cryptocurrency fraud operation, uncovering market manipulation through an FBI-led sting.

Cybercriminals exploit trusted GitHub repositories to deliver Remcos RAT in a phishing campaign targeting the finance sector.

Deploy Kubernetes Behind Firewalls Using These Techniques

- thenewstack.io kubernetes - October 11, 2024

Actionable Strategies for Overcoming the Challenges of Deploying and Managing Kubernetes in Firewalled Environments

How Google Cloud supports telecom regulatory compliance

- GCP security blogs - October 11, 2024

Operating a telecom network is more than just connecting phone calls. Here's how Google Cloud is helping them to maintain regulatory compliance.

Avoiding the GKE IP_SPACE_EXHAUSTED Error

- GCP containers blogs - October 11, 2024

Understanding the root cause of the IP_SPACE_EXHAUSTED error in GKE clusters.

Co-chairs: Bill Mulligan and Vlad Ungureanu November 12, 2024 Salt Lake City, Utah Cilium + eBPF Day will offer a deep dive into how Cilium and eBPF are revolutionizing networking, security…

Defend against hybrid password attacks by strengthening password policies and implementing multi-factor authentication.

CISA warns of unencrypted F5 BIG-IP cookies enabling network reconnaissance and highlights Russian APT29 cyber threats.

GitLab fixes eight security flaws, including a critical CI/CD pipeline vulnerability CVE-2024-9164. Update now!

Dutch police shut down Bohemia, the largest dark web market, after a global investigation, arresting key suspects.

Start Securing Decentralized Clouds With Confidential VMs

- thenewstack.io cloud-native - October 10, 2024

Aleph.im and TwentySix Cloud leverage AMD SEV to deploy decentralized confidential VMs, enhancing security without relying on AWS.

Organizations today often depend on mission-critical database workloads. When these databases become unavailable, it can significantly impact revenue and erode user trust. To mitigate this risk, these critical environments need the fastest possible recovery capabilities if there is a failure. This means having the lowest recovery time objective (RTO) and recovery point objective (RPO). Achieving […]

Ray is an open-source framework that manages, executes, and optimizes compute needs for AI workloads. It is designed to make it easy to write parallel and distributed Python applications by providing a simple and intuitive API for distributed computing. Ray unifies infrastructure by leveraging any compute instance and accelerator on AWS via a single, flexible […]

AWS Console-to-Code generates reusable infrastructure as code from your AWS console actions, supporting Amazon EC2, RDS, and VPC. With a few clicks, get CloudFormation, CDK (TypeScript, Python, Java), or CLI code - a game-changer for streamlining cloud automation workflows.

Prime Security today made available a beta version of a platform, leveraging AI to ensure the appropriate guardrails to DevSecOps workflows,

Project Shield expands free DDoS protection

- GCP security blogs - October 10, 2024

Marginalized groups and non-profit arts and sciences organizations can tap into the power of Project Shield for protection against DDoS attacks, free of charge.

/ Generative AI is transforming industries in new and exciting ways every single day. At Amazon Web Services (AWS), security is our top priority, and we see security as a foundational enabler for organizations looking to innovate. As you prepare for AWS re:Invent 2024, make sure that these essential sessions are on your schedule to […]

Lima completes fuzzing audit

- cncf.io - October 10, 2024

Community post by Adam Korczynski, Adalogics and Jan Dubois, Lima maintainer Lima, a CNCF sandbox project for launching virtual machines with automatic file sharing and port forwarding…

Member post by Sameer Danave, Senior Director of Marketing at MSys Technologies Do you know half of the global storage capacity will be deployed as Software Defined Storage(SDS)? It is a remarkable…

Sonatype today shared a report that finds there has been a 156% increase in the number of malicious open source packages year-over-year.

OpenAI disrupts 20 malicious operations exploiting AI for cybercrime, including malware debugging, social media manipulation, and misinformation.

Database Center preview now open to all customers

- GCP devops/sre blogs - October 10, 2024

Database Center provides a comprehensive view of your database fleet, performance and security recommendations, and AI-powered assistance.

Here's a list of upcoming DevOps conferences you won't want to miss this year. Attending key events can help sharpen your skills and expand your network.

AWS is deeply committed to earning and maintaining the trust of customers who rely on us to run their workloads. Security has always been our top priority, which includes designing our own services with security in mind at the outset, and taking proactive measures to mitigate potential threats so that customers can focus on their […]

Unpatched CVE-2024-9441 flaw in Nice Linear eMerge E3 systems exposes organizations to severe cyber risks.

As distributed systems continue to evolve, the ability to troubleshoot will remain a critical skill for engineers and system administrators.

6 Simple Steps to Eliminate SOC Analyst Burnout

- thehackernews.com - October 10, 2024

Learn 6 effective strategies to reduce SOC analyst burnout with AI automation, improve retention, and boost efficiency

Code quality is vital for the execution of any program. It is the main KPI to gauge the handiness and viability of the software project.

New Mongolian Skimmer uses Unicode obfuscation to steal financial data from e-commerce sites, evading detection.

CISA flags a critical Fortinet flaw under active exploitation. Palo Alto Networks and Cisco also release urgent security patches.

Mozilla urges users to update Firefox after critical CVE-2024-9680 vulnerability is actively exploited.

We're very excited to announce the Keynote Speakers and Daily Themes for KubeCon + CloudNativeCon North America 2024 in Salt Lake City beginning November 12 -15. If you haven't registered yet…

Buildkite Pty Ltd today launched a Scale-Out Delivery Platform that combines multiple previous DevOps tools into a single integrated platform.

Choosing cloud certifications wisely - Digi Hunch

- digihunch.com - October 09, 2024

What I have learned in the last six years to choose cloud certifications wisely in a market with a lot of certification exams

Lamborghini Carjackers Lured by $243M Cyberheist

- krebsonsecurity.com - October 09, 2024

The parents of a 19-year-old Connecticut honors student accused of taking part in a $243 million cryptocurrency heist in August were carjacked a week later, while out house-hunting in a brand new Lamborghini. Prosecutors say the couple was beaten and…

Heading to KubeCon a bit early, or planning on staying around for the weekend? The options for outdoor fun are endless, even if it's not quite ski season. From winter hiking to snowshoeing…

Google partners with GASA and DNS RF to launch Global Signal Exchange, enhancing real-time scam detection.

Apollo GraphQL today previewed a toolkit that makes it possible to use a gen AI prompt to launch a GraphQL query against REST APIs.

Multiple MMS protocol vulnerabilities expose industrial systems to remote code execution, crashes, and DoS attacks.

Top 5 cloud aspects

- cncf.io - October 09, 2024

Member post originally published on Redpill Linpro's blog by Torbjørn Gjøn Read more here or contact us for a cloud chat through our contact form.

North Korean hackers target tech job seekers with malware in a fake job interview scam, stealing credentials and crypto wallets.

The AWS Well-Architected Framework (WA Framework) is designed to help cloud architects build secure, resilient, high-performing, and efficient workloads on AWS. It is structured around six pillars: Operational Excellence, Security, Reliability, Performance Efficiency, Cost Optimization, and Sustainability. Figure 1. The pillars of AWS Well-Architected Framework This post provides insights on how to streamline your change-management […]

DevOps practitioners survey finds a third are working for organizations that use AI to build software, while another 42% are considering it.

An IBM survey finds business criticality, cost savings, and application obsolescence as main drivers of mainframe application modernization.

Learn how to secure your brand's social media accounts with SSPM tools to prevent unauthorized access and reputational damage.

The "trial and error" phase for genAI is over; we need to verify whether the investments are paying off. Experiment, measure, adjust, repeat.

Microsoft's October 2024 Patch Tuesday addresses 118 vulnerabilities, two under active exploitation. Apply fixes now.

Microsoft warns of cyber attacks abusing SharePoint, OneDrive, and Dropbox to evade security and steal credentials.

Patch Tuesday, October 2024 Edition

- krebsonsecurity.com - October 08, 2024

Microsoft today released security updates to fix at least 117 security holes in Windows computers and other software, including two vulnerabilities that are already seeing active attacks. Also, Adobe plugged 52 security holes across a range of products, and Apple…

Gamers searching for game cheats are falling victim to a global malware campaign delivering RedLine Stealer.

Ivanti warns of active exploitation of three new CSA vulnerabilities, enabling hackers to bypass security measures.

Unlock GA4 Insights: BigQuery SQL Recipes for Key Metrics

- thenewstack.io observability - October 08, 2024

Use these SQL queries and techniques for extracting key Google Analytics 4 metrics directly from BigQuery, enabling precise, customizable reporting without data thresholds.

Introducing pipe syntax in BigQuery and Cloud Logging

- GCP devops/sre blogs - October 08, 2024

BigQuery's pipe syntax introduces an intuitive, top-down syntax for understanding data transformations, and is used in Cloud Logging Log Analytics.

Has the AWS Systems Manager Agent (SSM Agent) running on your critical servers on-premises or on Amazon Elastic Compute Cloud (Amazon EC2) lost healthy connection to AWS Systems Manager (SSM) for some reason and you wanted to be proactively notified when this happens? Do you wish to improve observability of your SSM Agent status and […]

Kubestronaut in Orbit: Phong Nguyen Van

- cncf.io - October 08, 2024

This week's Kubestronaut in Orbit, Phong Nguyen Van, is a full-stack software engineer in Ho Chi Minh, Vietnam with over 7 years of experience and a passion for cloud technologies and Kubernetes.

Member post by Chelsio Communications As Kubernetes continues transforming the cloud-native infrastructure, high-performance networking has become essential for maintaining seamless operations in…

By TAG Environmental Sustainability Get ready for the CNCF Cloud Native Sustainability Week 2024, which will take place from October 7th to 13th, 2024. This global event, organized by the CNCF…

Integration of AI With IoT Brings Agents to Physical World

- thenewstack.io edge-computing - October 08, 2024

We explore the hardware, software architecture, and integration features of SenseCAP Watcher, highlighting its use cases for AI developers.

NVIDIA NIMs are available on GKE

- GCP containers blogs - October 08, 2024

The combination of NVIDIA NIM and Google Kubernetes Engine (GKE) brings latency, throughput, and operational efficiency to AI model inference.

With an ever-growing volume of custom metrics in Amazon CloudWatch, customers often find it difficult to understand and manage their spend on this service. One of the most common questions they have is how to identify which metrics contribute the most to their spend in CloudWatch. This blog post introduces a solution that lets you […]

Many organizations continuously receive security-related findings that highlight resources that aren't configured according to the organization's security policies. The findings can come from threat detection services like Amazon GuardDuty, or from cloud security posture management (CSPM) services like AWS Security Hub, or other sources. An important question to ask is: How, and how soon, are […]

AWS WAF Bot Control uses CAPTCHA and Challenge actions to undertake a browser interaction before permitting requests to protected resources. These actions can result in a poor user experience because of application errors or unexpected CAPTCHA completion when AWS WAF unexpectedly blocks requests. The AWS WAF JavaScript integrations give you the ability to control these […]

Continuous Testing, Quality, Security, and Feedback — is essential for organizations aiming to become DevOps high-performers.

New Case Study: The Evil Twin Checkout Page

- thehackernews.com - October 08, 2024

Prevent financial loss from 'Evil Twin' checkout pages. Learn how Reflectiz secured one global retailer.

Awaken Likho shifts tactics, using MeshCentral in cyberattacks targeting Russian government agencies and industries.

The Value of AI-Powered Identity

- thehackernews.com - October 08, 2024

AI-powered identity management enhances security, detects threats, and streamlines governance for stronger cybersecurity.

GoldenJackal cyber threat targets air-gapped systems in embassies and governments, using USB-based malware.

Ukraine claims cyber attack on Russian state media VGTRK, disrupting operations and wiping server data.

Qualcomm fixes 20 vulnerabilities, including actively exploited CVE-2024-43047 in DSP, urging fast OEM updates.

Graphic created by Kevon Mayers. Introduction As customers increasingly seek to harness the power of generative AI (GenAI) and machine learning to deliver cutting-edge applications, the need for a flexible, intuitive, and scalable development platform has never been greater. In this landscape, Streamlit has emerged as a standout tool, making it easy for developers to […]

Tetrate, Bloomberg Collaborate on Envoy-Based AI Gateways

- thenewstack.io service-mesh - October 07, 2024

The flexible Envoy Gateway is finding a new role as an Artificial Intelligence gateway.

Anyscale: New Optimized Runtime for Ray, Kubernetes Operator

- thenewstack.io cloud-native - October 07, 2024

Expanded platform enables organizations to build and scale AI applications faster and more efficiently.

AWS customers rely on the AWS Console Mobile Application to monitor, manage, and receive notifications to stay informed about their AWS resources while away from their desktop devices. Customers who use Single-Sign-On (SSO) can face a unique set of challenges while signing into the AWS Console Mobile Application. While SSO can offer enhanced security and […]

Last Friday, I had the privilege of attending China Engineer's Day 2024(CED 2024) in Hangzhou as the Amazon Web Services (AWS) speaker. The event was organized by the China Computer Federation (CCF), one of the most influential professional developer communities in China. At CED 2024, I spoke about how AI development tools can improve developer […]

Tap the power of Google Cloud Networking and Network Security to protect workloads anywhere on the web, just like Project Shield does. Here's how.

We're excited to share the updated etcd Project Journey Report! etcd is one of CNCF's longest-standing graduated projects. We initially looked at the project's growth back in 2021, and are happy to…

Member post originally published on the Middleware blog by Keval Bhogayata In distributed applications with complex, resource-intensive microservices—each of which generates a mountain of telemetry…

In this blog, I have explained detailed steps to run Docker containers as non-root user by creating a

Torrance, United States / California, 7th October 2024, CyberNewsWire

API and bot attacks cost businesses up to $186 billion annually, posing significant cybersecurity risks worldwide.

On October 10th, ADDO returns with its signature 24-hour "follow the sun" format, proving once again that DevOps is more than a buzzword.

New Gorilla botnet launches over 300,000 DDoS attacks globally, exploiting IoT devices and Apache Hadoop flaws.

Explore the shift to passwordless authentication in hybrid work environments to boost security and user ease.

Urgent patch advised for Apache Avro Java SDK flaw (CVE-2024-47561) that allows code execution.

Cybercrime hits global networks as authorities take down LockBit, seize Russian domains, and stop record DDoS attacks.

Google's new security pilot in India automatically blocks sideloading of risky Android apps, protecting users from malicious installs.

Five great DevOps job opportunities for your perusal this week, including senior DevOps engineer roles at JFrog, UST Global and PayQuicker.

EU court orders Meta to restrict Facebook user data for ads, enforcing GDPR limits on personal data use.

It's Critical To Resolve the DevOps Tax on Central Teams

- thenewstack.io devops - October 06, 2024

Netflix's real-world examples show how automation and scalable practices reduce the DevOps burden on central teams, boosting stability and productivity.

The zero-trust model demands robust identity security, which needs continuous verification of individuals and systems.

SRE Weekly Issue #445 – SRE WEEKLY

- sreweekly.com - October 06, 2024

Developer Relations Relies on Authenticity and Trust

- thenewstack.io devops - October 05, 2024

To drive success, DevRel teams must build genuine connections with developers through trust and transparency.

Apple's iOS 18.0.1 fixes a VoiceOver password vulnerability and an audio bug in iPhone 16. Update now!

Futexes in TLA+

- surfingcomplexity.blog - October 05, 2024

Justine Tunney recently wrote a blog post titled The Fastest Mutexes where she describes how she implemented mutexes in Cosmopolitan Libc. The post discusses how her implementation uses futexes by …

Generative AI is leading to many new features and capabilities. As a result, your employees may not know about all the new tools you are deploying. I was recently working with a customer that had deployed Amazon Q Developer for all their software developers. However, many developers didn't know they had access to the productivity […]

We are pleased to announce the general availability of the AWS Cloud Control provider for Pulumi, an modern infrastructure management platform, which allows our customers to adopt AWS innovations faster than ever before. AWS has consistently expanded its range of services to support any cloud workload, supporting over 200 fully featured services and introducing more […]

NGINX One Console: Not for Experts Only

- thenewstack.io cloud-native - October 04, 2024

With the introduction of NGINX One, a pay-as-you-go enterprise Software as a Service offering, into general availability, NGINX is now easier to adopt and use.

Honeycomb has made available an extension to its observability platform that provides the ability to analyze front ends of applications.

Why NoSQL Deployments Are Failing at Scale

- thenewstack.io cloud-native - October 04, 2024

NoSQL struggles at scale, distributed SQL offers a stronger solution.

Parallelstore combines a distributed metadata and key-value architecture to deliver high-performance throughput and IOPS for HPC and AI workloads.

Building a modern, AI-ready developer platform

- GCP devops/sre blogs - October 04, 2024

Are your developers using the latest AI-ready platforms to power ahead with innovation? If not, then it's time to re-evaluate your platform strategy.

Japanese | Korean | Spanish At Amazon Web Services (AWS), we continue to listen to our customers, regulators, and stakeholders to understand their needs regarding audit, assurance, certification, and attestation programs. We are pleased to announce that the AWS System and Organization Controls (SOC) 1 report is now available in Japanese, Korean, and Spanish. This […]

You now can perform code signing in your Microsoft ecosystem using SignTool, while protecting your keys with Cloud HSM. Here's how.

Community post by Saqib Jan As technologies become more advanced year on year, the complexity of software testing increases, too. When building a testing strategy, companies typically map their…

Project post by Volcano maintainers On September 19, 2024, UTC+8, Volcano Community officially released version 1.10.0, introducing the following new features: In traditional big data processing…

Microsoft Taking Up the Mantra of Platform Engineering

- thenewstack.io platform-engineering - October 04, 2024

As it continues to roll out its Secure Future Initiative, Microsoft is embracing the power and increased security of platform engineering.

This post is written by Josh Hart, Principal Solutions Architect and Thomas Moore, Senior Solutions Architect This post explores best practice integration patterns for using large language models (LLMs) in serverless applications. These approaches optimize performance, resource utilization, and resilience when incorporating generative AI capabilities into your serverless architecture. Overview of serverless, LLMs and example […]

U.S. and Microsoft seize 107 domains used by Russian threat actors in spear-phishing attacks targeting U.S. agencies and NGOs.

The latest edition of the OpenStack framework adds an ability to reserve instances of GPUs along with a revamped UI to make it more accessible

Learn how to implement Continuous Threat Exposure Management (CTEM) and mitigate cyber risks effectively.

Cloudflare mitigates a record-breaking 3.8 Tbps DDoS attack, marking a surge in global cyber threats.

LiteSpeed Cache plugin vulnerability (CVE-2024-47374) exposes WordPress sites to XSS attacks. Update to version 6.5.1 now.

A survey of decision-makers for modernizing mainframe applications has surfaced the depth of mainframe application migration challenges.

Google enhances Pixel security in Android 14 to block baseband attacks, 2G downgrades, and SMS Blaster fraud.

Open Source Supply Chains Can Fix Your Dependency Headaches

- thenewstack.io devops - October 03, 2024

Automated updates and community-driven tools like OpenRewrite help developers tackle dependency challenges and streamline software maintenance.

Legit Security today added an ability to rate the level of software security that has been attained to its application security posture management (ASPM) platform.

Amazon Web Services (AWS) prioritizes the security, privacy, and performance of its services. AWS is responsible for the security of the cloud and the services it offers, and customers own the security of the hosts, applications, and services they deploy in the cloud. AWS has also been introducing quantum-resistant key exchange in common transport protocols used […]

Earning the Kubernetes and Cloud Native Security Associate (KCSA) certification is valuable for both organizations and IT professionals. This certification signifies a strong understanding of basic…

Member post originally published on the Netris blog Netris version 4.3.0 has been recently released, enabling a number of functionalities for GPU-based AI cloud providers and operators.

Mismanaged non-human identities are a top cause of security breaches. Learn how secrets security can reduce risk

A Single Cloud Compromise Can Feed an Army of AI Sex Bots

- krebsonsecurity.com - October 03, 2024

Organizations that get relieved of credentials to their cloud environments can quickly find themselves part of a disturbing new trend: Cybercriminals using stolen cloud credentials to operate and resell sexualized AI-powered chat services. Researchers say these illicit chat bots, which…

AWS RDS Cross Account data Migration Using AWS DMS

- devopscube.com - October 03, 2024

In this blog, you will learn to migrate AWS RDS data from one account to another using AWS

Announcing AWS Neuron Helm Chart | Amazon Web Services

- AWS containers blogs - October 03, 2024

Introduction We are pleased to announce the launch of the Neuron Helm Chart, which streamlines the deployment of AWS Neuron components on Amazon Elastic Kubernetes Service (Amazon EKS). With this new Helm Chart, you can now seamlessly install the necessary Kubernetes artifacts needed to run training and inference workloads on AWS Trainium and AWS Inferentia instances. Until now, […]

Singapore, Singapore, 3rd October 2024, CyberNewsWire

Perfctl malware exploits Linux vulnerabilities to silently mine cryptocurrency and run proxyjacking software

In this blog, we will explore how Amazon Q Developer Agent for code transformation accelerates Java application upgrades. We will examine the benefits of this Generative AI-powered agent and outline strategies to achieve maximal acceleration, drawing from real-world success stories and best practices. Benefits of using Amazon Q Developer to upgrade your applications Amazon Q […]

North Korean hackers target Southeast Asia with VeilShell malware, a sophisticated backdoor used for covert operations.

Sonar adds GenAI capabilities for remediation vulnerabilities and a tool that identifies vulnerabilities in code generated by AI platforms.

INTERPOL arrests 8 cybercriminals in West Africa linked to phishing scams and romance fraud, defrauding victims globally.

Europol and allies dismantle LockBit ransomware's infrastructure, arresting key figures and sending a strong message to cybercriminals.

Critical Ivanti Endpoint Manager flaw CVE-2024-29824 actively exploited. CISA urges immediate updates to secure networks

Introduction Defining and provisioning standardized virtual private cloud (VPC) patterns across an enterprise poses several challenges for many customers. These challenges include ensuring self-service capabilities, meeting security and compliance requirements, and maintaining adherence to those requirements. Traditionally, when an application team wants to provision a VPC in their workload account, it is requested through a […]

In today's highly distributed and cloud-based IT environments, network monitoring has become crucial for organizations to maintain the health, performance, and security of their applications and infrastructure. However, as modern application architectures evolve, with multiple layers of abstraction and cloud-native services, many teams look for better ways to collect and use the high-quality network data […]

A survey of DevOps practitioners finds less than half of respondents work for organizations that regularly employ best DevSecOps practices.

Cybercriminals use fake trading apps on Apple and Google stores for global "pig butchering" scam, exploiting victim trust through official channels.

Today, we're announcing the GA of several new Confidential Computing options and updates to the Google Cloud attestation service. Here's what's new.

Businesses today rely heavily on their file server infrastructure to store, manage, and share mission-critical data. However, maintaining and scaling these environments can be a complex and resource-intensive task. As customer needs and data volumes continue to grow, organizations often face the need to modernize their file server infrastructure. When migrating to Amazon FSx for […]

Member post by Anshul Sao, Co-founder & CTO, Facets.cloud In today's tech landscape, organizations frequently face the need to migrate—whether from on-premise to the cloud, from one cloud provider to…

End user post by Dan Williams, Senior Infrastructure Engineer at loveholidays In this blog post, we'll share how loveholidays was able to utilise Linkerd to provide uniform metrics across all services…

CeranaKeeper, a China-linked threat actor, targets Southeast Asia using custom tools to steal data via Dropbox and OneDrive.

Recruiters targeted by spear-phishing campaign delivering More_Eggs malware via fake resumes. Trend Micro reveals new attack.

Is Kubernetes Green?

- thenewstack.io kubernetes - October 02, 2024

The container orchestrator, and the principles upon which it's built, are well-suited to adapt to the future's renewal energy supplies.

Customers are finding several advantages to using generative AI within their applications. However, using generative AI adds new considerations when reviewing the threat model of an application, whether you're using it to improve the customer experience for operational efficiency, to generate more tailored or specific results, or for other reasons. Generative AI models are inherently […]

Silver Spring, Maryland, 2nd October 2024, CyberNewsWire

Platform engineering gains traction builders of embedded systems, finds a survey of 317 decision-makers and influencers.

14 new DrayTek router vulnerabilities, including critical flaws, could allow attackers to take control. Patch now

Critical Adobe Commerce vulnerability "CosmicSting" compromises 5% of stores. Urgent patching and key rotation required to prevent data theft.

5 Must-Have Tools for Effective Dynamic Malware Analysis

- thehackernews.com - October 02, 2024

Boost cybersecurity with real-time malware analysis. Explore the top 5 tools and features in ANY.RUN.

Organizations can harness the full power of GenAI to drive innovation in software testing and deliver high-quality software products.

Embrace threat-driven pentesting and build a security posture that is ready for the real-world threats your organization faces.

North Korean hackers targeted U.S. organizations in August 2024, with Symantec citing financially driven motives.

Malicious PyPI packages disguised as crypto wallet tools steal sensitive data, targeting popular wallets like Trust and MetaMask.

Urgent patching is needed for Zimbra Collaboration as attackers exploit CVE-2024-45519 to execute commands.

Amazon Web Services (AWS) customers of various sizes across different industries are pursuing initiatives to better classify and protect the data they store in Amazon Simple Storage Service (Amazon S3). Amazon Macie helps customers identify, discover, monitor, and protect sensitive data stored in Amazon S3. However, it's important that customers evaluate and test the capabilities […]

Amazon CloudWatch Internet Monitor provides near-continuous internet measurements for your internet traffic, including availability and performance metrics, tailored to your specific workload footprint on AWS. With Internet Monitor, you can get insights into average internet performance metrics over time, as well as get alerts for issues (health events). You're notified about events that impact your end […]

Ensuring the reliability and resilience of applications is crucial for maintaining business continuity, delivering a superior customer experience, and staying compliant with industry regulations. As defined in the AWS Well-Architected Framework Reliability Pillar, testing reliability plays an important role in ensuring reliability. Chaos engineering is a powerful way to not only test how your systems […]

Techniques for Tackling Catastrophic Forgetting in AI Models

- thenewstack.io devops - October 01, 2024

Preventing catastrophic forgetting is done using three approaches: regularization, memory-based techniques, and architecture-based methods.

Discover how this high-performance remote protocol securely streams graphics-intensive apps from cloud to device, with QUIC, client enhancements, and extended OS support.

Aura created a whole new kind of connected photo frame by making it social. Powered by an invite-only group of friends and family using the Aura app, Aura frames create a space at home to share, collect, and appreciate photos. Users can easily add photos and videos using the app, and enjoy their Wi-Fi connected […]

After careful consideration, we have made the decision to discontinue AWS App Mesh, effective September 30th, 2026. Until this date, existing AWS App Mesh customers will be able to use the service as normal, including creating new resources and onboarding new accounts via the AWS CLI and AWS CloudFormation. Additionally, AWS will continue to provide […]

Rhadamanthys malware now uses AI to extract cryptocurrency wallet seed phrases, posing a major threat to crypto users.

Binary Provenance, SBOMs and the Software Supply Chain for Humans

- thenewstack.io microservices - October 01, 2024

Explore how these concepts help trace code origins, understand software components and secure the development-to-deployment journey.

The latest survey from Techstrong Research reveals that DevOps is not only thriving, but is also set to grow and evolve significantly.

A survey of 1,223 IT professionals who work in mainframe environments finds that 62% work for organizations that have adopted DevOps practices

Gemini insights about Cloud Storage

- GCP storage blogs - October 01, 2024

AI-powered insights on object metadata can help you control and understand your Cloud Storage footprint, even at billions of objects scale.

Project post by Karmada Maintainers Karmada is an open multi-cloud and multi-cluster container orchestration engine designed to help users deploy and operate business applications in a multi-cloud…

Community post originally published on Medium by Maryam Tavakkoli This article will explore CNCF projects that directly contribute to green technology, helping organizations align with their…

AWS Network Firewall is a managed firewall service that makes it simple to deploy essential network protections for your virtual private clouds (VPCs) on AWS. Network Firewall automatically scales with your traffic, and you can define firewall rules that provide fine-grained control over network traffic. When you work with security products in a production environment, you […]

How to Identify and Prevent Phishing Scams | CSA

- cloudsecurityalliance.org - October 01, 2024

Phishing scams use deceptive messages to steal sensitive info. Learn to spot tactics like urgent language, generic greetings, and suspicious links to stay protected.

Learn 5 actionable steps to protect sensitive data when using Generative AI tools like ChatGPT.

Empowering BFSI with Purpose-Built Cloud Solutions | CSA

- cloudsecurityalliance.org - October 01, 2024

India's financial sector is undergoing a transformation spurred on by cloud computing. In the near future, banks will inevitably list cloud as a top priority.

This article delves into why GitOps might be the future of DevOps, backed by trends, predictions and industry insights for 2025 and beyond.

Discover how Sniper Dz, a free phishing-as-a-service platform, enables large-scale credential theft with 140,000+ linked websites and easy-to-use tool

Hackers exploit Docker API to build botnet, using Docker Swarm and cryptojacking malware to compromise cloud hosts.

UK hacker charged for a $3.75M insider trading scheme using hacked Microsoft 365 corporate emails.

Customers use chat collaboration applications like Microsoft Teams Slack to collaborate and manage their AWS applications. AWS Chatbot is a ChatOps service that enables customers to monitor, troubleshoot issues, and manage AWS applications from chat channels. AWS Chatbot provides autonomy and customizability to DevOps teams operating their AWS environments on the go from chat collaboration […]

Crooked Cops, Stolen Laptops & the Ghost of UGNazi

- krebsonsecurity.com - September 30, 2024

A California man accused of failing to pay taxes on tens of millions of dollars allegedly earned from cybercrime also paid local police officers hundreds of thousands of dollars to help him extort, intimidate and silence rivals and former business…

As organizations increasingly adopt Amazon Q Developer, understanding how developers use it is essential. Diving into specific telemetry events and user-level data clarifies how users interact with Amazon Q Developer, offering insights into feature usage and developer behaviors. This granular view, accessible through logs, is vital for identifying trends, optimizing performance, and enhancing the overall […]

How To Streamline DevOps With Automated Testing

- thenewstack.io devops - September 30, 2024

There's no excuse for an untested app ever to be released. Seek out those tools that automate processes and eliminate the risk of human error.

Introduction In August 2022, Amazon Elastic Kubernetes Service (Amazon EKS) announced the availability of an Amazon EKS-optimized bundle of Kubecost for cluster cost visibility. The bundle is available to Amazon EKS users free of charge and enables users to gain deeper cost insights into Kubernetes resources, such as namespace, cluster, pod, and organizational concepts (for […]

This post is written by Maximilian Schellhorn, Senior Solutions Architect and Michael Gasch, Senior Product Manager, EventBridge Amazon EventBridge is a serverless event router that allows you to decouple your applications, using events to communicate important changes between event producers and consumers (targets). With EventBridge, producers publish events through an event bus, where you can […]

Transfer EFS Data Between Account Using AWS DataSync

- devopscube.com - September 30, 2024

In this blog, you will learn how to migrate EFS data from one AWS Account to another using

Externalized authorization for custom applications is a security approach where access control decisions are managed outside of the application logic. Instead of embedding authorization rules within the application's code, these rules are defined as policies, which are evaluated by a separate system to make an authorization decision. This separation enhances an application's security posture by […]

Every week, there's a new Amazon Web Services (AWS) community event where you can network, learn something new, and immerse yourself in the community. When you're in a community, everyone grows together, and no one is left behind. Last week was no exception. I can highlight the Dutch AWS Community Day where Viktoria Semaan closed […]

One of Security Command Center's advanced capabilities is detecting threat paths with a virtual red team. Here's how it works and why you need it.

A survey of DevOps practitioners finds that 60% of respondents plan to boost investments in DevOps tools and platforms in the next two years.

Encryption matters

- cncf.io - September 30, 2024

Community post by Ronald Petty and Tom Thorley of the Internet Society US San Francisco Bay Area Chapter (original post) When you hear the word encryption, what comes to mind? Take a moment…

Member post originally published on the Syntasso blog by Cat Morris While building an internal developer platform sounds like something an engineering organisation would do – and often tries to do…

Community post by Abby Bangser, Christophe Fargette, Piotr Kliczewski, Valentina Rodriguez Sosa The term IDP can be confusing, as some of the industry refers to Internal Developer Portals and some…

By Priya Mallya, Managing Director – Accenture, Sandeep Singh Bhatia, Sr Manager – Accenture Vikas Purohit – Sr. Solutions Architect – AWS Being able to internally setup and manage flexible, efficient infrastructure can be painful. Manually authoring your Infrastructure as Code (IaC) templates is error prone and time consuming. However, adoption of generative […]

Let's unpack top stories and more, and arm ourselves with the knowledge to stay safe in this ever-evolving digital landscape.

How to Respond to a Cybersecurity Breach as a CISO | CSA

- cloudsecurityalliance.org - September 30, 2024

Proactive communication, collaboration, and decisive action can turn a security breach into an opportunity for a stronger defense. Learn key strategies for handling breaches.

Critical ATG system vulnerabilities expose gas stations, hospitals, and airports to remote attacks, causing physical, economic, and environmental risk

A Hacker's Era: Why Microsoft 365 Protection Reigns Supreme

- thehackernews.com - September 30, 2024

This article highlights the vulnerabilities in Microsoft 365 and provides strategies to protect your business against ransomware and other threats.

Why attackers are turning to session hijacking to get around widespread MFA adoption, how in-app security controls are being bypassed, and what you ca

How Multi-Turn Attacks Generate Harmful AI Content | CSA

- cloudsecurityalliance.org - September 30, 2024

In a Multi-Turn Attack, a malicious user starts with a benign AI prompt and gradually escalates it. Multi-Turn Attacks are harder to detect than one-time prompts.

Five Great DevOps Job Opportunities - DevOps.com

- devops.com - September 30, 2024

Are you considering a change? This week we highlight some great DevOps job opportunities including positions at CapitalOne and NVIDIA.

Life Long Ambitions - DevOps.com

- devops.com - September 30, 2024

Life Long Ambitions

Meta fined €91M by Irish DPC for GDPR breaches after storing Facebook and Instagram passwords in plaintext.

Customers use AWS WAF to protect their web applications and APIs. They typically use a mixture of managed rules and their own custom rules, and then tune them in order to prevent as much undesired traffic as possible from reaching their applications. This implementation and tuning exercise typically produces a web access control list (web ACL) that […]

Internet Architecture Board ISO Future Networking Tech

- thenewstack.io networking - September 29, 2024

"A new directional foundation for the continued future of network management," is what the IETF group has set out to define. You can help!

Linux: Recover Files From a Machine That Won't Boot

- thenewstack.io storage - September 29, 2024

There are tons of software out there that claim to be able to recover your data from a dying drive or but why take a chance on purchasing something unproven? Here are a few options that don't cost anything.

SRE Weekly Issue #444 – SRE WEEKLY

- sreweekly.com - September 29, 2024

When you're doing something 60 million times per second, even a modest optimization makes a huge difference.

Why I don't like discussing action items during incident reviews

- surfingcomplexity.blog - September 28, 2024

I'm not a fan of talking about action items during incident reviews. Judging from the incident review meetings I've attended throughout my career, this is a minority view, and I wanted …

Git: Set Up a Local Repository Accessible by LAN

- thenewstack.io networking - September 28, 2024

How to quickly and securely deploy a Git repository on your Local Area Network for you and other team members to use.

Amazon CodeCatalyst is a unified service that streamlines the entire software development lifecycle, empowering teams to build, deliver, and scale applications on AWS. DevSecOps is the practice of integrating security into all stages of software development. Rather than prioritizing features, it injects security into an earlier phase of the development process – baking it into […]

Why Grafana Offers $100,000 to Startups for Observability

- thenewstack.io observability - September 28, 2024

With cost being a major concern for organizations when it comes to observability, Grafana is offering a $100,000 stipend to selected startups

Malicious Android app steals $70K in cryptocurrency by posing as WalletConnect. Over 150 victims impacted.

DOJ charges three Iranian nationals linked to IRGC for hacking U.S. campaigns, targeting officials, and election interference.

Prioritize Robust Engineering Over Overblown GenAI Promises

- thenewstack.io devops - September 27, 2024

Watch as the market moves away from purely speculative GenAI applications and towards practical, engineering-driven solutions.

Progress Software releases update for WhatsUp Gold fixing six vulnerabilities. Customers urged to install the patch.

In a guest column, Google Cloud experts explain how CISOs can work with cloud providers to improve their organization's incident preparedness.

Project management for SREs

- GCP devops/sre blogs - September 27, 2024

Most IT project management frameworks are directed at single-focus teams like software development, not multi-focus teams like SRE.

Community blog post by Reza Ramezanpour, developer advocate at Tigera Kubernetes is known for its modularity, and its integration with cloud environments. Throughout its history…

Mentorship blog by Nate Waddington, Head of Mentorship & Documentation at CNCF We are thrilled to share that 45 CNCF mentees with the LFX Program have successfully completed their mentorship.

How to Resize Persistent Volumes in AWS EKS Cluster

- devopscube.com - September 27, 2024

In this blog, you will learn how to resize the persistent volume in AWS EKS cluster by using

Linux CUPS vulnerabilities may allow remote code execution. Attackers could exploit these flaws via print jobs.

Implement the Shared Responsibility Model in the Cloud | CSA

- cloudsecurityalliance.org - September 27, 2024

Learn how the Cloud Shared Security Responsibility Model and the Cloud Controls Matrix work together in this summary of a session from CSA's Cloud Trust Summit.

Cary, North Carolina, 27th September 2024, CyberNewsWire

How to Plan and Prepare for Penetration Testing

- thehackernews.com - September 27, 2024

Proactively identify and mitigate cyber risks with penetration testing. Learn how to safeguard your business.

Storm-0501 targets U.S. sectors with ransomware, exploiting weak credentials to infiltrate hybrid cloud environments

How Did AWS Credentials Compromise Millions? | CSA

- cloudsecurityalliance.org - September 27, 2024

A large-scale attack exploited insecure AWS-stored credentials, impacting over 230 million environments. Protect your NHIs with key tips for minimizing attack surfaces.

DCRat malware targets Russian-speaking users through an HTML smuggling attack, leveraging social engineering tactics.

Cybersecurity certifications offer a multitude of benefits for both employees and employers.

US sanctions crypto exchanges, charges Russian nationals in cybercrime crackdown. $7.8M seized. Rewards offered for suspects' information.

Critical vulnerability in NVIDIA Container Toolkit could allow attackers to escape containers and gain host access. Urgent updates available.

A survey of maintainers of open-source software projects shows organizations should be more attentive to steward compensation.

This blog highlights the best practices, common challenges and innovative solutions for optimizing ETL testing.

In this blog, you are going to learn about the steps to deploy WordPress on Kubernetes cluster with

Effective October 28, 2024, new customers will no longer be able to create a new Amazon FSx File Gateway (FSx File Gateway). If you would like to use the service, please create an FSx File Gateway prior to October 28, 2024. To begin using FSx File Gateway, customers can navigate to the Storage Gateway console in AWS […]

Detecting security risks and investigating the corresponding findings is essential for protecting your AWS environment from potential threats, ensuring the confidentiality, integrity, and availability of your data and resources for your business needs. AWS provides a range of governance and security services such as AWS Organizations, AWS Control Tower, and AWS Config along with many others, […]

Deutsche Kreditbank AG (DKB), one of Germany's largest direct banks with over five million customers. In 2023, DKB migrated their back-office IT infrastructure to Amazon Web Services (AWS). This Included their diverse infrastructure, backup, networking, and both Windows and Linux servers, while managing risks like downtime, data integrity, and security vulnerabilities. Customers in regulated industries […]

Kia fixes vulnerabilities that allowed remote car control using only a license plate. Patch issued

Google has been named a Leader in the IDC MarketScape: Worldwide SIEM for Enterprise 2024 Vendor Assessment, a recognition of our significant investments.

How Class E addresses solve for IP address exhaustion in GKE

- GCP containers blogs - September 26, 2024

Learn how to use IPv4 Class E addresses to solve IP address exhaustion challenges in GKE environments.

Earlier this year, The Linux Foundation surveyed 200 organizations to understand how they're tackling security in cloud native application development. At a time when security breaches are increasing…

U.S. Indicts 2 Top Russian Hackers, Sanctions Cryptex

- krebsonsecurity.com - September 26, 2024

The United States today unveiled sanctions and indictments against the alleged proprietor of Joker's Stash, a now-defunct cybercrime store that peddled tens of millions of payment cards stolen in some of the largest data breaches of the past decade. The…

North Korean hackers deploy new malware strains KLogEXE and FPSpy, targeting South Korea and Japan.

Overwhelmed by SIEM alerts? Join our webinar to learn fresh strategies for modern threat management.

How to Prepare for Inevitable Risks to Your SaaS Data | CSA

- cloudsecurityalliance.org - September 26, 2024

Cyber threats are increasing and traditional cybersecurity is no longer sufficient. So why do so many organizations lag behind in building resilient defenses?

On August 20, 2024, we announced the general availability of the new AWS CloudHSM hardware security module (HSM) instance type hsm2m.medium, referred to in this post as hsm2. This new type comes with additional features compared to the previous CloudHSM instance type hsm1.medium (hsm1). The new features include the following: Support for Federal Information Processing […]

Observe, Inc. today launched a Project Voyager update that adds generative AI agents to its namesake observability platform.

EPSS enhances vulnerability prioritization by predicting real-world threats, enabling businesses to address critical risks efficiently.

SilentSelfie cyberattack targets 25 Kurdish websites, harvesting sensitive data via malicious APKs and tracking scripts.

How to Set Up Your First Cybersecurity Program | CSA

- cloudsecurityalliance.org - September 26, 2024

If you're in the process of setting up your organization's first cybersecurity program, here are some steps to take and apply to your unique needs.

Cloudflare uncovers SloppyLemming, an India-linked threat actor targeting Asian countries with sophisticated cyber espionage techniques and cloud-base

Chinese hackers breach US internet providers, targeting sensitive data and critical infrastructure. Government responds as cybersecurity concerns esca

Unleash unparalleled computing prowess and energy efficiency for memory-intensive workloads, from in-memory databases to real-time analytics, with C8g and M8g instances powered by AWS Graviton4 processors.

AWS IAM Identity Center manages user access to Amazon Web Services (AWS) resources, including both AWS accounts and applications. You can use IAM Identity Center to create and manage user identities within the Identity Center identity store or to connect seamlessly to other identity sources. Organizations might change the configuration of their identity source in […]

Pushing the boundaries of generative AI, Meta unveils Llama 3.2, a groundbreaking language model family featuring enhanced capabilities, broader applicability, and multimodal image support, now available in Amazon Bedrock.

Google's shift to Rust for Android has cut memory vulnerabilities by 52%, highlighting the benefits of safe coding.

Timeshare Owner? The Mexican Drug Cartels Want You

- krebsonsecurity.com - September 25, 2024

The FBI is warning timeshare owners to be wary of a prevalent telemarketing scam involving a violent Mexican drug cartel that tries to trick elderly people into believing someone wants to buy their property. This is the story of a…

AWS has released an update to its Amazon Q Developer agent for software development that benchmark tests show can resolve 51% more tasks.

Community post by Shon Harris (Linkedin, X) Welcome to Salt Lake City, KubeCon + CloudNativeCon attendees! You'll see the beautiful Wasatch Mountain range to the east as you take in the sights.

System Initiative Goes Live: Beyond Infrastructure as Code

- thenewstack.io devops - September 25, 2024

System Initiative brings "Digital Twins"-styled modeling to platform automation, allowing teams to visually test new configurations on the fly.

Co-chairs: Naina Singh, Mark Fussell, Evan Anderson November 12, 2024 Salt Lake City, Utah AppDeveloperCon is specifically targeting software developers who are using cloud native technologies to…

CSA Interview: Compliance Officer Rocco Alfonzetti Jr. | CSA

- cloudsecurityalliance.org - September 25, 2024

CSA interviews one of Paperclip's Compliance Officers about their contributions to CSA's data security research and how the companies' educational goals align.

System Initiative today made generally available an automation platform that creates a programmable model of an IT environment.

Mozilla faces a privacy complaint from noyb for enabling Firefox's PPA feature without user consent.

Amazon Web Services (AWS) is excited to announce that a new Information Security Registered Assessors Program (IRAP) report (2024 H1) is now available through AWS Artifact. An independent Australian Signals Directorate (ASD) certified IRAP assessor completed the IRAP assessment of AWS in August 2024. The new IRAP report includes an additional seven AWS services that are now assessed at the […]

Unit 42 reveals the discovery of Splinter, a new Rust-based post-exploitation tool posing cybersecurity risks.

Why People Trust Banks with Their Data | CSA

- cloudsecurityalliance.org - September 25, 2024

Customers are most comfortable sharing their data with banks. Why is this? Why do some industries enjoy a higher level of customer confidence about data handling?

Harness launched additions to its portfolio that include artificial intelligence (AI) agents that are deeply embedded into DevOps workflows.

Deploy Java App With MySQL on Kubernetes

- devopscube.com - September 25, 2024

In this blog, we will look at the steps to build and deploy a Java application with the

Expert Tips on How to Spot a Phishing Link

- thehackernews.com - September 25, 2024

Learn how to detect phishing links with these expert tips on URL inspection, redirects, and fake pages.

The Benefits of Social Engineering Campaigns | CSA

- cloudsecurityalliance.org - September 25, 2024

Social engineering campaigns test employee awareness, improve incident response, and strengthen cybersecurity by identifying potential human vulnerabilities to attacks.

Many AWS customers run their mission-critical workloads across multiple AWS regions to serve geographically dispersed customer base, meet disaster recovery objectives or address local laws and regulations. Amazon CodeCatalyst is a unified software development service designed to streamline and accelerate the process of building and delivering applications on AWS. It is an all-in-one platform for […]

ChatGPT vulnerability patched by OpenAI after discovery of persistent spyware risk in memory feature, potentially exposing user data.

Discover how Agentic AI revolutionizes SOC automation, overcoming SOAR's limitations to boost efficiency and response times.

North American transport firms targeted by a phishing campaign delivering info stealers and remote access trojans.

CISA adds Ivanti vTM flaw CVE-2024-7593 to Known Exploited Vulnerabilities list, urging swift remediation.

Today, we are introducing support for security group referencing on AWS Transit Gateway. This new feature allows you to create inbound security rules that reference security groups defined in other Amazon Virtual Private Clouds (Amazon VPCs) attached to a transit gateway within the same Amazon Web Services (AWS) Region. Outbound security rules referencing over Transit […]

Grafana Labs, at ObservabilityCon, unfurled a raft of additional offerings, including public previews of Explore Traces and Explore Profiles.

Microsoft Open Sources OpenHCL, a Linux-Based 'Paravisor'

- thenewstack.io containers - September 24, 2024

Microsoft's OpenHCL, a Linux-based paravisor, could form the basis of cross-platform confidential computing.

3 Key Practices for Perfecting Cloud Native Architecture

- thenewstack.io cloud-native - September 24, 2024

Long-term success requires a strong foundation.

The betting and gaming industry has grown into a data-rich landscape that presents an enticing target for sophisticated bots. The sensitive personally identifiable information (PII) that is collected and the financial data involved in betting and in-game economies is especially valuable. Microtransactions and in-game purchases are frequently targeted, making them an ideal case for safeguarding […]

aws diThis blog post is co-written by David Hocky from Comcast Corporation. This post explains how Comcast achieved faster time-to-market for new product launches, increased resiliency, and reduced operational overhead by using Amazon Web Services (AWS) Transit Gateway and AWS Direct Connect. Comcast is a global media and technology company. From the connectivity and platforms, […]

Necro malware infects 11 million Android devices via apps on Google Play, using steganography to evade detection.

Kubestronaut in Orbit: Camila Soares Câmara

- cncf.io - September 24, 2024

Get to know Camila This week's Kubestronaut in Orbit, Camila Soares Câmara, is a Senior Cloud Engineer at Wellhub in Brazil with experience in Cloud and DevOps, working with technologies such as…

What is CSA STAR? An Intro for Beginners | CSA

- cloudsecurityalliance.org - September 24, 2024

Has someone brought up the CSA STAR Program and you have no idea what that means? This blog explains what STAR is and how it helps assess cloud security.

After careful consideration, we have made the decision to discontinue support for AWS App Mesh, effective September 30th, 2026. Until this date, existing AWS App Mesh customers will be able to use the service as normal, including creating new resources and onboarding new accounts via the AWS CLI and AWS CloudFormation. Additionally, AWS will continue […]

AWS Transfer Family is a secure transfer service that lets you transfer files directly into and out of Amazon Web Services (AWS) storage services using popular protocols such as AS2, SFTP, FTPS, and FTP. When you launch a Transfer Family server, there are multiple options that you can choose depending on what you need to […]

US proposes ban on Chinese and Russian tech in connected vehicles to protect critical infrastructure and national security. New rule targets vehicle c

How Does CA's ADMT Compare to ADPPA? | CSA

- cloudsecurityalliance.org - September 24, 2024

California's ADMT and the ADPPA both address AI governance, but differ in their scope, transparency, and accountability for automated decision-making processes.

International Data Corporation (IDC)1 predicts that global data creation and consumption will surge to 175 zettabytes (ZB) by 2025. As a result, organizations are looking for swift, dependable, and scalable cloud migration solutions to lift-and-shift their growing on-premises datasets into the cloud. Whether prompted by an imminent lease renewal, termination of a data center, or […]

Kaspersky exits U.S. market, automatically replacing software with UltraAV. Users express concerns over transition.

Join our expert-led webinar to learn 2024 ransomware strategies and zero-trust defenses for your business.

The SSPM Justification Kit

- thehackernews.com - September 24, 2024

SaaS applications are under attack. Learn how SSPM can prevent costly breaches and secure your sensitive data.

How to Effectively Reduce Data Storage Costs | CSA

- cloudsecurityalliance.org - September 24, 2024

Reduce data storage costs by eliminating redundant data, optimizing tiering, and leveraging effective data classification for security and compliance.

New Android banking Trojan Octo2 targets European countries with advanced device takeover and fraud capabilities.

OpenTelemetry offers you a big-picture view, while eBPF allows you to zoom in when you need to troubleshoot with precision.

Providing transparency into the software supply chain, an SBOM helps identify vulnerabilities in third-party and open-source components.

Telegram announces a major policy change, agreeing to share IP and phone data with authorities under valid legal requests.

CNCF Artifact Hub, a One-Stop Shop for Cloud Native Config

- thenewstack.io kubernetes - September 23, 2024

The CNCF Artifact Hub is the place to start when looking for a module or an integration to kick off that cloud native project.

Amazon Virtual Private Cloud (Amazon VPC) endpoints are comprised of gateway and interface endpoints that enable users to privately access supported Amazon Web Services (AWS) services and VPC endpoint services powered by AWS PrivateLink. They offer several benefits for organizations looking to enhance their cloud infrastructure's security, performance, and cost efficiency. In an earlier post, Reduce […]

How to Build an Internal Developer Platform Like a Product

- thenewstack.io platform-engineering - September 23, 2024

Learn from four platform advocates about how to apply a Platform as a Product mindset to your platform engineering strategy.

AWS Community Days have been in full swing around the world. I am going to put the spotlight on AWS Community Day Argentina where Jeff Barr delivered the keynote, talks and shared his nuggets of wisdom with the community, including a fun story of how he once followed Bill Gates to a McDonald's! I encourage […]

AI21's Jamba 1.5 models enable high-performance long-context language processing up to 256K tokens, with JSON output support and multilingual capabilities across 9 languages.

Through accessible mobile apps, Lyrebird Studio aims to transform photography into a creative tool for everyone. Founded in 2011, the company is a leading global developer and software publisher for users who enjoy expressing themselves and creating social content. To give millions of users a responsive experience with minimal downtime, Lyrebird Studio needs its data […]

How to use Google Cloud's automatic password rotation

- GCP security blogs - September 23, 2024

Password rotation is a best practice that can be cumbersome and disruptive. Automation can help ease that burden, and today we offer a generic design to automate password rotation on Google Cloud.

Member post by Kyuho Han, SK Telecom Since the World Economic Forum (WEF) 2021, The great reset of our society through digital transformation has been accelerating. In Korea…

Why Is Encryption Essential for Data Security? | CSA

- cloudsecurityalliance.org - September 23, 2024

Encrypting data in use is essential for cybersecurity, ensuring protection against breaches, data theft, and manipulation, while addressing the limitations of traditional methods.

What is Compliance Monitoring? Mitigating Risks | CSA

- cloudsecurityalliance.org - September 23, 2024

Continuous compliance monitoring ensures organizations meet regulatory and internal obligations, mitigating risks, financial losses, and security breaches.

Why 'Never Expire' Passwords Can Be a Risky Decision

- thehackernews.com - September 23, 2024

Rethinking password expiries: Explore if 'never expire' passwords reduce IT burden or increase cyber risks.

Stay in the loop with THN's Weekly Cybersecurity Recap! Get the last week's top security headlines, from data breaches to emerging threats.

Resilient Manufacturing Through Zero Trust OT Controls | CSA

- cloudsecurityalliance.org - September 23, 2024

“Resilient manufacturing” encompasses the ability of a manufacturing organization to continue to function in the face of unexpected and adverse conditions.

Discord launches DAVE, a custom end-to-end encryption protocol for audio and video calls, enhancing user privacy while maintaining safety measures.

Severe vulnerabilities in Microchip ASF and MediaTek Wi-Fi chipsets expose IoT devices to remote code execution risks. No fix for CVE-2024-7490.

North Korean hackers use poisoned Python packages from PyPI to spread PondRAT malware, targeting developers in a supply chain attack.

Five Great DevOps Job Opportunities - DevOps.com

- devops.com - September 23, 2024

Our five great DevOps job opportunities this week includes roles at Lockheed Martin and the Metropolitan Transit Authority for New York.

Chinese hackers exploit GeoServer flaw to target APAC governments and energy sectors with sophisticated malware, including EAGLEDOOR backdoor.

The latest “Introduction to Threat Intelligence and Attribution” course, now on-demand through Mandiant Academy, can help demystify the attribution process.

As your organization's data grows, effective management of storage costs is crucial for operating an efficient and cost-effective data infrastructure. One of the most efficient strategies to reduce storage costs is transitioning files to less expensive cold storage classes. To optimize storage costs according to their specific needs and requirements, organizations need the flexibility to […]

Linearizability! Refinement! Prophecy!

- surfingcomplexity.blog - September 22, 2024

Back in August, Murat Derimbas published a blog post about the paper by Herlihy and Wing that first introduced the concept of linearizability. When we move from sequential programs to concurrent on…

Linux: Create and Connect to an NFS Share

- thenewstack.io networking - September 22, 2024

If you need faster copy and write speeds than you're finding with Samba, NFS is a great option. Just remember that NFS isn't quite as flexible as Samba.

Tetragon eBPF for Kubernetes: The Verdict Is Out

- thenewstack.io kubernetes - September 22, 2024

One of Tetragon's key attributes is how it simplifies security observability, and it enhances observability without compromising performance.

SRE Weekly Issue #443 – SRE WEEKLY

- sreweekly.com - September 22, 2024

Thinking of creating a microservice architecture? Maybe think twice, says this article — backed by solid arguments.

Twelve hacktivist group targets Russian entities with destructive cyber attacks, using public tools for maximum damage without financial gain.

LinkedIn suspends AI training with UK user data after ICO intervention. Tech giants face scrutiny over data privacy in AI development.

Ukraine bans Telegram for government, military, and infrastructure workers, citing national security and cyber threats.

Automating the Security of Kubernetes Clusters in the Cloud

- thenewstack.io kubernetes - September 21, 2024

Cast AI, whose AI-based Kubernetes Automation Platform has helped organizations cut their cloud costs, has added security capabilities to the mix.

User files are increasingly growing in number and size. Maintaining and managing file growth can be challenging without an effective set of tools and automation that scales with your data growth. Customers agree that visibility is key for managing existing files and for developing a plan to support future growth. Amazon CloudWatch is a service […]

In today's interconnected world, businesses of all sizes rely on secure and efficient network connectivity to operate seamlessly across multiple locations. Amazon Web Services (AWS) Site-to-Site Virtual Private Networks (Site-to-Site VPN) offer a reliable way to extend a private network across public infrastructure such as the internet, enabling organizations to securely connect their offices, data centers, and Amazon Virtual […]

Building for Integrations Is a Future-Minded Growth Strategy

- thenewstack.io devops - September 20, 2024

According to Canva's co-founder and chief product officer, it's critical to balance developers' needs and core product values.

Website defacement occurs when threat actors gain unauthorized access to a website, most commonly a public website, and replace content on the site with their own messages. In this blog post, we show you how to detect website defacement, and then automate both defacement verification and your defacement response by using Amazon CloudWatch Synthetics visual […]

Co-chairs: Melissa Logan and Adam Durr November 12, 2024 Salt Lake City, Utah Organizations like Etsy, Grab, Dish Network, and Chick-fil-A have standardized on Kubernetes and shared best practices for…

End user post by Alolita Sharma, Engineering Leader at Apple, CNCF Board & EndUser TAB, OpenTelemetry GC, CNCF Observability TAG Co-Chair The CNCF End User Technical Advisory Group (TAB) was formally…

Leveraging Zero-Knowledge Proofs in Machine Learning | CSA

- cloudsecurityalliance.org - September 20, 2024

Are zero-knowledge proofs used in machine learning at all? This blog post answers this question and explores the potential applications for ML and LLMs.

Global authorities dismantle iServer phishing platform, responsible for unlocking 1.2M stolen phones, impacting 483,000 victims.

The Metadata Minefield: Protecting Your Sensitive Data | CSA

- cloudsecurityalliance.org - September 20, 2024

Metadata cybersecurity incidents are serious enough to be considered breaches when compromised by a cybercriminal. Understand the risks.

Learn why traditional PAMs fail at SSH key management and how ephemeral secrets reduce security risks.

Build a Comprehensive Trust Center for Your Customers | CSA

- cloudsecurityalliance.org - September 20, 2024

‍One of the best ways to provide trust for customers is through a well-crafted Trust Center. Get tips and best practices for creating your own Trust Center.

Mandiant links Iranian APT UNC1860 to MOIS, revealing its sophisticated remote access tools and persistent backdoors targeting high-priority networks.

Google introduces a new Password Manager PIN, enabling secure passkey syncing across devices in Chrome.

Critical Ivanti CSA flaw actively exploited. Patch now to prevent unauthorized access and remote code execution. CISA adds to KEV catalog.

This Windows PowerShell Phish Has Scary Potential

- krebsonsecurity.com - September 19, 2024

Many GitHub users this week received a novel phishing email warning of critical security holes in their code. Those who clicked the link for details were asked to distinguish themselves from bots by pressing a combination of keyboard keys that…

The 2024 Gartner Magic Quadrant positions AWS as a Leader, reflecting our commitment to diverse virtual desktop solutions and operational excellence - driving innovation for remote and hybrid workforces.

NGINX One makes it possible to manage both instances of F5 NGINX instances and NGINX Open Source via a software-as-a-service (SaaS) platform via a single console.

Learn why service accounts are vulnerable to ransomware attacks and how to secure them effectively

Hackers exploit FOUNDATION software vulnerabilities in construction companies, brute-forcing default credentials to gain access.

Routing in a Google Cloud VPC network

- GCP networking blogs - September 19, 2024

Learn about routing options from a VM to access apps and services, and how policy-based routes enable traffic inspection within a VPC in Google Cloud.

To make identities easier to deal with, we've integrated Cloud Infrastructure Entitlement Management into Security Command Center. Here's how it can help.

A Leader in 2024 Gartner Magic Quadrant for Container Management

- GCP containers blogs - September 19, 2024

For the second year in a row, Google Cloud was recognized as a Leader in the 2024 Gartner Magic Quadrant for Container Management.

Community post by Gerardo Lopez Falcon En el mundo moderno del desarrollo de software, los contenedores han transformado la forma en que las empresas y los desarrolladores despliegan y administran sus…

FedRAMP Moderate Equivalency for Cloud Providers | CSA

- cloudsecurityalliance.org - September 19, 2024

Get a summary of the DoD's December 2023 memo “FedRAMP Moderate Equivalency for CSP's Cloud Service Offerings.” Learn what documentation is required.

Amazon Web Services (AWS) announces that it has successfully renewed the Portuguese GNS (Gabinete Nacional de Segurança, National Security Cabinet) certification in the AWS Regions and edge locations in the European Union. This accreditation confirms that AWS cloud infrastructure, security controls, and operational processes adhere to the stringent requirements set forth by the Portuguese government […]

TeamTNT resurfaces with a cryptojacking campaign targeting CentOS VPS servers, disabling security and deploying rootkits.

New SambaSpy malware targets users in Italy using phishing techniques that exploit language and browser settings.

Securing Multi-Cloud Layers with PAM | CSA

- cloudsecurityalliance.org - September 19, 2024

Protect every layer of multi-cloud infrastructure with tailored Privileged Access Management (PAM) strategies, from on-prem servers to cloud management and SaaS apps.

Silver Spring, Maryland, 19th September 2024, CyberNewsWire

Rising cyberattacks threaten healthcare systems. Learn how improving cybersecurity hygiene can protect patients and prevent ransomware.

Governing Scanner Adoption in DevSecOps | CSA

- cloudsecurityalliance.org - September 19, 2024

Governing scanner adoption in DevSecOps involves strategic hooks and governance. Explore best practices for each stage of the application security process.

Microsoft reveals Vanilla Tempest using INC ransomware to target U.S. healthcare. Threat actor exploits GootLoader, deploys various tools for attacks.

GitLab patches critical authentication bypass flaw in SAML library. Users urged to update and enable 2FA to protect against potential account takeover

Managing and operating monitoring systems for containerized applications can be a significant operational burden for customers such as metrics collection. As container environments scale, customers have to split metric collection across multiple collectors, right-size the collectors to handle peak loads, and continuously manage, patch, secure, and operationalize these collectors. This overhead can detract from an […]

Users who support multi-tenant environments need shared storage platforms that can securely isolate data between clients. For example, imagine a pharmaceutical company with several divisions, each working on different product lines. Storage administrators need to prevent one division from viewing or accessing the files and data from the projects of the others. They use export […]

New memory-optimized X8g instances offer up to 3 TiB DDR5 memory, 192 vCPUs, and 50 Gbps network bandwidth, designed for memory-intensive workloads like databases, analytics, and caching with unparalleled price/performance and efficiency.

As a security team lead, your goal is to manage security for your organization at scale and ensure that your team follows AWS Identity and Access Management (IAM) security best practices, such as the principle of least privilege. As your developers build on AWS, you need visibility across your organization to make sure that teams […]

Gain indispensable data engineering expertise through a hands-on specialization by DeepLearning.AI and AWS. This professional certificate covers ingestion, storage, querying, modeling, and more.

Cybersecurity researchers uncover massive Chinese-linked IoT botnet "Raptor Train," infecting 200,000+ devices and targeting US and Taiwan sectors.

Uncovering AWS Identity and Access Management (IAM) users and roles potentially involved in a security event can be a complex task, requiring security analysts to gather and analyze data from various sources, and determine the full scope of affected resources. Amazon Detective includes Detective Investigation, a feature that you can use to investigate IAM users […]

Community post originally published on Medium by Dotan Horovits Last month the OpenMetrics project was officially archived and folded into Prometheus. That's the end of an open source project journey…

Co-chairs: David Hirsch, Michael Beemer November 12, 2024 Salt Lake City, Utah The Open Feature Summit focuses on the use of feature flags and experimentation in cloud-native environments.

Scam 'Funeral Streaming' Groups Thrive on Facebook

- krebsonsecurity.com - September 18, 2024

Scammers are flooding Facebook with groups that purport to offer video streaming of funeral services for the recently deceased. Friends and family who follow the links for the streaming services are then asked to cough up their credit card information.…

Challenges with Managing Permissions and API Keys | CSA

- cloudsecurityalliance.org - September 18, 2024

Get key insights from a recent Identity and Access Management (IAM) survey report. The report shows that organizations are struggling to manage API keys.

Activating your defender's advantage at mWISE '24

- GCP security blogs - September 18, 2024

To stay ahead of evolving threats, security experts are convening at mWISE '24 to tap into a vital but underutilized tool to strengthen their defenses: collaboration.

Despite the hundreds of exposed web applications and APIs in our attack surfaces, many assets remain untested and vulnerable to cyberattacks.

Chinese engineer indicted in U.S. for multi-year spear-phishing campaign targeting NASA, military, and universities.

Imagine running a large business with critical data stored on your servers. One day, your systems get hit by ransomware, leaving your data encrypted and inaccessible. The bad actor demands a hefty ransom to provide the decryption key. Paying the ransom doesn't guarantee that you can get your data back, and not paying might mean […]

CortexClick has launched a content generation platform based on LLMs that have been trained to create documentation and technical blog posts.

What You Need to Know About Cyber Extortion | CSA

- cloudsecurityalliance.org - September 18, 2024

Explore cyber extortion tactics, the methods cybercriminals use, and recommendations to help your organization effectively handle cyber extortion risks.

In this blog post, I take you on a deep dive into Amazon GuardDuty Runtime Monitoring for EC2 instances and key capabilities that are part of the feature. Throughout the post, I provide insights around deployment strategies for Runtime Monitoring and detail how it can deliver security value by detecting threats against your Amazon Elastic […]

Cary, North Carolina, 18th September 2024, CyberNewsWire

Why Pay A Pentester?

- thehackernews.com - September 18, 2024

Automated penetration testing disrupts cybersecurity by offering faster, cheaper, and broader testing coverage.

What is Penetration Testing? Strategy & Success | CSA

- cloudsecurityalliance.org - September 18, 2024

Penetration testing simulates cyberattacks to identify security gaps in IT systems. Learn strategies for successful penetration testing and how to enhance cloud security.

North Korean hackers use job-themed phishing to deploy the MISTPEN backdoor, targeting global aerospace and energy sectors.

Google Chrome's latest update enhances user privacy and security with improved Safety Check, one-time permissions, and easier notification management.

GSMA aims to implement end-to-end encryption for RCS messaging across Android and iOS, following Apple's iOS 18 RCS support rollout.

Broadcom patches critical VMware vCenter Server vulnerability, CVE-2024-38812, preventing remote code execution. Update now.

Solution overview When you create your applications and want to expose internal API endpoints, you can build your microservices using different compute options such as AWS Lambda, Amazon Elastic Container Service (ECS), and Amazon Elastic Kubernetes Service (Amazon EKS). Then, you can deploy your applications across multiple AWS accounts and multiple Amazon Virtual Private Clouds […]

Traefik 3.0 Works Better With WebAssembly and OpenTelemetry

- thenewstack.io kubernetes - September 17, 2024

Traefik Proxy 3.0 enhances reverse proxy performance with OpenTelemetry integration, WebAssembly support, and improved Kubernetes Gateway API functionality.

Secure your mission-critical data with S3 Express One Zone's server-side encryption using KMS keys, combining top-notch performance and robust security for regulatory compliance.

In January 2023, AWS announced the support of ingestion for activity events from non-AWS sources using CloudTrail Lake. Making CloudTrail Lake a single location of immutable user and API activity events for auditing and security investigations. AWS CloudTrail Lake is a managed data lake for capturing, storing, accessing, and analyzing user and API activity on […]

Open to technologists of all levels, KubeDay Colombia will convene engaging cloud native speakers and community members to Medellín SAN FRANCISCO, Calif. – September 17, 2024 – The Cloud Native…

To help protect your organization from credential theft and accidental credential loss, we're excited to announce the general availability of certificate-based access in our Identity and Access Management portfolio.

Many users safeguard their on-premises infrastructure with Veeam Backup & Replication (VBR). This is done to minimize the physical backup infrastructure they need to acquire and maintain. Additionally, they seek to make sure that their backups reside in highly durable, secure, and cost-effective storage solutions. By using Amazon Simple Storage Service (S3), VBR users can […]

Co-chairs: Iris Ding & Keith Mattix November 12, 2024 Salt Lake City, Utah Istio Day is the biannual community event for the industry's most widely adopted and feature rich service mesh…

The CNCF Technical Oversight Committee (TOC) has voted to accept Artifact Hub as a CNCF incubating project. Artifact Hub is a web-based application that enables finding, installing…

Enterprise Cybersecurity: Strategies and Collaboration | CSA

- cloudsecurityalliance.org - September 17, 2024

Enterprises are overhauling their cybersecurity strategies to combat rising cyber threats. Learn how integrated approaches and partnerships are driving success.

What Is Testcontainers, and Why Should You Care?

- thenewstack.io containers - September 17, 2024

Testcontainers reduces friction in setting up and tearing down test environments, streamlining testing to enable more confident, robust development.

As the digital frontier evolves, it is becoming imperative for C-suite executives to cultivate a robust DevOps and DevSecOps culture.

Cybercriminals Exploit Docusign with Phishing | CSA

- cloudsecurityalliance.org - September 17, 2024

Cybercriminals are abusing Docusign by selling customizable phishing templates on crime forums, allowing attackers to steal credentials for phishing/BEC scams.

A study of developers working on large engineering teams that have adopted the GitHub Copilot AI tool finds limited gains in productivity.

Member post by Anshul Sao, Co-founder & CTO, Facets.cloud In today's tech landscape, organizations frequently face the need to migrate—whether from on-premise to the cloud, from one cloud provider to…

Meta will use public UK Facebook and Instagram content to train AI. Users can easily opt out.

Google adopts ML-KEM in Chrome for post-quantum security, as EUCLEAK vulnerability impacts YubiKey devices. Tech giants prepare for quantum threats.

U.S. Treasury sanctions Intellexa Consortium executives for developing and distributing Predator spyware, citing national security and privacy concern

How to Investigate ChatGPT activity in Google Workspace

- thehackernews.com - September 17, 2024

Learn how ChatGPT's integration with Google Drive poses cybersecurity risks and how to monitor file access.

The Edge Revolution in a Hyperconnected World | CSA

- cloudsecurityalliance.org - September 17, 2024

Traditional data processing models come with inherent latency issues. Edge computing eliminates the need to send data back to centralized data centers.

Binance warns of a global clipper malware targeting cryptocurrency users, replacing wallet addresses to steal funds.

A survey of developers and ITDMs finds that 70% of respondents work for organizations that hold developers responsible for deployments.

SolarWinds patches critical remote code execution vulnerability in Access Rights Manager (ARM) software. Update now to protect your systems.

Gearset has acquired Clayton, a provider of a code analysis platform for SaaS applications running on the Salesforce cloud service.

The AWS Customer Incident Response Team (CIRT) has developed a methodology that you can use to investigate security incidents involving generative AI-based applications. To respond to security events related to a generative AI workload, you should still follow the guidance and principles outlined in the AWS Security Incident Response Guide. However, generative AI workloads require […]

Amazon Bedrock is a fully managed service that offers a choice of high-performing foundation models (FMs) from leading AI companies like AI21 Labs, Anthropic, Cohere, Meta, Mistral AI, Stability AI, and Amazon through a single API, along with a broad set of capabilities you need to build generative AI applications with security, privacy, and responsible […]

Ten features in AWS Chatbot to help you understand your application health and resolve issues faster from chat channels.

Agentic AI Tools for Building and Managing Agentic Systems

- thenewstack.io devops - September 16, 2024

Agentic AI systems adapt and respond to ever-evolving situations where the context may change over time — all with minimal human intervention.

Hello, everyone! It's been an interesting week full of AWS news as usual, but also full of vibrant faces filling up the rooms in a variety of events happening this month. Let's start by covering some of the releases that have caught my attention this week. My Top 3 AWS news of the week Amazon […]

Generative artificial intelligence (AI) is now a household topic and popular across various public applications. Users enter prompts to get answers to questions, write code, create images, improve their writing, and synthesize information. As people become familiar with generative AI, businesses are looking for ways to apply these concepts to their enterprise use cases in […]

CISO Phil Venables talks about the importance of collaboration and engaging across industries in his latest newsletter.

Accelerate Ray in production with Ray Operator on GKE

- GCP containers blogs - September 16, 2024

You can now enable declarative APIs to manage Ray clusters on GKE by setting a single flag on cluster creation.

The CNCF Technical Oversight Committee (TOC) has voted to accept Artifact Hub as a CNCF incubating project. Artifact Hub is a web-based application that enables finding, installing…

A deep dive into NetBox operator

- cncf.io - September 16, 2024

Member post from Swisscom by Lea Brühwiler, Ashan Senevirathne, Joel Studler, Alexander North, Henry Chun-Hung Tseng, Fabian Schulz We have adopted the GitOps model and leveraged Kubernetes to…

Member post originally published on the Devtron blog by Bhushan Nemade As organizations rush towards the cloud-native paradigm, most face an unexpected issue i.e. skyrocketing infrastructure expenses.

Strategic Cost-Cutting for Cybersecurity in 2024 | CSA

- cloudsecurityalliance.org - September 16, 2024

Balancing strong cybersecurity with limited budgets is crucial for CISOs. Learn how to optimize resources, leverage AI, and make strategic cybersecurity investments.

Unintended Consequences - DevOps.com

- devops.com - September 16, 2024

Danger lurks in the most unexpected of places.

The Australian Prudential Regulation Authority (APRA) has established the CPS 230 Operational Risk Management standard to verify that regulated entities are resilient to operational risks and disruptions. CPS 230 requires regulated financial entities to effectively manage their operational risks, maintain critical operations during disruptions, and manage the risks associated with service providers. Amazon Web Services […]

Boston, USA, 16th September 2024, CyberNewsWire

Copado today revealed it has developed a series of AI agents capable of automating DevOps workflows for Salesforce.

North Korean threat actors are using LinkedIn to spread RustDoor malware, targeting professionals in the crypto sector.

Google patches critical Cloud Composer vulnerability that could enable remote code execution via dependency confusion.

Identity and Access Management Solutions | CSA

- cloudsecurityalliance.org - September 16, 2024

IAM ensures individuals access only the resources they are authorized to by verifying their identity and managing their roles and privileges. Insufficient IAM can lead to major security breaches.

Learn the latest tactics hackers use, proven strategies for rapid detection and containment, and how to build a robust Identity Incident Response Play

Achieve PCI DSS v4.0 compliance by 2025 with Reflectiz's streamlined script monitoring and smart approvals.

The Top 3 Trends in LLM and AI Security | CSA

- cloudsecurityalliance.org - September 16, 2024

A math PhD and AI expert shares the 3 major trends that keep emerging when it comes to LLM and AI security.

Five Great DevOps Job Opportunities - DevOps.com

- devops.com - September 16, 2024

A weekly summary of DevOps job opportunities, including a Cloud Services Engineer role at Intel and an engineer role at Parsons Corp.

Now is the time for the open source ecosystem to band together and find strength in numbers CNCF and The Linux Foundation are expanding their partnership with Unified Patents to protect open source…

Apple drops lawsuit against NSO Group, citing risk of exposing critical threat intelligence amid growing spyware threats.

Cybercriminals exploit HTTP header refresh techniques in phishing campaigns targeting corporations, government agencies, and schools for credential th

Amazon Q Developer is the most capable AI-powered assistant for software development that reimagines the experience across the entire software development lifecycle, making it easier and faster to build, secure, manage, and optimize applications on AWS. Using your natural language input and your project context, Amazon Q Developer's agent for software development autonomously implements multi-file […]

Protect Your Codebase: The Importance of Provenance

- thenewstack.io devops - September 15, 2024

The security of your software is directly impacted by the dependencies you choose.

Docker Overhauls, Simplifies Subscription Plans

- thenewstack.io containers - September 15, 2024

From offering a mix of developer programs, the emphasis going forward is on providing an end-to-end programmer platform.

SRE Weekly Issue #442 – SRE WEEKLY

- sreweekly.com - September 15, 2024

Here's a hands-on evaluation of the SLO offerings of three big players in the space. The author includes screenshots of their tests and shares their opinions on each.

Git Push: How to Use the CLI to Interact with GitHub

- thenewstack.io ci-cd - September 14, 2024

By using git with GitHub, you are able to collaborate on code with anyone else able to access the repository. Here's how.

AlmaLinux: Deploy a DHCP Server for Your Internal Network

- thenewstack.io networking - September 14, 2024

By deploying a DHCP server to run your internal network on a separate Linux server, you are in control of the updates and even the security of the device.

Ivanti warns of active exploitation of Cloud Appliance flaw CVE-2024-8190. Patch urgently required.

This post discusses Bottlerocket, a Linux-based open source operating system (OS) that is purpose-built for running containers. We walk through fleet management at scale and how users can benefit from it. We also share how the product roadmap of Bottlerocket is driven based on community and user feedback. The challenges of fleet management with General-Purpose […]

Developing strategies to navigate the evolving digital sovereignty landscape is a top priority for organizations operating across industries and in the public sector. With data privacy, security, and compliance requirements becoming increasingly complex, organizations are seeking cloud solutions that provide sovereign controls and flexibility. Recently, Max Peterson, Amazon Web Services (AWS) Vice President of Sovereign […]

Why Cloud Migrations Fail

- thenewstack.io devops - September 13, 2024

Here are the top three reasons cloud migrations can fail — plus some critical guidance that may help right the ship.

Dagger for Docker's CI/CD and Security Gaps

- thenewstack.io devops - September 13, 2024

Dagger is well-suited for CI/CD, and can be integrated with GitHub for CI/CD projects.

DDoS attacks can have a devastating impact on gaming companies. Here's why EA Sports chose Google Cloud Armor.

Hyperdisk storage pools optimizes GKE block storage

- GCP compute blogs - September 13, 2024

Placing Hyperdisk block storage disks in a storage pool lets you share capacity and performance among the disks and optimize for operations and cost.

Community post by Danielle Cook, Cartografos Working Group As organizations continue their journey toward digital transformation, cloud native technologies are increasingly critical for achieving…

Never Trust User Inputs-And AI Isn't an Exception | CSA

- cloudsecurityalliance.org - September 13, 2024

Never trust user inputs, especially when it comes to AI systems like chatbots. This blog explains the importance of a security-first approach in AI development.

Apple patches Vision Pro vulnerability after GAZEploit attack exposes keystroke inference risk via gaze tracking.

17-year-old arrested over cyber attack on TfL, exposing 5,000 customers' sensitive data. Investigation ongoing.

If you have a customer facing application, you might want to enable self-service sign-up, which allows potential customers on the internet to create an account and gain access to your applications. While it's necessary to allow valid users to sign up to your application, self-service options can open the door to unintended use or sign-ups. […]

The Dark Nexus Between Harm Groups and 'The Com'

- krebsonsecurity.com - September 13, 2024

A cyberattack that shut down some of the top casinos in Las Vegas last year quickly became one of the most riveting security stories of 2023: It was the first known case of native English-speaking hackers in the United States…

Benefits of the Shared Security Responsibility Model | CSA

- cloudsecurityalliance.org - September 13, 2024

The Shared Responsibility Model defines security responsibilities between the cloud provider & customer. Understand the burdens & benefits of the model.

Cribl this week added support for multiple additional platforms to its cloud service for collecting and routing telemetry data.

Researchers reveal TrickMo banking trojan targeting Android users with anti-detection tactics and accessibility abuse to steal credentials and OTPs.

Discover how Beyond Identity's deterministic security approach eliminates phishing, credential theft, and other cyber threats with passwordless, phish

Critical WhatsUp Gold vulnerabilities exploited within hours of PoC release. Attackers bypass authentication to install remote access tools.

5 Key Data Privacy and Compliance Trends in 2024 | CSA

- cloudsecurityalliance.org - September 13, 2024

2024 has seen some monumental data privacy and compliance changes. Here are the top 5 issues and some actionable recommendations for staying compliant.

New Linux malware 'Hadooken' targets Oracle Weblogic, deploys crypto miners and DDoS botnet. Exploits vulnerabilities for lateral movement.

Near real-time data replication: RDS for MySQL zero-ETL with Redshift streamlines data ingestion with filtering, multiple integrations, and CloudFormation support for customized insights without managing complex pipelines.

How Meta Is Reinforcing its Global Network for AI Traffic

- thenewstack.io networking - September 12, 2024

In 2022, Meta engineers realized they needed to deal with the incoming tsunami of AI data traffic that was about to overwhelm their networks.

Amazon Web Services (AWS) offers a wide choice of networking services. While these services enable AWS to meet more customer needs around networking, that variety increases the number of available options to consider in making architectural decisions when designing AWS and hybrid networking infrastructure. Cost is one of the main factors that drive architectural decisions […]

Developing secure products and services is imperative for organizations that are looking to strengthen operational resilience and build customer trust. However, system design often prioritizes performance, functionality, and user experience over security. This approach can lead to vulnerabilities across the supply chain. As security threats continue to evolve, the concept of Secure by Design (SbD) […]

New Android malware 'Ajina.Banker' targets bank customers in Central Asia, stealing financial data and intercepting 2FA messages via Telegram channels

GitLab patches critical flaw (CVE-2024-6678) allowing unauthorized pipeline job execution. Update to latest version to protect your repositories

The first step towards protecting sensitive data begins with knowing where it exists. Our Sensitive Data Protection solution can help.

Silver Spring, United States, 12th September 2024, CyberNewsWire

What's new in CRI-O 1.31

- cncf.io - September 12, 2024

Project post originally published on Github by Sascha Grunert The CRI-O maintainers are happy and proud to announce that CRI-O v1.31.0 has been released! This brand new version contains a large list…

IDC Findings: Trust Centers Can Help Accelerate Sales | CSA

- cloudsecurityalliance.org - September 12, 2024

Review insights from a recent IDC Analyst Brief that found that trust centers are an invaluable part of an organization's security and privacy strategy.

Member post originally published on CyberArk's blog by Shlomo Heigh In today's fast-paced world of DevOps and cloud-native applications, managing secrets securely is critical. CyberArk Conjur…

Vo1d malware infects 1.3M Android TV boxes in 197 countries. Learn about this new backdoor threat and how it compromises device security.

Exposed Selenium Grid servers targeted for crypto mining and proxyjacking. Learn about the vulnerabilities and how to protect your infrastructure.

What are OAuth Tokens? Secure Authentication Explained | CSA

- cloudsecurityalliance.org - September 12, 2024

OAuth tokens securely grant third-party access to your systems, but managing them is crucial to prevent misuse. Learn what OAuth tokens are and how to secure them.

Top 3 Threat Report Insights for Q2 2024

- thehackernews.com - September 12, 2024

IntelBroker threats, Amazon spoofing, and Log4j exploits dominate Cato CTRL's Q2 2024 Cyber Threat Report.

Iranian threat actor OilRig targets Iraq's government networks with new malware, exploiting advanced C2 protocols.

Irish Data Protection Commission launches inquiry into Google's AI model PaLM 2, investigating GDPR compliance in personal data processing for AI dev

SaaS Challenges, Solutions, and Best Practices for 2024 | CSA

- cloudsecurityalliance.org - September 12, 2024

SaaS security faces growing challenges, but following best practices like centralized access control and continuous monitoring can protect sensitive data and ensure compliance.

A survey on behalf of Outsystems and KPMG sees AI and automation are accelerating the pace of software development time.

WordPress.org mandates 2FA for plugin/theme developers, introduces SVN passwords to enhance security and prevent unauthorized access.

Quad7 botnet evolves, targeting routers with new stealth techniques, compromising major brands globally in expanding attacks.

Chinese hackers launch DragonRank campaign, targeting multiple countries for SEO manipulation using BadIIS malware and compromised IIS servers.

Co-chairs: Eduardo Silva, Chronosphere, Austin Parker, Honeycomb, Anna Kapuscinska, Isovalent at Cisco November 12, 2024 Salt Lake City, Utah Observability is a journey, and in a diverse ecosystem…

Things to do in Salt Lake City

- cncf.io - September 11, 2024

With KubeCon + CloudNativeCon North America 2024 just a few months away we thought it would be fun to ask our ambassadors and other locals about where to go and what to do while we're all in Salt Lake…

Introduction Since its launch, AWS Cloud WAN has sparked a lot of interest from customers and has seen a number of enhancements. The latest is service insertion, a new capability that lets you easily insert AWS and third-party networking and security services onto AWS Cloud WAN using a central policy document. Using this feature, you […]

Singapore police arrest six suspects in major cybercrime bust, seizing hacking tools and cryptocurrency. Charges filed under Computer Misuse Act.

Why Is It So Challenging to Go Passwordless?

- thehackernews.com - September 11, 2024

Passwordless authentication promises enhanced security, but challenges exist. Explore the risks and benefits of going passwordless vs. improving passw

Discover how cybercriminals target developers with malicious Python packages, fake job interviews, and coding tests in the latest VMConnect campaign.

Several techniques blend accounting principles with engineering practices to make cloud cost optimization practical and effective.

Changes to agile methodology are inevitable because GenAI and Agile are providing real competitive advantages.

Microsoft's September 2024 Patch Tuesday fixes 79 security vulnerabilities, including three actively exploited Windows flaws.

Ivanti releases critical security updates for Endpoint Manager, addressing remote code execution vulnerabilities. Users urged to update immediately.

Torrance, United States / California, 12th September 2024, CyberNewsWire

New capabilities enable users to 'shift left & right' simultaneously, helping developers save time.

Direct Supply, the leading provider of products and services to the Long-Term Care industry, migrated the bulk of our IT systems to AWS in early 2019. In the run-up to our cut over, we had five Server Message Block (SMB) file systems that needed to live alongside the applications they support. This meant that roughly […]

Amazon SageMaker HyperPod's integration with Amazon EKS brings resilience, observability, and flexibility to large model training, reducing downtime by up to 40%.

AWS Service Catalog (Service Catalog) is a powerful tool that empowers organizations to manage and govern approved services and resources. It significantly benefits platform engineering by standardizing environments, accelerating service delivery, and enhancing security. With its automated provisioning and resource management, Service Catalog supports infrastructure as code, enabling scalable, reliable deployments. Platform engineering teams are […]

JFrog CEO Shlomi Ben Haim says that unless application developers adapt their jobs are indeed at risk because of the rise of GenAI.

Community post originally published on Dev.to by Syed Asad Raza Kubernetes plugins, or "kubectl plugins," are tools that extend the functionality of the kubectl command-line tool. These plugins can be…

Discover how CosmicBeetle's new ScRansom ransomware targets SMBs globally, its evolution from Scarab, and the latest cybersecurity threats facing busi

JFrog, GitHub Join Forces for Unified Runtime Security

- thenewstack.io ci-cd - September 10, 2024

Integration helps extend JFrog's vision to seamlessly integrate security at every stage of software development, across code and binaries, from planning to production.

Kubestronaut in Orbit: Daiki Takasao

- cncf.io - September 10, 2024

Get to know Daiki This week's Kubestronaut in Orbit, Daiki Takasao, is a Japanese IT infrastructure engineer at NRI. He works with CNCF technologies to build financial IT systems and has been using…

Maximize Cloud Security Excellence: CSA Membership | CSA

- cloudsecurityalliance.org - September 10, 2024

CSA corporate membership is designed to enhance your organization's security posture, fill skills gaps, and connect you with industry leaders.

Cary, North Carolina, 10th September 2024, CyberNewsWire

Large Language Models: How to Secure LLMs with AI | CSA

- cloudsecurityalliance.org - September 10, 2024

Securing LLMs requires advanced strategies beyond traditional security. Key steps include detecting shadow LLMs, data sanitization, policy enforcement, and semantic firewalls.

Ceph: 20 Years of Cutting-Edge Storage at the Edge

- thenewstack.io storage - September 10, 2024

Ceph started as a 40,000-line C++ implementation of the Ceph File System, and it has since evolved into a comprehensive storage solution used by organizations worldwide.

Backup and DR service adds immutable, indelible backups

- GCP compute blogs - September 10, 2024

Protect your data with Google Cloud's enhanced Backup and DR service, featuring immutable backup vaults and streamlined management for data protection.

Today, JFrog and GitHub extended their alliance to provide a unified dashboard that makes tracking and prioritizing vulnerabilities.

Chinese-linked cyber espionage targets Southeast Asian governments, using sophisticated malware to infiltrate and steal sensitive data.

By nurturing a healthy ecosystem, every stakeholder will grow increasingly productive, and happy with the software they produce.

Learn how shadow apps bypass IT controls, increase SaaS risks, and the role of SSPM in detection

AI Regulations: Transforming GRC & Cybersecurity | CSA

- cloudsecurityalliance.org - September 10, 2024

AI Acts can drive greater accountability, risk management, ethical practices, compliance, and stakeholder engagement around AI adoption.

Community post by Alexander Schwartz, Keycloak maintainer KeyConf24, our 2024 Keycloak Identity Summit, will happen on September 19th, which is just around the corner! This year's event promises to be…

Discover PIXHELL, a new side-channel attack exploiting screen-generated noise to breach air-gapped computers and exfiltrate sensitive data.

Mustang Panda's refined malware tools, including PUBLOAD and PlugX, target APAC governments, escalating cyber espionage.

Singapore, SG, 10th September 2024, CyberNewsWire

Buried in Code - DevOps.com

- devops.com - September 10, 2024

The lengths we'll go to distract ourselves from the anxieties at hand. The lengths we'll go to distract ourselves from the anxieties at hand.

Palo Alto, USA/California, 11th September 2024, CyberNewsWire

Bug Left Some Windows PCs Dangerously Unpatched

- krebsonsecurity.com - September 10, 2024

Microsoft Corp. today released updates to fix at least 79 security vulnerabilities in its Windows operating systems and related software, including multiple flaws that are already showing up in active attacks. Microsoft also corrected a critical bug that has caused…

Member post originally published on the Taikun blog In the ever-evolving landscape of cloud-native technologies, managing deployments in Kubernetes clusters has become increasingly complex.

This blog outlines 7 key tips to optimize a new AWS account for small to medium businesses. It covers considerations like choosing a relevant root email, establishing secure account management, and configuring basic account settings to ensure cloud security, cost strategy, and a strong foundation for the future.

Take Your First Steps with Git

- thenewstack.io ci-cd - September 09, 2024

Using git might seem like a challenging proposal at first. The good news is that git isn't all that challenging to use, once you know the steps.

New RAMBO attack exploits radio signals from RAM to steal data from air-gapped networks, posing cybersecurity risks.

Last week, the latest AWS Heroes arrived! AWS Heroes are amazing technical experts who generously share their insights, best practices, and innovative solutions to help others. The AWS GenAI Lofts are in full swing with San Francisco and São Paulo open now, and London, Paris, and Seoul coming in the next couple of months. Here's […]

Chair: Matt Turner November 12, 2024 Salt Lake City, Utah EnvoyCon is a practitioner-driven event which emphasizes end-user case studies, and technical talks from the Envoy developers. We do not have…

Information Technology in Cybersecurity: Zero Trust Strategies | CSA

- cloudsecurityalliance.org - September 09, 2024

Key IT strategies for zero trust include implementing identity management, least privilege access, continuous monitoring, multi-factor authentication (MFA), and context-based access controls.

Blind Eagle APT group targets Colombian insurance sector with custom Quasar RAT, using phishing emails and Google Drive to spread malware.

Adding more cybersecurity tools may increase risks, introducing third-party vulnerabilities and system complexity.

How to Prevent and Combat Cyber Attacks | CSA

- cloudsecurityalliance.org - September 09, 2024

A robust cyberattack prevention strategy includes regular system backups, replication of critical components, and a comprehensive incident response plan to ensure quick recovery.

We are thrilled to announce that nominations for the DevOps Dozen 2024 are officially open! Now in its tenth year, the DevOps Dozen continues to spotlight

Learn how to prevent GenAI data leakage, balance innovation with security, and protect sensitive information.

Chinese hackers exploit Visual Studio Code in cyberattacks on Southeast Asian governments. New technique uses reverse shell for espionage and data the

Free SaaS Pulse by Wing Security offers continuous SaaS risk management with real-time insights and actionable threat detection.

How to Know if PCI Compliance is Required | CSA

- cloudsecurityalliance.org - September 09, 2024

PCI compliance is required for all organizations handling payment card data, ensuring secure transactions and protecting against breaches, regardless of storage practices.

Progress Software patches critical vulnerability in LoadMaster, preventing remote command execution

SpyAgent malware targets Android users, steals crypto wallet keys using OCR. Spreads via fake apps, evolves to use WebSockets. Expands from South Kore

Five Great DevOps Job Opportunities - DevOps.com

- devops.com - September 09, 2024

Our weekly report of five available DevOps job opportunities, including roles at Booz Allen Hamilton, Electronic Arts and Citi.

Chinese hackers target Taiwanese drone makers in 2024 espionage campaign. New threat actor TIDRONE deploys custom malware in sophisticated attacks.

Russian hackers from GRU's Unit 29155 linked to global cyberattacks on critical infrastructure, espionage, and sabotage since 2020.

SRE Weekly Issue #441 – SRE WEEKLY

- sreweekly.com - September 08, 2024

North Korean hackers target developers via LinkedIn job scams, spreading malware to infiltrate Web3 and crypto firms.

Two men indicted for running dark web marketplaces selling stolen data, facing up to 20 years in prison.

As applications scale, customers need more automated practices to maintain application availability and reduce the time and effort spent detecting, debugging, and resolving operational issues. Organizations allocate money and developer time to deploy and manage various monitoring tools, while also dedicating considerable effort to training teams on their usage. When issues arise, operators navigate through […]

Why RAG Is Essential for Next-Gen AI Development

- thenewstack.io ci-cd - September 06, 2024

By integrating external knowledge sources, RAG helps LLMs prevail over the limitations of a parametric memory and dramatically reduce hallucinations.

Critical SonicWall firewall flaw CVE-2024-40766 may be exploited. Patch now to secure your systems.

Many Amazon Web Services (AWS) customers look to extend their Multiprotocol Label Switching (MPLS) networks into the cloud. MPLS networks offer reliable and performance-optimized routes for data, making them a preferred choice for enterprise connectivity. AWS Direct Connect further enhances this by providing a dedicated network link from an organization's on-premises networks to AWS. This […]

GeoServer vulnerability exploited to deliver malware, botnets, and backdoors, affecting global IT, government, and telecom sectors.

Typosquatting in GitHub Actions is a rising security threat, risking software supply chain attacks.

Cloud Security Services Enabled with Best Practices | CSA

- cloudsecurityalliance.org - September 06, 2024

Cloud security services help protect cloud environments from security risks. The CSA STAR program provides a list of trusted and vetted service providers.

SUSE Combines StackState, Rancher for Kubernetes Observability

- thenewstack.io kubernetes - September 06, 2024

This new platform provides out-of-the-box observability to development teams for all Kubernetes clusters managed by Rancher.

AWS Backup is a comprehensive service that simplifies the process of centralizing and automating data protection across various AWS services, both in the cloud and on-premises, all managed seamlessly. Organizations have different requirements and want to track their backup, copy and restore activities across AWS cloud resources. Currently, in order to view status of resource […]

Customer applications running on Amazon Web Services (AWS) often require handling sensitive data such as personally identifiable information (PII) or protected health information (PHI). As a result, sensitive log data can be intentionally or unintentionally logged as part of an application's observability data. While comprehensive logging is important for application troubleshooting, monitoring and forensics, any […]

Member post by Abhijeet Kakade, Senior Marketing Expert at MSys Technologies Motorcycle riding is my passion, and as an avid motorcycle enthusiast, I really know the importance of regular inspection…

What is in Oklahoma's AI Bill of Rights? | CSA

- cloudsecurityalliance.org - September 06, 2024

Oklahoma's AI Bill of Rights ensures transparency, data protection, and fairness in AI interactions, setting a national precedent for ethical AI governance and user control.

Nhost Carves a Niche Between Managed Backend and Dev Platform

- thenewstack.io ci-cd - September 06, 2024

Offering backend as a service as well as the option to run custom code and third-party services, plus new AI tools.

What is DORA? Key Compliance Impacts and Strategies | CSA

- cloudsecurityalliance.org - September 06, 2024

DORA impacts financial services and tech firms with strict regulations. Ensure operational resilience with effective risk management and regulatory compliance strategies.

In today's data-driven landscape, the efficient transfer of large datasets to and from Amazon Simple Storage Service (Amazon S3) is a critical piece of an enterprise's cloud strategy. Common business use cases that need frequent transferring of large data sets include cloud-based data lakes that depend on receiving data from various sources. These sources often […]

Cynomi's 2024 vCISO report reveals a surge in demand for virtual CISO services, with MSPs driving growth.

WordPress LiteSpeed Cache plugin vulnerability could allow unauthenticated account takeover. Update now to fix the issue.

Apache OFBiz vulnerability CVE-2024-45195 patched, preventing unauthenticated remote code execution on Linux and Windows.

Telegram CEO Paul Durov defends platform after arrest, criticizes outdated laws, and promises security improvements.

Kubernetes is evolving, the CKA exam too!

- cncf.io - September 05, 2024

Kubernetes and the rest of the Cloud Native ecosystem are both evolving fast. The velocity report that is conducted by the CNCF each year is a great demonstration of those changes.

This blog post is written by Pranav Chachra, Principal Product Manager, AWS. In 2019, AWS introduced Zone Groups for AWS Local Zones. Today, we're announcing that we are working on extending the Zone Group construct to Availability Zones (AZs). Zone Groups were launched to help users of AWS Local Zones identify related groups of Local […]

In this blog post, learn how to build an Amazon QuickSight dashboard to visualize critical patch and inventory information to speed up MTTR. Also, you can use filters to search for a specific AWS Account, specific AWS Region, Amazon Elastic Compute Cloud (Amazon EC2) name, or check installed/missed packages. You want to visualize system patching […]

Veeam releases updates fixing 18 security flaws, including critical remote code execution vulnerabilities. Users urged to update software to prevent p

Tropic Trooper cyberattack targets Middle Eastern government entities with Crowdoor malware and China Chopper

Member post originally published on InfraCloud's blog by Shreyas Mocherla Accelerated by the pandemic, online tech communities have grown rapidly. With new members joining every day, it's tough to…

Mechanistic Interpretability | Decode Neural Networks | CSA

- cloudsecurityalliance.org - September 05, 2024

Learn how Mechanistic Interpretability and its focus on "features" and "circuits" might just be the key to decoding AI neural networks.

Amazon Web Service (AWS) Gateway Load Balancer (GWLB) is a managed AWS service that allows you to insert third-party firewall appliances into the data path. GWLB helps you deploy, scale, and manage third-party appliances, and it acts as a bump-in-the-wire device and passes traffic transparently to its targets. Customers often deploy third-party firewall appliances as […]

Identity Security Best Practices for SaaS Apps | CSA

- cloudsecurityalliance.org - September 05, 2024

Discover some of the identity security best practices that help organizations build SaaS apps that comply with SOC II, NIST, and other standards.

U.S. seizes 32 Russian propaganda domains influencing U.S. elections, targets Kremlin-backed disinformation efforts.

How Heroku Is Positioned To Help Ops Engineers in the GenAI Era

- thenewstack.io kubernetes - September 05, 2024

Code generation tools may help developers code faster, but they're not making operations easier, said Heroku's CEO in this episode of The New Stack Makers.

Amazon Q Developer Code Challenge | Amazon Web Services

- AWS devops blogs - September 05, 2024

Amazon Q Developer is a generative artificial intelligence (AI) powered conversational assistant that can help you understand, build, extend, and operate AWS applications. You can ask questions about AWS architecture, your AWS resources, best practices, documentation, support, and more. With Amazon Q Developer in your IDE, you can write a comment in natural language that […]

Generative AI is poised to revolutionize software engineering. Having diverse perspectives from across the many roles of the SDLC is crucial

The Why and the How of Managed CNAPP | CSA

- cloudsecurityalliance.org - September 05, 2024

Managed CNAPP produces quick results. Understand the importance of CNAPP in 2024, the compelling case for it, and the case against it.

Discover how NIST CSF 2.0 and CTEM align to improve proactive cybersecurity through continuous monitoring.

Hackers are using MacroPack, a red teaming tool, to deliver malware like Havoc and PhantomCore.

A Futurum research finds that over two-thirds (88%) of the applications deployed in enterprises are legacy assets.

New cross-platform malware KTLVdoor targets Chinese trading firm, using Alibaba servers. Earth Lusca linked to attack.

Cisco addresses two critical vulnerabilities in its Smart Licensing Utility, urging users to update immediately.

How to Create AWS EKS Cluster Using eksctl

- devopscube.com - September 05, 2024

In this Kubernetes tutorial, you will learn to create an AWS EKS cluster using eksctl. I will also

This post is written by Olajide Enigbokan, Senior Solutions Architect and Mohammed Atiq, Solutions Architect In this post you will learn how to evaluate the throughput for Amazon MQ, a managed message broker service for ActiveMQ, by using the ActiveMQ Classic Maven Performance test plugin. This post will provide recommendations for configuring Amazon MQ to […]

Amazon Web Services (AWS) is pleased to announce that four additional AWS Regions—Asia Pacific (Hong Kong), Asia Pacific (Osaka), Asia Pacific (Hyderabad), and Israel (Tel Aviv)—have been granted the Health Data Hosting (Hébergeur de Données de Santé, HDS) certification, increasing the scope to 24 global AWS Regions. The Agence du Numérique en Santé (ANS), the French […]

AWS CloudTrail Insights is a powerful feature within AWS CloudTrail that helps organizations identify and respond to unusual operational activity in their AWS accounts. This includes identifying spikes in resource provisioning, bursts of IAM actions, or gaps in periodic maintenance activity. CloudTrail Insights continuously analyzes CloudTrail management events from trails and event data stores, establishing […]

AWS Resilience Hub helps you to manage and improve the resilience posture of your applications on AWS. It enables you to define your resilience goals, assess your resilience posture against those goals, and implement recommendations for improvement based on the AWS Well-Architected Framework. This benefits individual teams that want to assess their applications. However, for […]

A mobile driver's license (mDL) is a digital representation of a physical driver's license that's stored on a mobile device. An mDL is a significant improvement over physical credentials, which can be lost, stolen, counterfeited, damaged, or contain outdated information, and can expose unconsented personally identifiable information (PII). Organizations are working together to use mDLs across […]

Generate photorealistic images with exceptional detail. Enhance visuals effortlessly across industries with improved multi-subject prompts, stunning image quality, and impeccable typography.

The AWS Heroes program recognizes outstanding individuals who are making meaningful contributions within the AWS community. These technical experts generously share their insights, best practices, and innovative solutions to help others create efficiencies and build faster on AWS. Heroes are thought leaders who have demonstrated a commitment to empowering the broader AWS community through their […]

North Korean hackers use fake FreeConference app to target developers with malware in job interviews.

Member post originally published on Fairwinds' blog by Stevie Caldwell It's hard to believe, but Kubernetes, our favorite container orchestration tool, turned ten this year! It feels like just…

Google releases Android security update to address actively exploited vulnerability CVE-2024-32896. Users urged to install the patch immediately.

Torrance, United States / California, 4th September 2024, CyberNewsWire

New supply chain attack hijacks 22,000 PyPI packages, infiltrating developer environments with malicious updates.

How to Bypass EDR Techniques with Reflective Security | CSA

- cloudsecurityalliance.org - September 04, 2024

Reflective loading is a powerful EDR evasion technique attackers use to avoid detection. Learn how it works, its impact, and how to mitigate the risks.

Platform Engineering Reshapes Software Dev at Bechtle

- thenewstack.io platform-engineering - September 04, 2024

German IT services and consulting vendor, Bechtle, has adopted platform engineering to better serve its internal developers and its customers around the world with better code and development tools.

Zyxel releases patches for critical vulnerabilities in routers, including OS command injection flaw CVE-2024-7261.

Cary, North Carolina, 4th September 2024, CyberNewsWire

The New Effective Way to Prevent Account Takeovers

- thehackernews.com - September 04, 2024

Discover how browser security can prevent account takeovers in SaaS environments, bypassing traditional security failures.

Key Strategies for Vulnerability Prioritization | CSA

- cloudsecurityalliance.org - September 04, 2024

Effective vulnerability prioritization is crucial to reducing business risk, improving security posture, and addressing the most critical threats in today's environment.

Clearview AI fined €30.5M by Dutch authorities for illegal facial data collection and GDPR violations.

Hackers are spoofing GlobalProtect VPN software using SEO poisoning to deliver WikiLoader malware in a new cyberattack.

How can organizations level up the value of their internal platforms without massively expanding their platform teams?

Don't Get Caught in the DevOps Loop - DevOps.com

- devops.com - September 04, 2024

DevOps is distributed development, whether it is distributed geographically, a continuous integration process that's running all the time.

Cloud native technologies empower organizations to build and run scalable applications in modern, dynamic environments. Among Cloud Native patterns, Containers, and Kubernetes are mainstream across multiple businesses. According to the Cloud Native Computing Foundation Annual Survey of 2022, 44% of respondents are already using containers for nearly all applications and business segments, and another 35% say containers are […]

Amazon Web Services (AWS) AI code assistant Amazon Q Developer named a Leader in Gartner's first Magic Quadrant for its Ability to Execute and Completeness of Vision, driving innovation across the software development lifecycle with enterprise-grade controls.

Whether you choose to operate entirely on AWS or in multicloud and hybrid environments, one of the primary reasons to adopt AWS is the broad choice of services we offer, enabling you to innovate, build, deploy, and monitor your workloads. Amazon S3 is a great option for Google Drive users seeking a comprehensive storage solution. […]

This post guides you through configuring AWS Network Load Balancer (NLB) idle timeouts for Transmission Control Protocol (TCP) flows. NLB is part of the Amazon Web Services (AWS) Elastic Load Balancing family, operating at Layer 4 of the Open Systems Interconnection (OSI) model. It manages client connections over TCP or User Datagram Protocol (UDP), distributing […]

Have you ever been investigating a problem and opened up a log file and thought "I have no idea what I am looking at. If only I could get a summary of the data." Observability and log data play an important role in maintaining operational excellence and ensuring the reliability of your applications and services. […]

What's Behind Elastic's Unexpected Return to Open Source?

- thenewstack.io cloud-native - September 03, 2024

As Elastic changes licensing for Elasticsearch and Kibana, its turnabout seems more like a business strategy than an embrace of the commons.

Learn about Turbot's cloud scripting engine Flowpipe along with practical examples for automating cloud operations on AWS.

Sextortion Scams Now Include Photos of Your Home

- krebsonsecurity.com - September 03, 2024

An old but persistent email scam known as "sextortion" has a new personalized touch: The missives, which claim that malware has captured webcam footage of recipients pleasuring themselves, now include a photo of the target's home in a bid to make…

Catchpoint IPM now available on Google Cloud Marketplace

- GCP networking blogs - September 03, 2024

Ensure seamless access to your applications with Catchpoint's IPM on Google Cloud. Monitor your internet stack and identify and resolve issues.

November 11-12, 2024 Salt Lake City, Utah View the schedule WasmCon is a two-day event focused on all things Web Assembly. This is the first time WasmCon is being held in conjunction with KubeCon +…

Member post originally published on Nirmata's blog by Boris Kurktchiev As organizations increasingly turn to Kubernetes to deploy and manage containerized applications, they face unique challenges in…

The Top Ten IT Outages in History | CSA

- cloudsecurityalliance.org - September 03, 2024

In the wake of the CrowdStrike outage, review the largest IT outages in history that were not caused by cyber attacks.

Hacktivist group Head Mare targets Russian and Belarusian organizations with advanced cyber attacks using custom malware and the latest WinRAR vulnera

Cicada3301 ransomware targets SMBs, shares code with BlackCat, exploits vulnerabilities in Windows, Linux, and ESXi systems.

Survey Reveals Cloud Account Takeover Threats & Concerns | CSA

- cloudsecurityalliance.org - September 03, 2024

Explore how security leaders are addressing account takeover threats with insights from a survey of 300 cybersecurity stakeholders on gaps, impacts, and protection strategies.

In this kubernetes tutorial, you will learn the etcd backup and restore on Kubernetes cluster with an etcd

Can You Have Bulletproof Security Without Network Lag? | CSA

- cloudsecurityalliance.org - September 03, 2024

By embracing advanced security platforms, businesses can achieve both robust security and seamless network performance.

New Android banking trojan "Rocinante" targets Brazilian users, stealing data via fake apps and phishing screens.

Secrets Exposed: Why Your CISO Should Worry About Slack

- thehackernews.com - September 03, 2024

Discover the hidden cybersecurity threats in Slack and Jira, and learn how to safeguard your company's sensitive secrets

Eight vulnerabilities in Microsoft macOS apps allow attackers to bypass permissions, gaining unauthorized access to sensitive data.

Missouri man charged with hacking and extortion after attempting to ransom former employer for $750,000 in bitcoin.

Singapore, Singapore, 4th September 2024, CyberNewsWire

Explore how sustainable IT and data innovation are driving DevOps at two key events: SustainableIT Impact Awards & Symposium and DevOps + Data Impact 2024. Join industry leaders to empower, educate, and celebrate sustainable tech practices. #SustainableIT #DevOps

Owners of 1-Time Passcode Theft Service Plead Guilty

- krebsonsecurity.com - September 02, 2024

Three men in the United Kingdom have pleaded guilty to operating otp[.]agency, a once popular online service that helped attackers intercept the one-time passcodes (OTPs) that many websites require as a second authentication factor in addition to passwords. Launched in…

With the arrival of September, AWS re:Invent 2024 is now 3 months away and I am very excited for the new upcoming services and announcements at the conference. I remember attending re:Invent 2019, just before the COVID-19 pandemic. It was the biggest in-person re:Invent with 60,000+ attendees and it was my second one. It was […]

The New 2GB Raspberry Pi 5: Another Option for Linux Sysadmins

- thenewstack.io edge-computing - September 02, 2024

For US$50, the 2GB Raspberry Pi platform is a great choice for many business cases and home projects, especially those not requiring a lot of memory.

One Company Rethinks Diff to Cut Code Review Times

- thenewstack.io ci-cd - September 02, 2024

Is there a "deeper lexicon" that could better condense the way commits are represented? Alloy.dev finds some basic changes can radically cut the number of lines that coders need to review.

RansomHub ransomware group targets 210 victims across critical sectors. US government warns of rising attacks on infrastructure using advanced tactics

Did Broadcom's VMware Hit Nutanix Where It Hurts?

- thenewstack.io cloud-native - September 02, 2024

To fend off competitors such as Nutanix, VMware must show that it has the vision and ability to deliver a tightly integrated portfolio of cloud native solutions.

Build Platform Engineering as a Product for Dev Adoption

- thenewstack.io platform-engineering - September 02, 2024

Adopting a platform engineering strategy is only the start of the process. Turning it into a valuable product that your developers will adopt and support is a critical part of the journey.

Discover how AI is transforming vulnerability management, helping security teams identify, prioritize, and remediate risks effectively.

FBI and CISA warn of AI-driven cyberattacks. New advisory highlights critical need for phishing-resistant MFA.

Five Great DevOps Job Opportunities - DevOps.com

- devops.com - September 02, 2024

The latest great DevOps job opportunities, including DevOps engineer roles at Spotify and Dimensional Analytics.

Fake npm packages mimicking 'noblox.js' target Roblox developers, deploying Quasar RAT and stealing sensitive data.

The CrowdStrike outage is a stark reminder of DevOps practices' critical role in deploying updates to maintain the security and reliability of applications and systems. While the underlying software defect was the immediate cause, the broader issue lies in the deployment process that allowed a severe flaw to impact a global customer base. Key Takeaway: To maintain trust and reliability in today's complex software, security, cloud and data center ecosystem, we must prioritize robust, measured deployment strategies.

SRE Weekly Issue #440 – SRE WEEKLY

- sreweekly.com - September 01, 2024

As part of designing their new paging product, incident.io created a set of end-to-end tests to exercise the system and alert on failures. Click through for details on how they designed the tests and lessons learned.

Safety first!

- surfingcomplexity.blog - August 31, 2024

I'm sure you've heard the slogan "safety first". It is a statement of values for an organization, but let's think about how to define what it should mean explicitly. H…

North Korean hackers exploited a Google Chrome zero-day flaw to deliver the FudModule rootkit, targeting cryptocurrency platforms.

Operations as code represents the next frontier in IT management, offering consistency, efficiency and reliability in operational tasks.

AWS Cloud Migration Strategy - DevOps.com

- devops.com - August 31, 2024

Migrating your project means moving your data from the on-premises data center to the cloud, and AWS facilitates migration in phases.

CTO to CTPO: Navigating the Dual Role in Tech Leadership

- thenewstack.io devops - August 30, 2024

Deciding to have one or two roles for product and technology depends on a company's specific needs, maturity, and strategic priorities.

In this blog post, I dive into a cross-Region replication (CRR) solution for card payment keys, with a specific focus on the powerful capabilities of AWS Payment Cryptography, showing how your card payment keys can be securely transported and stored. In today's digital landscape, where online transactions have become an integral part of our daily […]

GenOps: Learnings From Microservices and Traditional DevOps

- GCP devops/sre blogs - August 30, 2024

GenOps is a new operational platform for Generative AI. Learn the difference between AI agents and microservices and how to implement GenOps.

Introducing Compute Engine instant snapshots

- GCP compute blogs - August 30, 2024

Compute Engine instant snapshots provide near-instantaneous, high-frequency, point-in-time disk checkpoints that you can rapidly restore if needed.

Community post by Diego Cordero, Graduate in Telecommunications Engineering Hello everyone! I'm Diego Cordero from Lima, Peru, and I graduated with a degree in telecommunications engineering.

Cyberattackers leverage Google Sheets for command control in a global espionage campaign targeting 70+ organizations.

Securing SaaS Data: Strategies for 2024 | CSA

- cloudsecurityalliance.org - August 30, 2024

Securing SaaS data in 2024 requires an understanding of the shared responsibility model and the leveraging of advanced technologies.

Iranian hackers linked to GreenCharlie deploy sophisticated phishing campaigns targeting U.S. political campaigns.

What is the EU's NIS 2 Directive? Key Changes & Steps | CSA

- cloudsecurityalliance.org - August 30, 2024

The NIS 2 Directive introduces expanded cybersecurity requirements across the EU, emphasizing risk management and incident response. Learn key changes and steps for compliance.

Programmers say that adopting generative AI is a top priority for their companies and that such investments create openings for new products.

Cary, North Carolina, 30th August 2024, CyberNewsWire

New malware campaign targets Middle East by impersonating Palo Alto VPN, executing remote commands, and exfiltrating data.

Discover the hidden dangers of Active Directory Certificate Services vulnerabilities and how automated tools like vPenTest can protect your network.

North Korean hackers target developers with malicious npm packages, pose as IT workers, and deploy sophisticated malware to steal cryptocurrency and d

Atlassian Confluence vulnerability CVE-2023-22527 actively exploited for cryptocurrency mining. Urgent patching recommended to prevent attacks.

Sophisticated phishing attack targets Chinese-speaking users, deploying Cobalt Strike via DLL side-loading and advanced exploitation tools.

A comprehensive guide authored by Dean Parsons emphasizes the growing need for specialized ICS security measures in the face of rising cyber threats.

AWS has been named as a Challenger in the 2024 Gartner Magic Quadrant for Observability Platforms, previously known as Gartner Application Performance Monitoring (APM) and Observability Magic Quadrant. This report assesses vendors based on their Ability to Execute and Completeness of Vision. Compared to the previous year, AWS has moved up higher on the Ability […]

The State of Cloud Security in Financial Services | CSA

- cloudsecurityalliance.org - August 29, 2024

Key findings from CSA's Cloud Resiliency in Financial Services report. Learn about top operational resiliency frameworks and AI & financial services.

Reimagining Observability: The Case for a Disaggregated Stack

- thenewstack.io devops - August 29, 2024

Adopting a disaggregated stack for o11y in modern distributed architectures offers significant benefits in cost-effectiveness and reusability.

Russian hackers exploit patched Safari and Chrome flaws in attacks on Mongolian government websites, targeting mobile users.

Vietnamese human rights group targeted by APT32 hackers in multi-year campaign. Malware used to compromise systems and steal data.

Orca Security Launches First K8s Testing/Staging Environment

- thenewstack.io kubernetes - August 29, 2024

In the decade-plus-long existence of containers as key components in current IT systems, the dull but important task of testing has cried out for an efficient, automated tool.

Google Cloud Security's Peter Bailey explains why mWISE is one of the most valuable events of the year for CISOs and security professionals.

Kubernetes v1.31, Elli: an insider view!

- cncf.io - August 29, 2024

Community post originally published on Medium by Matteo Bianchi Kubernetes has had a community-driven release lifecycle since forever now and I took part of it as Comms Shadow for v1.31, here's how it…

Zero Trust & SASE: A Synergistic Approach to Security | CSA

- cloudsecurityalliance.org - August 29, 2024

Secure Access Service Edge (SASE) integrates network and security services into a unified, cloud-based framework. Understand how Zero Trust enhances SASE.

How Supabase Is Building Its Platform Engineering Strategy

- thenewstack.io platform-engineering - August 29, 2024

Supabase shares its platform engineering experiences and insights as it further refines and builds out its open source PostgreSQL database infrastructure application that competes with Google's Firebase.

AWS AI Services: Protecting Sensitive Permissions | CSA

- cloudsecurityalliance.org - August 29, 2024

A list of AWS AI services that have sensitive permissions. Use this list to install policies and procedures for safeguarding these permissions.

In this post, we examine how Druva, a SaaS vendor offering cloud data protection and management solutions, implemented AWS PrivateLink to secure data transfers between Druva's customers using Amazon Web Services (AWS) and Druva virtual private cloud (VPC). PrivateLink establishes private connectivity between VPCs, Amazon hosted services, and on-premises networks using VPC endpoints. This provides […]

U.S. agencies warn of Iranian hackers targeting key sectors with ransomware, exploiting security flaws to breach networks.

Why modern 'Phishing 2.0' attacks using AitM and BitM toolkits are a big problem for security teams, and what you can do to stop them.

Discover how hackers exploit a critical vulnerability in AVTECH IP cameras to spread a Mirai botnet variant, posing risks to various sectors.

14 Steps to Secure Your Salesforce Environment | CSA

- cloudsecurityalliance.org - August 29, 2024

Ensure your Salesforce environment is secure by following these 14 essential steps to manage access, protect data, and mitigate risks across your organization.

Telegram CEO Pavel Durov arrested and charged in France for allegedly enabling criminal activities on the platform. Learn about the investigation and

You can specify even when you can't implement

- surfingcomplexity.blog - August 29, 2024

The other day, The Future of TLA+ (pdf) hit Hacker News. TLA+ is a specification language: it is intended for describing the desired behavior of a system. Because it's a specification languag…

Kubernetes has become the de-facto standard for container orchestration, providing powerful capabilities for deploying and managing stateless workloads. However, users running stateful applications on Kubernetes face unique challenges, especially in VMware environments. A key issue is that the virtual disks used by stateful apps can't be attached to pods as easily as ephemeral storage. The […]

Organizations want to securely store and access their data, while adhering to security best practices by deploying and enforcing various policies. This includes using antivirus programs to scan and disinfect data at rest and on-access to help align with various compliance standards. Since the release of Amazon FSx for NetApp ONTAP, many customers are migrating […]

With AWS Parallel Computing Service, run HPC workloads at virtually any scale effortlessly; leverage Slurm and managed clusters to accelerate simulations.

Blog is guest authored by Nasia Ullas of MSD. Enhancing the resilience and productivity of manufacturing processes is essential for pharmaceutical companies to meet business continuity objectives and innovate continuously. Merck & Co., Inc., also known as MSD outside of the United States and Canada, a global bio-pharmaceutical company, mitigated resilience challenges by adopting AWS […]

Fortra has patched a critical security flaw in FileCatalyst Workflow, preventing remote admin access via a static password.

Learn how Google Cloud Media CDN origin offload helps Warner Bros. Discovery achieves high cache hit rates, delivering seamless video experiences.

This post is written by Anton Aleksandrov, Principal Solutions Architect, AWS Serverless Efficient message processing is crucial when handling large data volumes. By employing batching, distribution, and parallelization techniques, you can optimize the utilization of resources allocated to your AWS Lambda function. This post will demonstrate how to implement parallel data processing within the Lambda function handler, maximizing […]

Member post originally published on Bouyant's blog by Scott Rigby In the world of Kubernetes, network policies are essential for controlling traffic within your cluster. But what are they really?

Identity and Access Management in Cloud Security | CSA

- cloudsecurityalliance.org - August 28, 2024

Identity and access management (IAM) ensures that only authorized identities have access to resources. IAM is the new perimeter in cloud security.

eBPF Security Power and Shortfalls

- thenewstack.io kubernetes - August 28, 2024

A proper security provider that makes heavy use of eBPF will also build on eBPF's functionalities to offer a comprehensive platform.

In Jenkins's declarative pipeline, you can add parameters as part of Jenkinsfile. There are many supported parameters types

LitmusChaos audit complete!

- cncf.io - August 28, 2024

Cross-posted from the OSTIF blog OSTIF is proud to share the results of our security audit of LitmusChaos. LitmusChaos is an open source chaos engineering platform for a multitude of cloud platforms.

South Korean hackers exploit WPS Office flaw to deploy SpyGlace backdoor. APT-C-60 group targets Chinese users with sophisticated cyber espionage camp

Why You Should Embrace a Zero Trust Architecture | CSA

- cloudsecurityalliance.org - August 28, 2024

Discover how Zero Trust Architecture (ZTA) revolutionizes cybersecurity with its principles of continuous verification, least privilege, and context-aware access, ensuring robust protection in a dynamic threat landscape.

Golang Pub/Sub: Why It's Better When Combined With GoFr

- thenewstack.io edge-computing - August 28, 2024

To take full advantage of Golang's capabilities in a pub/sub setup, the framework GoFr can help simplify the process and introduce powerful features.

Broadcom today added an on-premises edition of its Rally project management application for managing software engineering projects.

How to De-Risk Patching Third Party Software Packages | CSA

- cloudsecurityalliance.org - August 28, 2024

Review some helpful tricks to de-risk npm package patches, using Node and Yarn. These principles apply to other frameworks as well.

BlackByte ransomware group exploits VMware vulnerability, uses vulnerable drivers in attacks. Cisco Talos reveals new tactics and techniques.

Cybersecurity alert: New QR code phishing campaign abuses Microsoft Sway, posing risks to tech, finance, and manufacturing sectors.

CISA adds critical Apache OFBiz flaw to its exploited list, urging immediate updates to prevent attacks.

Urgent security update for WPML WordPress plugin: Critical flaw allows remote code execution.

When Get-Out-The-Vote Efforts Look Like Phishing

- krebsonsecurity.com - August 28, 2024

Multiple media reports this week warned Americans to be on guard against a new phishing scam that arrives in a text message informing recipients they are not yet registered to vote. A bit of digging reveals the missives were sent…

Securing Machine Credentials: Protecting Access Keys | CSA

- cloudsecurityalliance.org - August 27, 2024

Learn why securing machine credentials like API keys and service accounts is vital for protecting your organization from potential security breaches and attacks.

Community post originally published on Medium by Maryam Tavakkoli Kubernetes has become the de facto standard for container orchestration in the cloud-native ecosystem, powering some of the most…

Announcing 500 Kubestronauts

- cncf.io - August 27, 2024

CNCF is pleased to announce that since launching the Kubestronauts program at KubeCon 2024 in Paris, over 500 Kubestronauts have joined the program. Each of these 500+ have active certifications in…

Clouds, Codes, and Navigating Top CIO Challenges

- thenewstack.io devops - August 27, 2024

With the growth of the Cloud and the emergence of AI, technology is more important than ever for business results. What are the most critical issues CIOs should focus on?

In this blog, you will learn about setting up Jenkins Email notification. Email notification for Jenkins build status

AWS Systems Manager Quick Setup simplifies setting up AWS services, including Systems Manager, by automating common or recommended tasks in your AWS Organization across AWS accounts and Regions. These tasks include, creating required AWS Identity and Access Management (IAM) instance profile roles and setting up operational best practices, such as periodic patch scans and inventory […]

Discover how the HZ RAT backdoor is now targeting MacOS users of Chinese messaging apps, posing a new cybersecurity threat to Apple devices.

Kubestronaut in Orbit: Fangel Colón

- cncf.io - August 27, 2024

This week's Kubestronaut in Orbit, Fangel Emilio Colón Navarro, lives in the Dominican Republic and is an SRE at Banco BHD. He's been working with CNCF technologies since 2020. If you'd like to be a…

Member post originally published on OVH Cloud's blog by Aurélie Vache Container orchestration has become a cornerstone of modern application deployment, offering scalability, flexibility…

Project post by Jimmy Song, Erica Hughberg, Alyssa Wilk, Guy Daich We are thrilled to announce the new releases of the Envoy project, Envoy Proxy 1.31.0 and the Envoy Gateway 1.1.0…

New 0-Day Attacks Linked to China's 'Volt Typhoon'

- krebsonsecurity.com - August 27, 2024

Malicious hackers are exploiting a zero-day vulnerability in Versa Director, a software product used by many Internet and IT service providers. Researchers believe the activity is linked to Volt Typhoon, a Chinese cyber espionage group focused on infiltrating critical U.S.…

How Platform Engineering Enables the 10,000-Dev Workforce

- thenewstack.io platform-engineering - August 27, 2024

Manual toil, tool sprawl and slow DevOps processes accelerate burnout when developers work at a multinational scale. Creating a "golden path" can speed things up and make everyone happier.

Datacamp Free Unlimited Access (Free Week)

- devopscube.com - August 27, 2024

Datacamp is a popular online learning portal for Data Science. With Datacamp free access, you will get access

Chinese hackers exploit zero-day flaw in Versa Director, targeting US firms with sophisticated web shell for credential harvesting and potential suppl

Cloud-based testing platform company LambdaTest has launched KaneAI, an end-to-end software AI test agent.

Gartner's 2024 report introduces new CTEM categories, spotlighting Pentera and emphasizing proactive cybersecurity.

VMware Private Cloud Now Has a Catalog of Advanced Services

- thenewstack.io networking - August 27, 2024

Broadcom is positioning its Virtual Cloud Platform as more cost-effective to run compared to the cloud and legacy systems.

Broadcom Debuts VMware Tanzu Platform 10 at Explore 2024

- thenewstack.io platform-engineering - August 27, 2024

Broadcom has expanded VMware Tanzu to be a developer-centric platform for quickly building apps to run on a Kubernetes or Cloud Foundry environment.

Action and Intention - DevOps.com

- devops.com - August 27, 2024

Every day is a new day until it's not.

Broadcom today updated its VCF platform to provide deeper levels of integration, multitenancy capabilities and a single console.

Ensure Compliance Transitioning to PCI 4.0.1 | CSA

- cloudsecurityalliance.org - August 27, 2024

Prepare for the retirement of PCI 4.0 by December 2024. Learn how to transition to PCI 4.0.1, maintain compliance, and ensure robust payment card data security.

Discover how a patched Microsoft 365 Copilot vulnerability could have led to data theft using ASCII smuggling and prompt injection techniques.

Google patches CVE-2024-7965, an actively exploited Chrome vulnerability, urging users to update for security.

In Terraform we use loop to create an array of resources, using count or for_each. Both count and for_each have their respective use cases.

As VMware customers navigate the imperative to modernize their virtual environments, the need for reliable and cost-effective data protection has become paramount. Traditionally, evaluating data protection solutions has involved intricate calculations around software licensing, storage costs, and operational expenses. AWS Backup offers VMware customers a simpler, more transparent path forward. By eliminating upfront software fees […]

Amazon Web Services (AWS) successfully completed an onboarding audit with no findings for ISO 9001:2015, 27001:2022, 27017:2015, 27018:2019, 27701:2019, 20000-1:2018, and 22301:2019, and Cloud Security Alliance (CSA) STAR Cloud Controls Matrix (CCM) v4.0. Ernst and Young CertifyPoint auditors conducted the audit and reissued the certificates on July 22, 2024. The objective of the audit was […]

Disaster recovery (DR) is an important part of resilience and defines the process of preparing and recovering from a disaster. A disaster can be defined as any event that causes a serious negative impact to your business. How you respond to these unforeseen events has traditionally been a tradeoff between the cost of the solution, […]

We continue to expand the scope of our assurance programs at Amazon Web Services (AWS) and are pleased to announce that the Summer 2024 System and Organization Controls (SOC) 1 report is now available. The report covers 177 services over the 12-month period of July 1, 2023–June 30, 2024, so that customers have a full year of […]

The AWS User Group Japan (JAWS-UG) hosted JAWS PANKRATION 2024 themed 'No Border'. This is a 24-hour online event where AWS Heroes, AWS Community Builders, AWS User Group leaders, and others from around the world discuss topics ranging from cultural discussions to technical talks. One of the speakers at this event, Kevin Tuei, an AWS […]

Announcing Terraform Google Provider 6.0.0

- GCP devops/sre blogs - August 26, 2024

Explore key changes in Terraform Google Provider 6.0.0, including opt-out default labels, deletion protection for resources, and longer name prefixes. Optimize your Google Cloud infrastructure management with Terraform.

Member post originally published on Second State's blog Prof. Andrew Ng's agentic translation is a great demonstration on how to coordinate multiple LLM "agents" to work on a single task.

SonicWall releases critical security updates to fix a vulnerability impacting its firewalls (CVE-2024-40766, CVSS score: 9.3).

Uber fined €290 million by Dutch regulator for improper transfer of European driver data to US, violating EU data protection standards.

5 Tips to Help Prepare for a SOC 2 Audit | CSA

- cloudsecurityalliance.org - August 26, 2024

How can you best prepare for the SOC 2 process? An auditor discusses SOC 2 best practices.

Application owners often rely on content management systems (CMS) to publish and manage content on their websites. WordPress is the world's most popular content management system. Originally launched as a blogging platform back in 2003, WordPress now powers 43% of all websites and controls a massive 64.3% of the known CMS market. The purpose of this […]

Researchers Identify Over 20 Supply Chain Vulnerabilities in MLOps Platforms | Read more hacking news on The Hacker News cybersecurity news website and learn how to protect against cyberattacks and software vulnerabilities.

Discover SalaX Secure Collaboration 2024, a government-approved platform ensuring safe, encrypted communication and robust record-keeping for business

How to Secure Industrial Control Systems | CSA

- cloudsecurityalliance.org - August 26, 2024

Explore the vulnerabilities of U.S. and U.K. industrial control systems (ICS) exposed on the Internet, highlighting recent cyberattacks and the need for enhanced security measures.

This week's weekly report of great DevOps job opportunities includes senior DevOps engineer roles at ADT and Fortinet.

Traccar GPS tracking system exposed to critical vulnerabilities CVE-2024-31214 & CVE-2024-24809, enabling remote code execution.

Discover how NGate, a new Android malware, steals contactless payment data using NFC relay attacks. Learn about the latest cybersecurity threat target

Remocal Development: The Future of Efficient Kubernetes Workflows

- thenewstack.io kubernetes - August 25, 2024

Discover how combining local and remote environments in a remocal setup can streamline development processes enhance productivity, and reduce costs.

What Is OpenTelemetry? The Ultimate Guide

- thenewstack.io observability - August 25, 2024

OpenTelemetry is not merely an observability platform, but also a set of best practices and standards that can be integrated into platform engineering or DevOps.

Discover 'sedexp', a stealthy Linux malware using udev rules for persistence, hiding credit card skimmers, and evading detection since 2022.

Telegram CEO Pavel Durov arrested in France over content moderation issues. Platform faces scrutiny for alleged facilitation of cybercrime and illegal

SRE Weekly Issue #439 – SRE WEEKLY

- sreweekly.com - August 25, 2024

The Hidden Costs of Chasing Five 9s

- thenewstack.io devops - August 24, 2024

In most cases, aiming for a lower availability target might be worthwhile to attain a better balance, offering sustainable operations and a healthier work culture.

Need To Know Git? Start Here

- thenewstack.io ci-cd - August 24, 2024

Git isn't exactly the easiest tool to use, but once you understand how it functions, it becomes second nature. Start here.

Devs: Don't Just Read About Design Patterns, Implement Them

- thenewstack.io devops - August 24, 2024

Design patterns help document software as an engineering discipline, but implementing examples is still the best way to solve new problems.

Meta exposes Iranian state-sponsored cyber campaign targeting political figures via WhatsApp. US accuses Iran of election interference attempts.

CISA warns of active exploitation of Versa Director vulnerability CVE-2024-39717. Agencies urged to patch by September 2024.

GitLab made generally available a set of GenAI capabilities that DevOps teams can add on to the CI/CD platform it provides.

Amazon CodeCatalyst is a unified software development service for development teams to quickly build, deliver and scale applications on AWS while adhering to organization-specific best practices. Developers can automate development tasks and innovate faster with generative AI capabilities, and spend less time setting up project tools, managing CI/CD pipelines, provisioning and configuring various development environments […]

A global survey of 65,437 developers conducted by Stack Overflow finds 62% are already using artificial intelligence (AI) tools.

Data is a valuable asset for an organization and users are always looking for simple tools to protect their data from unauthorized access. While some use cases do require data to be publicly accessible at times, most enterprise use cases and data privacy depend on strictly managed permissions and no public access. Enterprises use Amazon […]

Use Small Language Models To Deploy AI on a Budget

- thenewstack.io devops - August 23, 2024

SLMs are a much more cost-effective approach, allowing companies to adapt models to their proprietary data in secure environments.

Building an IDP With Help From the Open Source CNOE Framework

- thenewstack.io platform-engineering - August 23, 2024

The New York Times has more than 1,000 developers — who used a chaotic mix of tools and deployment environments. Here's how it's adopting platform engineering.

Selecting GPUs for LLM serving on GKE

- GCP compute blogs - August 23, 2024

Best practices and recommendations to help you maximize your serving throughput on NVIDIA GPUs on GKE for LLM serving workloads.

Community post originally published on The New Stack by Lin Sun, Head of Open Source at Solo.io Ambient mode is the new sidecar-less data plane introduced in Istio in 2022. When ambient mode reached…

New PEAKLIGHT PowerShell dropper, uncovered by Mandiant, deploys malware via fake movie downloads on Windows.

Local Networks Go Global When Domain Names Collide

- krebsonsecurity.com - August 23, 2024

The proliferation of new top-level domains (TLDs) has exacerbated a well-known security weakness: Many organizations set up their internal Microsoft authentication systems years ago using domain names in TLDs that didn't exist at the time. Meaning, they are continuously sending…

What is Offensive Security & Why is it So Challenging? | CSA

- cloudsecurityalliance.org - August 23, 2024

Offensive security involves simulating an attacker's behavior to identify system vulnerabilities. Learn about offensive security methods and challenges.

A survey of DevOps pros building and deploying apps on top of the Salesforce SaaS platform finds 53% work for orgs that have embraced CI/CD platforms.

End user blog by Jochen Rau and Tyler Schoppe, Platform Engineering team at MachineMetrics Operating in the manufacturing sector has never been more costly. Exacerbated by high inflation…

The New York Times GitHub Breach | CSA

- cloudsecurityalliance.org - August 23, 2024

Learn about The New York Times GitHub breach, its impact on data security, and how to safeguard your systems through effective token management and breach detection.

HPC Security: Zero Trust and Network Segmentation | CSA

- cloudsecurityalliance.org - August 23, 2024

Learn how to protect sensitive data in High-Performance Computing (HPC) environments using advanced security strategies like Zero Trust and network segmentation.

Join Cynet's webinar to explore an all-in-one cybersecurity platform that offers real-time threat detection, environment-wide visibility, and automate

According to the Well-Architected DevOps Guidance, "A peer review process for code changes is a strategy for ensuring code quality and shared responsibility. To support separation of duties in a DevOps environment, every change should be reviewed and approved by at least one other person before merging." Development teams often implement the peer review process […]

Introduction In the rapidly evolving landscape of Generative AI, the ability to deploy and iterate on features quickly and reliably is paramount. We, the Amazon Q Developer service team, relied on several offline and online testing methods, such as evaluating models on datasets, to gauge improvements. Once positive results are observed, features were rolled out […]

Overview In this blog post, I'll explain how to use a Microsoft Entra ID and Visual Studio Code editor to access Amazon Q developer service and speed up your development. Additionally, I'll explain how to minimize the time spent on repetitive tasks and quickly integrate users from external identity sources so they can immediately use […]

Learn how exposure management helps prioritize cybersecurity efforts, minimize risks, and protect critical assets from evolving threats.

Qilin ransomware attackers now steal Chrome credentials, marking a dangerous new trend in cybercrime. Learn about this evolving threat and its implica

Discover Cthulhu Stealer, a new macOS malware targeting user data. Learn about its capabilities, distribution, and Apple's response to emerging threat

Latvian national charged in US for cybercrime involvement. Deniss Zolotarjovs linked to Karakurt group, facing charges for data theft and extortion.

AWS partners often have a requirement to create resources, such as cross-account roles, in their customers' accounts. A good choice for consistently provisioning these resources is AWS CloudFormation, an Infrastructure as Code (IaC) service that allows you to specify your architecture in a template file written in JSON or YAML. CloudFormation also makes it easy […]

Onehouse Automates Vector Embedding for Its Data Lakehouse

- thenewstack.io storage - August 22, 2024

The solution's vector embeddings generator relies on Change Data Capture to move data and vectors from sources to targets.

The Developer Crisis: Mental Health, Burnout, and Retention

- thenewstack.io devops - August 22, 2024

Employers and employees will lose out if developers aren't given the right environment, tools, and sufficient time.

Learn how to get real-time notifications from AWS Security Hub and query for solutions in Slack, Microsoft Teams, or Amazon Chime using AWS Chatbot integrated with Amazon Q.

Cary, North Carolina, 22nd August 2024, CyberNewsWire

SolarWinds issues an urgent patch for a critical Web Help Desk vulnerability. Update now to protect against unauthorized remote access.

Cybersecurity researchers uncover hardware backdoor in MIFARE Classic cards, posing risks to hotel and office security systems worldwide.

Chinese hackers exploit Cisco switch vulnerability to gain system control and evade detection. Cybersecurity firm uncovers sophisticated espionage cam

Using dual-region buckets in Google Cloud Storage

- GCP security blogs - August 22, 2024

Organizations can mitigate risks and improve regulatory compliance, data availability, and performance by using dual-region buckets in Cloud Storage.

Discover how the 'ALBeast' vulnerability in AWS Application Load Balancer could compromise 15,000 apps and learn about Amazon's security updates.

Fully Homomorphic Encryption vs Confidential Computing | CSA

- cloudsecurityalliance.org - August 22, 2024

Fully Homomorphic Encryption (FHE) & Confidential Computing both protect sensitive information. Explore their differences & impacts on data security.

PAM and Cloud: The Case for Zero Standing Privileges | CSA

- cloudsecurityalliance.org - August 22, 2024

To apply Zero Trust, a zero standing privilege (ZSP) system is needed. ZSP deletes all entitlements associated with a user when not in use.

AWS Resilience Hub is a central location in the AWS Management Console for you to manage and improve the resilience posture of your applications on AWS. AWS Resilience Hub enables you to define your resilience goals, assess your resilience posture against those goals, and implement recommendations for improvement based on the AWS Well-Architected Framework. AWS […]

How Vendia Helps Delta Sync Data With Its Airline Partners

- thenewstack.io devops - August 22, 2024

Vendia positions itself as the key to integrating and syncing data across tools, accounts, regions and clouds with an auditable trail of data not shared.

Colorado's AI Act: A New Era in AI Regulation | CSA

- cloudsecurityalliance.org - August 22, 2024

Colorado's groundbreaking AI Act sets a new standard for responsible AI governance, balancing innovation with consumer protection through affirmative defense and ethical AI development.

Discover why Continuous Attack Surface Penetration Testing (CASPT) is essential for dynamic enterprise security.

Google patches high-severity Chrome bug CVE-2024-7971, actively exploited in the wild. Users urged to update immediately.

Critical LiteSpeed Cache plugin vulnerability allows attackers admin access to WordPress sites. Update to version 6.4 now to secure your website.

New PG_MEM malware exploits weak PostgreSQL passwords to mine cryptocurrency, targeting vulnerable databases with brute-force attacks.

GitHub patches critical Enterprise Server vulnerabilities, including SAML SSO exploit. Update now to prevent unauthorized admin access and data breach

Docker Joins Movement To Dump Passwords for Security

- thenewstack.io containers - August 21, 2024

As of Sept. 16, 2024, Docker will enforce Single Sign-On (SSO) for CLI access, discontinuing the use of passwords in favor of Personal Access Tokens (PATs) when SSO is enforced.

ChatOps is a collaborative approach to operations that integrates chat platforms with automation tools and processes. It's a way to bring together people, tools, and processes in a single chat interface to facilitate communication, collaboration, and execution of tasks within a team or organization. It is critical for an Operations team to act quickly and […]

Many organizations need to store and process data that belong to multiple entities, commonly referred to as multi-tenancy. In these situations, it is important to secure every tenant's data and ensure that a consumer can only access the data that they require for their responsibilities and nothing more. In particular, if a user or application […]

Jenkins Multibranch Pipeline Tutorial For Beginners

- devopscube.com - August 21, 2024

If you are looking for a well-automated Pull Request based or branch-based Jenkins Continuous Integration & Delivery (CI/CD)

Critical vulnerability in Microsoft Copilot Studio exposed sensitive data; now patched. MFA soon required for all Azure accounts.

Discover MoonPeak, a new remote access trojan linked to North Korean hackers. Learn about its features, targets, and evolving infrastructure in this c

Delayed destruction is an important step in adding deletion prevention capabilities to Secret Manager. Here's how it works.

On November 1, 2023, the New York State Department of Financial Services (NYDFS) issued its Second Amendment (the Amendment) to its Cybersecurity Requirements for Financial Services Companies adopted in 2017, published within Section 500 of 23 NYCRR 500 (the Cybersecurity Requirements; the Cybersecurity Requirements as amended by the Amendment, the Amended Cybersecurity Requirements). In the introduction […]

Community post by Xie Ziyi, Kubernetes Upstream Training Japan Organizer, Cloud Native Community Japan Organizer, and Software Engineer, NEC Solution Innovators, Ltd.

What to Know About Continuous Controls Monitoring | CSA

- cloudsecurityalliance.org - August 21, 2024

Continuous controls monitoring (CCM) is a crucial aspect of making GRC processes more accurate and actionable. Understand the main benefits and use cases.

Build vs. Buy: Make the Right ASPM Decision | CSA

- cloudsecurityalliance.org - August 21, 2024

Explore the build vs. buy decision for ASPM solutions, considering the challenges of data management, automation, and long-term maintenance to optimize cloud security.

With a mean resolution time of 175 minutes, each customer-impacting digital incident costs both time and money.

Apica adds the ability to centralize the management of telemetry data collected from multiple types of agents to its observability platform.

It's Time To Untangle the SaaS Ball of Yarn

- thehackernews.com - August 21, 2024

Discover how rising SaaS adoption is increasing cyber threats. Learn steps to secure your SaaS environment effectively

New macOS malware TodoSwift, linked to North Korean hacking groups, targets crypto-industry with advanced tactics.

Styx Stealer developer's OPSEC failure leaks sensitive client data, revealing details of the malware's operation.

AI in Data Governance: Expert Insights | CSA

- cloudsecurityalliance.org - August 21, 2024

Explore insights from Zscaler's Women in Technology and Security CXO event on how AI is enhancing data governance and security, with a focus on collaboration and ethical considerations.

For many businesses, traditional approaches to managing telemetry data no longer suffice. They are too slow, costly and challenging to scale.

CERT-UA warns of new phishing attacks by Vermin hackers, using POW images to spread SPECTR and FIRMACHAGENT malware targeting Ukrainian devices.

Critical vulnerability in WordPress GiveWP plugin threatens 100,000+ websites. Urgent update required to protect against remote code execution attacks

The new AWS Asia Pacific (Malaysia) Region bolsters cloud innovation, empowering local businesses and government initiatives while aligning with Malaysia's sustainability goals through Amazon's renewable energy commitment.

Discover how AMD's ZT Systems buyout could transform data centers. Sustainability expert Bonnie Schneider reveals 5 key benefits, from energy-efficient servers to eco-friendly cooling tech. Learn about the potential impact on the future of green computing.

Discover how cybercriminals are using Progressive Web Apps to steal banking credentials in a sophisticated phishing campaign targeting mobile users.

Detecting AWS Account Compromise: Key Indicators in CloudTrail Logs for Stolen API Keys

A critical security flaw in the Jenkins automation server is on the CISA list of known vulnerabilities after being exploited in ransomware,

Chatting With Data: LLMs Are Transforming AIOps

- thenewstack.io observability - August 20, 2024

Leverage large language models to streamline database queries and unlock actionable insights from your observability data.

Elevate your security with a convergence of security capabilities, AI, and frontline threat intelligence, to enable the next level of proactive defense.

This post is written by James Ngai, Senior Product Manager, AWS Lambda, and Aneel Murari, Senior Specialist SA, Serverless. Today, AWS Lambda is announcing new recursive loop detection APIs that allow you to set recursive loop detection configuration on individual Lambda functions. This allows you to turn off recursive loop detection on functions that intentionally use […]

Cary, North Carolina, 20th August 2024, CyberNewsWire

Misconfiguration: Taming Change Control | CSA

- cloudsecurityalliance.org - August 20, 2024

Explore the top threat to cloud security-misconfiguration and inadequate change control-and learn strategies to mitigate its business impact, including automated monitoring and real-time change management.

How to Run WebAssembly on Amazon EKS | Amazon Web Services

- AWS containers blogs - August 20, 2024

WebAssembly (Wasm) is a revolutionary technology that promises to bring near-native performance to web applications. However, its potential extends far beyond the browser, enabling developers to run Wasm workloads in various environments, such as cloud-native platforms like Amazon Elastic Kubernetes Service (Amazon EKS). In this post, you can explore how AWS empowers users to harness […]

Can Grafana Adaptive Metrics Help Slash Observability Costs?

- thenewstack.io kubernetes - August 20, 2024

The recommendations published by Adaptive Metrics enable organizations to automate the process of assessing what metrics are needed and where.

How to Create GitHub App For Jenkins Status Checks

- devopscube.com - August 20, 2024

When you use Jenkins multi-branch pipelines, you can integrate status checks with GitHub Pull Requests. Here is an

Get the Most from Your Cloud Security Assessment | CSA

- cloudsecurityalliance.org - August 20, 2024

Learn what to look for when searching for a cloud security assessment vendor and how to evaluate possible candidates.

Msupedge, a new backdoor exploiting a PHP flaw, targets a Taiwanese university using DNS tunneling for communication.

Mitigating regreSSHion Vulnerability in OpenSSH | CSA

- cloudsecurityalliance.org - August 20, 2024

Explore the regreSSHion vulnerability in OpenSSH, its potential impact, and best practices for securing your SSH environment against this critical RCE threat.

CodeOps and GenAI are aligned: CodeOps treats code produced using GenAI as yet another source of code and focuses on solving security issues.

Discover the critical security flaw in Azure Kubernetes Services, its potential impact, and Microsoft's response to protect cluster credentials.

Anatomy of an Attack

- thehackernews.com - August 20, 2024

A detailed look at an application attack and how Application Detection and Response (ADR) stops it

Iranian state-sponsored TA453 hackers target a prominent Jewish figure with new AnvilEcho malware via sophisticated phishing.

GitHub's Copilot Autofix tool is an AI-driven software service targeted at developers who need to address software vulnerabilities in code.

How do you keep the rigor of specialists when things are being run by generalists? The answer is a platform.

A chilling trend is emerging: Ransomware-as-a-service (RaaS) attacks targeting CI/CD pipelines, holding valuable code hostage.

Automation not only improves the efficiency of DevOps but also helps in carrying out tedious tasks meticulously and easily.

Discover how thousands of Oracle NetSuite e-commerce sites are leaking sensitive customer data due to misconfiguration. Learn about mitigation strateg

Blind Eagle targets Latin American nations with spear-phishing attacks, delivering Remote Access Trojans for espionage and financial theft.

CISA adds critical Jenkins flaw to KEV catalog amid ransomware attacks. Vulnerability allows code execution. US agencies given September deadline to p

Organizations are required to adhere to industry-specific regulations and certification programs, and a key component of this compliance is the creation of a comprehensive user privilege and access report for cloud infrastructure. Auditors rely on these reports to verify that permissions are tightly controlled at a granular level. However, the complexity of access control mechanisms, […]

Discover how AMD's ZT Systems buyout could transform data centers. Sustainability expert Bonnie Schneider reveals 5 key benefits, from energy-efficient servers to eco-friendly cooling tech. Learn about the potential impact on the future of green computing.

AWS CodeBuild now supports macOS, simplifying CI/CD pipelines for Apple apps, using managed M2 machines with pre-installed tools like Xcode. Auto scale capacity seamlessly while CodeBuild manages the fleet.

Chainguard Launches CPU/GPU Containers for AI Frameworks

- thenewstack.io containers - August 19, 2024

To address security concerns, Chainguard offers a growing suite of CPU and GPU-enabled container images tailored for AI. These images include PyTorch, Conda and Kafka.

Istio 1.23 Drops the Sidecars for a Simpler 'Ambient Mesh'

- thenewstack.io service-mesh - August 19, 2024

This new edition of the Istio service mesh can be run without sidecars, simplifying deployments and, in some cases, even reducing latency.

You know what I find more exciting than the Amazon Prime Day sale? Finding out how Amazon Web Services (AWS) makes it all happen. Every year, I wait eagerly for Jeff Barr's annual post to read the chart-topping metrics. The scale never ceases to amaze me. This year, Channy Yun and Jeff Barr bring us […]

Explore how Fortio integrates with Istio for efficient performance testing and monitoring in a microservices architecture using the Bookinfo app and popular DevOps tools like Kubernetes, Prometheus, and Grafana.

Amazon Web Services (AWS) customers operating in a regulated industry, such as the financial services industry (FSI) or healthcare, are required to meet their regulatory and compliance obligations, such as the Payment Card Industry Data Security Standard (PCI DSS) or Health Insurance Portability and Accountability Act (HIPPA). AWS offers regulated customers tools, guidance and third-party audit reports […]

National Public Data Published Its Own Passwords

- krebsonsecurity.com - August 19, 2024

New details are emerging about a breach at National Public Data (NPD), a consumer data broker that recently spilled hundreds of millions of Americans' Social Security Numbers, addresses, and phone numbers online. KrebsOnSecurity has learned that another NPD data broker…

We are excited to announce new data residency, sovereignty, security, and AI capabilities for the Google Cloud region in the Kingdom of Saudi Arabia.

Introducing new GKE custom compute class API

- GCP containers blogs - August 19, 2024

The new GKE custom compute class API gives you fine-grained control over your infrastructure, so your applications have the resources they need.

C4 machine series is now GA

- GCP compute blogs - August 19, 2024

Announcing the GA of the C4 machine series, the most performant general-purpose VM for Compute Engine and Google Kubernetes Engine (GKE).

As part of our commitment to transparency within the cloud native community, we are providing an inside look into the work that goes on behind the scenes to bring the KubeCon + CloudNativeCon schedule…

Avoiding Collapse in a Tech-Stacked World | CSA

- cloudsecurityalliance.org - August 19, 2024

Cyber resilience is critical. CISOs are shifting their focus toward ransomware and APTs, which often go undetected by traditional cybersecurity tools.

Member post originally published on ngrok's blog by Joel Hans Every autumn, as the weather here in Tucson, Arizona, finally transitions away from near-unbearable heat, my wife once again falls in love…

Member post originally published on InfraCloud's blog by Shreyas Mocherla Accelerated by the pandemic, online tech communities have grown rapidly. With new members joining every day, it's tough to…

When using cryptography to protect data, protocol designers often prefer symmetric keys and algorithms for their speed and efficiency. However, when data is exchanged across an untrusted network such as the internet, it becomes difficult to ensure that only the exchanging parties can know the same key. Asymmetric key pairs and algorithms help to solve […]

Introduction Large enterprises have a centralized networking team for configuring and managing baseline DNS settings across a multi-account, multi-VPC environment. Amazon Route 53 Profiles provides an ability to simplify management of DNS configuration across multiple VPCs and AWS accounts. Before this feature, users needed to perform the association of Private Hosted Zones (PHZ) and Route […]

New UULoader malware targets Korean and Chinese users with Gh0st RAT; phishing scams target cryptocurrency wallets and AI users.

Discover how FakeBat malware spreads through malvertising, targeting users with fake software installers. Learn about its connection to cybercrime gro

June 2024: New AWS Sensitive Permissions & Services | CSA

- cloudsecurityalliance.org - August 19, 2024

Get a comprehensive recap of new sensitive permissions and services added to AWS in June 2024. Make sure to update your policies accordingly.

IT offboarding is my favorite task! Said no one ever. See how you can eliminate 90% of the time and manual effort it normally takes to find and offboa

What is SaaS Security? | Secure Your Organization | CSA

- cloudsecurityalliance.org - August 19, 2024

Learn how to insulate your organization against data breaches and create a comprehensive security blueprint with SaaS security.

Discover the latest cybersecurity threats: UULoader malware, cryptocurrency phishing, AI-related scams, and SMS attack tools like Xeon Sender.

AppSec teams are facing increased strain as organizations ramp up their adoption of DevSecOps practices, according to a report from ESG.

Neuralogics has followed the trend that sees technology vendors label their AI engines with a human name and joins the family with Henrik.

Programming Paradigms - DevOps.com

- devops.com - August 19, 2024

Sometimes the issues in programming go well beyond the code.

Are you looking for a new job? Here are some of the latest DevOps opportunities, including Netflix and American Express engineer roles.

North Korean hackers exploit Windows zero-day flaw for system privileges. Microsoft patches vulnerability in June update.

Cybersecurity experts uncover new FIN7 infrastructure in Russia and Estonia, revealing the threat actor's evolving network strategy and global reach.

Linux: Display and Manage IP Address Settings

- thenewstack.io networking - August 18, 2024

One of a Linux sysadmin's primary responsibilities is ensuring network connectivity. Read this post to understand about a system's identity on the network and configuring it to participate in network data exchanges.

DevOps in 2024: Automate First, AI Second

- thenewstack.io devops - August 18, 2024

GenAI gets a lot of attention as a code assistant, but test development and code review are where it really shines.

SRE Weekly Issue #438 – SRE WEEKLY

- sreweekly.com - August 18, 2024

This article shows how to use

How a DevOps Team Became a Platform Engineering Team

- thenewstack.io devops - August 17, 2024

Learn how Allianz Direct insurance was able to scale fivefold by embracing a DevOps platform engineering strategy built with all stakeholders in mind.

Linux: Low-level Data Copying with dd

- thenewstack.io storage - August 17, 2024

When you need low-level Linux data copying, there's one tool that never fails: the dd command. Here's how to use dd.

OpenAI uncovers and blocks Iranian covert operation using ChatGPT to generate content targeting US presidential election and global events.

The Open Source Software Prevalence Initiative will assess how widely used such software is in critical infrastructure and how to secure it.

Cockroach Rescinds Open Core for a Free Enterprise Version

- thenewstack.io cloud-native - August 16, 2024

The Open Core model hasn't worked for CockroachDB, so Cockroach Labs will instead offer a free version of its enterprise edition for non-customers — with some caveats.

Amazon Simple Storage Service (Amazon S3) is a widely used object storage service known for its scalability, availability, durability, security, and performance. When sharing data between organizations, customers need to treat incoming data as untrusted and assess it for malicious files before ingesting it into their downstream processes. This traditionally requires setting up secure staging […]

Cary, United States / North Carolina, 16th August 2024, CyberNewsWire

Massive extortion campaign exploits exposed .env files, compromising cloud and social media credentials. AWS environments used for large-scale scannin

Member post originally published on the Devtron blog by Bhushan Nemade TL;DR In the dynamic world of cloud-native, Kubernetes stands as an undisputed leader in the space of container orchestration.

4 Steps for Effective & Continuous Compliance | CSA

- cloudsecurityalliance.org - August 16, 2024

Understand key steps to define a strategy for a continuous compliance program with compliance automation.

Here are the latest additions to our portfolio of software-defined controls and policies that can make supporting your compliance requirements easier on Google Cloud.

Cloud operations are at the heart of every organization. Operating in the cloud allows IT teams to focus on business outcomes, optimizing IT processes while accelerating software development and innovation. These days, it is no longer a question if your organization is moving to the cloud, but how quickly you can move with security and […]

Russian cybercriminal jailed for selling stolen credentials on dark web marketplace Slilpp, linked to $1.2 million fraud. 3+ year sentence, $1.2M rest

Customers in highly regulated industries, such as Financial Services or Healthcare and Life Sciences, often need to audit every action made in environments with sensitive data. Regulations like HIPAA or FFIEC, and industry frameworks like the PCI DSS, require granular log entries that record user and administrative actions within an environment containing sensitive data, and […]

Russian hackers impersonate trusted brands to spread DanaBot and StealC malware via fake websites and phishing tactics.

Cloud Tagging and Cloud Security | CSA

- cloudsecurityalliance.org - August 16, 2024

Learn why cloud tagging is a critical component for cloud security, and how organizations can better categorize infrastructure based on various parameters.

Discover how the sophisticated ValleyRAT malware campaign targets Chinese users, employing multi-stage attacks and stealthy techniques to evade detect

Enhance your SaaS security by conducting thorough due diligence to identify and mitigate hidden risks

How to Debug a Blue Screen of Death | CSA

- cloudsecurityalliance.org - August 16, 2024

Understand what a Windows blue screen of death (BSOD) is, what causes it, and how to debug one.

Discover Banshee Stealer, a new macOS malware targeting browsers and crypto wallets. Learn about its features, targets, and cybersecurity implications

Google Pixel devices shipped with vulnerable demo app, potentially exposing users to malware. Google plans to remove the app in upcoming update.

NationalPublicData.com Hack Exposes a Nation's Data

- krebsonsecurity.com - August 15, 2024

A great many readers this month reported receiving alerts that their Social Security Number, name, address and other personal information were exposed in a breach at a little-known but aptly-named consumer data broker called NationalPublicData.com. This post examines what we…

Customers have been using various forms of automation for years to define a sequence of actions on Amazon Elastic Block Store (EBS). While before, customers were facing operational overhead related to EBS tasks, AWS Systems Manager (SSM) Automations can now be leveraged to meet a wide variety of customer use cases. In this blog post, a […]

Customers have been using various forms of automation for years to define a sequence of actions on Amazon Elastic Block Store (EBS). While before, customers were facing operational overhead related to EBS tasks, AWS Systems Manager (SSM) Automations can now be leveraged to meet a wide variety of customer use cases. In this blog post, a […]

Google Cloud Service Extensions adds nine new partner integrations to the Application Load Balancers for more powerful application security, experience, and observability.

Cloud nat and cloud ngfw demos

- GCP security blogs - August 15, 2024

Learn more about Cloud NAT features & Cloud NGFW Enterprise. See two hands-on demos that show how easy it is to get started in your environment today!

Cloud CISO Perspectives: Why we need to get ready for PQC

- GCP security blogs - August 15, 2024

What's post-quantum cryptography got to do with it? In this newsletter, CISO Phil Venables explains why we need to prepare for PQC.

As platform engineering and service catalogs have moved to the forefront of the conversation around cloud native developer experience, IT professionals need to understand the open source tools…

Member post originally published on AppCD's blog by Kunal Dabir I was recently speaking with an SRE who, when asked for their opinion on Infrastructure as Code (IaC), shouted, "it's terrible and our…

NIST FIPS 203, 204, 205 Finalized | PQC Algorithms | CSA

- cloudsecurityalliance.org - August 15, 2024

NIST has released 3 Post-Quantum Cryptography (PQC) algorithms. Here's a list of choices that should be vetted and implemented at your organization ASAP.

At AWS, security is the top priority, and we are committed to providing you with the necessary guidance to fortify the security posture of your environment. In 2018, we introduced built-in authentication support for Application Load Balancers (ALBs), enabling secure user authentication as they access applications. This feature allows developers to offload the authentication responsibility […]

SolarWinds and Palo Alto Networks release critical security patches to address vulnerabilities that could allow remote code execution and command inje

StateRAMP FAQ | Offer Cloud Services to State Gov | CSA

- cloudsecurityalliance.org - August 15, 2024

Get answers to some of the most frequently asked questions about StateRAMP. Understand StateRAMP requirements and the StateRAMP Authorization Boundary.

Russian government-linked phishing attacks target NGOs, media, and U.S. officials, exploiting social engineering and Proton Mail in sophisticated camp

Identity Threat Detection and Response Solution Guide

- thehackernews.com - August 15, 2024

Discover the importance of Identity Threat Detection and Response (ITDR) in securing both human and non-human identities across cloud and on-prem envi

EDRKillShifter, a new tool linked to RansomHub ransomware, targets EDR software, posing a growing threat to endpoint security.

Email Attack Trends: US vs. Europe | CSA

- cloudsecurityalliance.org - August 15, 2024

Explore the differences in email attack trends between the US and Europe, highlighting the rising threats of phishing, business email compromise, and vendor email compromise.

eBPF is so groundbreaking. It is not just about kernel modules. User-level tools are also beginning to be outperformed by eBPF equivalents.

GitHub Vulnerability 'ArtiPACKED' Exposes Repositories to Potential Takeover | Read more hacking news on The Hacker News cybersecurity news website and learn how to protect against cyberattacks and software vulnerabilities.

Discover how the ArtiPACKED vulnerability in GitHub Actions artifacts could compromise repositories and cloud environments.

Discover how the Gafgyt botnet targets cloud servers with weak SSH passwords for cryptocurrency mining, exploiting GPU power in evolving cyber threats

Announcing Karpenter 1.0 | Amazon Web Services

- AWS containers blogs - August 14, 2024

Introduction In November 2021, AWS announced the launch of v0.5 of Karpenter, "a new open source Kubernetes cluster auto scaling project." Originally conceived as a flexible, dynamic, and high-performance alternative to the Kubernetes Cluster Autoscaler, in the nearly three years since then Karpenter has evolved substantially into a fully featured, Kubernetes native node lifecycle manager. […]

Black Basta-linked campaign uses fake IT calls, AnyDesk, and SystemBC malware for credential theft and data exfiltration.

How AI Will Transform Cybersecurity | CSA

- cloudsecurityalliance.org - August 14, 2024

Discover how AI, particularly generative AI and LLMs, is poised to revolutionize cybersecurity by enhancing coverage, context, and communication to solve persistent security challenges.

In today's digital landscape, managing secrets, such as passwords, API keys, tokens, and other credentials, has become a critical task for organizations. For some Amazon Web Services (AWS) customers, centralized management of secrets can be a robust and efficient solution to address this challenge. In this post, we delve into using AWS data protection services […]

As organizations expand their cloud footprint, IP address management and planning grow increasingly complex. Without the ability to easily understand IP resources across the enterprise, network management tasks supporting business needs such as expansions, mergers, acquisitions, and service discontinuations can be time-consuming and challenging. For those critical networking tasks, a visualized map of your entire […]

Apple Private Cloud Compute Threat Modeling | CSA

- cloudsecurityalliance.org - August 14, 2024

Apple's new Private Cloud Compute (PCC) enables secure AI processing in the cloud. Explore how PCC works and its potential attack surfaces.

Are Shared Service Platforms Too Restrictive?

- thenewstack.io devops - August 14, 2024

Forty-four percent of participants in a new study by Rafay Systems said they believe the notion that shared services are too inflexible will be their biggest platform engineering challenge this year.

Elite cybercriminal behind ransomware and exploit kits extradited to US. Faces charges for global hacking schemes and fraud worth millions.

How to Augment Your Password Security with EASM

- thehackernews.com - August 14, 2024

Secure your organization from credential-based attacks by integrating Active Directory with EASM for enhanced password protection.

DevSecOps is about weaving security into software creation, which not only tightens protection but also speeds things up.

Federal Government & DOD Grapple with Sleeper Cells | CSA

- cloudsecurityalliance.org - August 14, 2024

The presence of sleeper cells within federal agency and DOD networks serves as a stark reminder of the importance of robust cyber hygiene practices.

DDoS attacks surge 46% in 2024, with gaming and technology sectors hardest hit. Learn about evolving attack patterns and their impact

Microsoft's Patch Tuesday addresses 90 security flaws, including 10 zero-days. Six actively exploited vulnerabilities fixed. CISA urges immediate acti

China-backed Earth Baku expands cyber attacks to Europe, Middle East, Africa, targeting critical sectors with advanced malware tools.

Ivanti releases critical security updates for vTM and Neurons for ITSM to fix vulnerabilities allowing unauthorized access. Update immediately.

Six 0-Days Lead Microsoft's August 2024 Patch Push

- krebsonsecurity.com - August 13, 2024

Microsoft today released updates to fix at least 90 security vulnerabilities in Windows and related software, including a whopping six zero-day flaws that are already being actively exploited by attackers.

Kubernetes 1.31 Arrives with New Support for AI/ML, Networking

- thenewstack.io kubernetes - August 13, 2024

This release, nicknamed "Eli," introduces Device Resource Assignment, which standardizes the process of accessing hardware accelerators.

Customers use Amazon Web Services (AWS) to securely build, deploy, and scale their applications. As your organization grows, you want to streamline permissions management towards least privilege for your identities and resources. At AWS, we see two customer personas working towards least privilege permissions: security teams and developers. Security teams want to centrally inspect permissions […]

Jenkins Shared Library Tutorial For Beginners

- devopscube.com - August 13, 2024

In this tutorial, we'll cover the essential concepts of Jenkins shared libraries and provide a hands-on guide to

Dive into the numbers from Amazon's record-breaking Prime Day 2024, from AI chip deployment to the staggering transaction volumes across AWS services like Amazon DynamoDB, Aurora, CloudFront, and more.

How the Intel MPI Library boosts HPC performance

- GCP compute blogs - August 13, 2024

Support for Intel MPI in third-generation Compute Engine machine families like H3 delivers improved performance for demanding HPC workloads.

By Nate Waddington, Head of Mentorship & Documentation, CNCF Technical people have a world of opportunities available to them when it comes to boosting career skills. But I'm going to make the case…

David has more than 20 years of experience in SW development and infrastructure and hands-on experience in dozens of technologies and is the only Kubestronaut who has ALL of the CNCF certifications.

A Developers Guide to NIM, Nvidia's AI Application Platform

- thenewstack.io microservices - August 13, 2024

By offering a flexible suite of microservices, Nvidia NIM provides a robust, scalable and secure platform for AI inference.

Researchers uncover GhostWrite vulnerability in T-Head RISC-V CPUs, allowing unrestricted access to memory and devices. Mitigation impacts performance

Microsoft patches critical flaws in Azure Health Bot Service that could expose patient data. Researchers detail vulnerabilities and their potential im

Securing Service Accounts: Practices for Protection | CSA

- cloudsecurityalliance.org - August 13, 2024

Understand service accounts, their importance, and best practices for securing these non-human identities to protect your organization's environment.

Explore how Hardsec enhances cybersecurity with hardware-based defenses, protecting critical systems from advanced threats

SaaS Security: Shared Responsibility Model | CSA

- cloudsecurityalliance.org - August 13, 2024

Learn about the Shared Responsibility Model in SaaS security, emphasizing the roles of providers and customers in safeguarding data and preventing breaches.

FBI disrupts Dispossessor ransomware group, dismantling servers across multiple countries. Learn about their tactics and the evolving ransomware lands

Ukraine warns of new phishing campaign distributing ANONVNC malware, infecting over 100 computers with stealthy remote access.

Securely exchange files business-to-business is a common and important business practice in highly regulated industries. As organizations grow, maintaining separate user credentials for various platforms, such as file transfer services, can become increasingly complex and time-consuming. As customers build out Managed File Transfer (MFT) environments, often they end up having to create separate, or branched, […]

With eLxr, Wind River Brings Debian Linux to the Edge

- thenewstack.io edge-computing - August 12, 2024

New Debian-based distro aims to match cloud native environments with heterogenous, computationally limited edge devices in remote locations.

Introduction Getir is the pioneer of ultrafast grocery delivery. Getir was founded in 2015 and revolutionized last-mile delivery with its grocery in-minutes delivery proposition. Today, Getir is a conglomerate incorporating nine verticals under the same brand. Challenge Getir uses Amazon Elastic Kubernetes Service (Amazon EKS) to host applications on AWS. One of the foremost challenges […]

Yleisradio is a Finnish broadcasting company running most of its online and mobile services – which roughly 2.1 million Finns use every day – on AWS. Like many organizations, they use IP Address Management (IPAM) systems to allocate IP addresses across their AWS environment to make sure routing works, even between AWS and their on-premises […]

Overview As businesses increasingly embrace cloud computing, many organizations are seeking to migrate their existing .NET applications from on-premises data centers to AWS. However, the transition of these workloads can often be complex and time-consuming. To simplify this process, AWS App2Container(A2C) is a robust command-line tool that assists users in lifting and shifting their on-premises […]

When Dr. Swami Sivasubramanian, VP of AI and Data, was an intern at Amazon in 2005, Dr. Werner Vogels, CTO of Amazon, was his first manager. Nineteen years later, the two shared a stage at the VivaTech Conference to reflect on Amazon's history of innovation—from pioneering the pay-as-you-go model with Amazon Web Services (AWS) to […]

Learn how Gemini Pro 1.5, with its code scanning and code generation capabilities, can help you analyze complex code and identify vulnerabilities.

Using the SRE Core program by Google, Hakuhodo Technologies is transforming its workforce through better collaboration from the inside out.

Torrance, United States / California, 12th August 2024, CyberNewsWire

Guide for Building a Resilient Cloud Security Posture | CSA

- cloudsecurityalliance.org - August 12, 2024

Discover practical strategies for organizations to fortify cloud security posture, overcome posture management challenges, and build resilience.

Jenkins Pipeline Tutorial For Beginners

- devopscube.com - August 12, 2024

Jenkins pipeline as code is a concept that defines a Jenkins build pipeline in Jenkins DSL/Groovy format. This

Introduction As generative artificial intelligence (generative AI) continues to evolve, the demand for more powerful and efficient computing resources grows, along with the need to manage exponentially increasing amounts of data. Datasets used for training generative AI models are typically measured in terabytes (TB), orders of magnitude bigger than traditional machine learning (ML) datasets whose […]

As governments seek to improve security and safety in public places, video surveillance in the public sector is a rapidly growing technology. Video surveillance is increasingly being used in public places such as airports, train stations, public transportation, schools, and government buildings. Governments all over the world aim to put in place various measures to […]

New AWS customers will no longer be able to sign up for AWS Cloud9 and the AWS CodeCommit private Git repository service.

PCI 4.0 Simplified | Understand the New Requirements | CSA

- cloudsecurityalliance.org - August 12, 2024

PCI 4.0 introduces several new requirements that focus on improving the security of cardholder data and enhancing resilience.

Cybersecurity experts uncover critical vulnerabilities in Chinese solar management platforms, potentially allowing hackers to cause blackouts and disr

Phishing is surging. See why & how it's exploiting current events, like CrowdStrike's BSOD & the Olympics.

Why Your Business Needs a Virtual CISO | CSA

- cloudsecurityalliance.org - August 12, 2024

A virtual CISO offers strategic cybersecurity leadership for businesses needing flexible, cost-effective solutions, helping manage risks and ensure regulatory compliance.

The AI Hangover is Here – The End of the Beginning

- thehackernews.com - August 12, 2024

AI faces market correction but remains vital for future tech, especially in cybersecurity, despite high costs and integration challenges.

FreeBSD releases security updates to fix a high-severity OpenSSH vulnerability, urging immediate updates to prevent remote code execution.

This week's five DevOps job postings include a remote CI/CD engineer role at CrowdStrike and a DevOps engineer at BAE Systems.

KubeCon 2024 is a must-attend event for Kubernetes and cloud-native enthusiasts. It offers numerous sessions, keynotes and a vibrant show floor with major vendors and innovative startups.

Ewon Cosy+ industrial remote access solution vulnerable to root access attacks, allowing VPN session hijacking and potential industrial infrastructure

Russian government and IT firms targeted by EastWind cyber campaign, deploying sophisticated malware through spear-phishing and watering hole attacks.

SRE Weekly Issue #437 – SRE WEEKLY

- sreweekly.com - August 12, 2024

This week, CrowdStrike posted quite a bit more detail about what happened on July 19. The short of it seems to be an argument count mismatch, but as with any incident of this sort, there are multiple contributing factors.

The "CrowdStrike" approach to reliability work

- surfingcomplexity.blog - August 11, 2024

There's a lot we simply don't know about how reliability work was prioritized inside of CrowdStrike, but I'm going to propose a little thought experiment about the incident where …

Malicious Python package on PyPI mimics Solana library, stealing blockchain wallet keys. Supply chain attack puts developers at risk.

Researchers uncover 10 security flaws in Google's Quick Share, potentially allowing remote code execution on Windows. Update to version 1.0.1724.0 or

Widespread malware campaign installs rogue Chrome and Edge extensions via trojan, affecting 300,000 users.

Microsoft reveals a critical zero-day flaw in Office. Users urged to update systems before August 13 patch.

Critical AWS vulnerabilities allow attackers to gain admin control, steal data, and execute remote code. Amazon has addressed these flaws.

Microsoft Reveals Four OpenVPN Flaws Leading to Potential RCE and LPE | Read more hacking news on The Hacker News cybersecurity news website and learn how to protect against cyberattacks and software vulnerabilities.

Learn how to refresh AWS Secret Manager secrets in long-running Amazon ECS tasks through automation using a Lambda function and a CloudFormation resource.

5 Lessons For Building a Platform as a Product

- thenewstack.io platform-engineering - August 09, 2024

Organize and standardize aspects of your platform as much as possible to ensure ease of use and maintenance from day one to day 2,000 and beyond.

Custom Org Policy and Policy Controller can help secure your GKE clusters and achieve governance and compliance at scale. Here's how.

Community post originally published on Dev.to by Syed Asad Raza Helm, often described as the package manager for Kubernetes, simplifies the deployment and management of applications within Kubernetes…

A Cybersecurity Expert's Perspective on CrowdStrike | CSA

- cloudsecurityalliance.org - August 09, 2024

Understand the implications of vulnerabilities like the Microsoft/CrowdStrike outage and explore strategies to build a more resilient IT ecosystem.

"All code will become legacy". This saying, widely recognized amongst software developers, highlights the reality of their day-to-day activities. While writing new code is an integral part of a developer's role, a significant portion of their time is dedicated to refactoring and maintaining existing codebases. Developers typically encounter numerous challenges when attempting to understand and […]

Researchers uncover critical security flaws in Sonos smart speakers, allowing potential eavesdropping. Learn about the vulnerabilities and protective

ISO 27001: Auditing “Themes” in the 2022 Revision | CSA

- cloudsecurityalliance.org - August 09, 2024

Delve into “auditing themes," as introduced in ISO/IEC 27001:2022. Understand the rationale behind the change and how it ensures a robust security audit.

Cloud Migration | SaaS Secrets & PAM Strategy | CSA

- cloudsecurityalliance.org - August 09, 2024

Cloud migrations take time and bring significant challenges, particularly in security and identity management. Businesses often accumulate cyber debt.

Tennessee man charged for running laptop farm to help North Koreans get remote IT jobs in US and UK companies, facing up to 20 years in prison.

CISA warns of Cisco device vulnerabilities and weak passwords, urging stronger protections and upgrades to prevent cyberattacks.

As we anticipate the advancement of AI over the next decade, we must recognize that we are not equipped to grant these tools complete control.

by harnessing the power of AI, DevOps teams can achieve a more intelligent and automated approach to IT operations.

An increasing number of organizations are adopting IPv6 in their environments, driven by government mandates, public IPv4 space exhaustion, and private IPv4 scarcity. To accommodate for workload growth, integrate new business needs (for example, mergers and acquisitions), expand into other regions, and increase developer productivity, you need to design and implement a scalable, extensible, and […]

This blog post was written by Brianna Rosentrater – Hybrid Edge Specialist SA and Jessica Win – Software Development Engineer This post is Part 2 of the two-part series 'Enabling high availability of Amazon EC2 instances on AWS Outposts servers', providing you with code samples and considerations for implementing custom logic to automate Amazon Elastic […]

This blog post is written by Brianna Rosentrater – Hybrid Edge Specialist SA and Jessica Win – Software Development Engineer. This post is part 1 of the two-part series 'Enabling high availability of Amazon EC2 instances on AWS Outposts servers', providing you with code samples and considerations for implementing custom logic to automate Amazon Elastic […]

Platform Owners Must Master Platform Optimization to Drive Innovation

- thenewstack.io platform-engineering - August 08, 2024

Successful platform engineering beyond standard platforms also involves maintaining non-production environments that closely resemble production settings.

North Korean hacking group Kimsuky targets university staff with spear-phishing and fake login portals. Enable MFA and check URLs to stay secure.

Amazon Web Services (AWS) has found widespread adoption in the satellite communication and aerospace sectors, serving not only as a platform for modernizing their overall IT infrastructure but also for delivering network connectivity solutions. One prominent example showcases how a leading satellite and aerospace company, Thales Avionics, used AWS to build a virtual data center […]

Leveraging Infrastructure as Code for AWS Mainframe Modernization with Terraform AWS Mainframe Modernization service is a cloud-native platform to modernize, migrate, execute, and operate mainframe applications. In addition to analysis and transformation tools, it provides a fully-managed and resilient runtime environment making it easierto run and operate modernized applications. Starting today, you can define AWS Mainframe […]

Score accepted as a CNCF Sandbox Project

- cncf.io - August 08, 2024

Member post originally published on the Humanitec blog by Luca Galante The team at Humanitec is thrilled to announce that Score has officially been accepted as a Sandbox project by the Cloud Native…

How to Scale Your GRC Program with Automation | CSA

- cloudsecurityalliance.org - August 08, 2024

Governance, Risk, and Compliance doesn't need to take tons of time and effort. GRC automation can help you scale and improve your GRC programs over time.

Critical 0.0.0.0 Day browser vulnerability discovered, impacting Chrome, Firefox, Safari. Exploits local networks on MacOS and Linux

Secure Snowflake Access: Best Practices | CSA

- cloudsecurityalliance.org - August 08, 2024

Enhance your Snowflake security with best practices on secure data access for humans and machines, emphasizing MFA, SSO, and rigorous access controls.

Detecting and resolving bugs before a release enters production is critical to the SDLC — and so is incorporating a test phase in processes.

Discover how Automated Security Validation and Continuous Threat Exposure Management combine to strengthen your cybersecurity strategy.

How AI is Shaping Next Gen Data Security | CSA

- cloudsecurityalliance.org - August 08, 2024

Learn how AI-powered classification is transforming legacy Data Security Posture Management (DSPM) and providing autonomous insight into your data risk.

Microsoft addresses critical Windows update vulnerabilities that could expose patched systems to old security flaws and bypass virtualization-based se

Discover how cybercriminals use Google Drawings and WhatsApp links in a sophisticated phishing campaign targeting Amazon users. Learn about new securi

Join Network Security 2024 in Las Vegas for top-tier cybersecurity training, AI insights, and hands-on experiences. Secure your spot now!

BlackSuit ransomware demands up to $500M, targets critical infrastructure. FBI and CISA warn of aggressive tactics. New ransomware families emerge.

Urgent update required for WhatsUp Gold due to active exploits of critical security flaw CVE-2024-4885. Patch now to secure your network.

Overview Cordial is a cross-channel marketing platform that offers tools to fully automate marketing strategies. By automating marketing execution, Cordial liberates technology teams to focus on their core strengths: building and creativity. It empowers technology teams to delegate data access and management to marketers, using Cordial's robust platform to migrate, transform, and deliver complex data […]

Tackling the Challenges of Logical Replication in PostgreSQL

- thenewstack.io ci-cd - August 07, 2024

In its latest release, distributed Postgres vendor pgEdge boosts support for large objects, enhanced error handling and automation.

By the CNCF Code of Conduct Committee Hello CNCF community! Our permanent CNCF Code of Conduct Committee has been operating for eight months, so it's time for us to share information about incidents…

Cybercrime Rapper Sues Bank over Fraud Investigation

- krebsonsecurity.com - August 07, 2024

In January, KrebsOnSecurity wrote about rapper Punchmade Dev, whose music videos sing the praises of a cybercrime lifestyle. That story showed how Punchmade's social media profiles promoted Punchmade-themed online stores selling bank account and payment card data. Now the Kentucky…

CloudBees Welcomes AI-Powered Testing, 'Prodigal Sons' Home

- thenewstack.io devops - August 07, 2024

CloudBees new AI technology can predict which tests are likely to fail, allowing developers to focus on potential issues earlier in the development process.

Learn how to use Steampipe's AWS plugin to perform SQL queries on AWS API data directly from Steampipe or any Postgres or SQLite database.

Writing clear and concise Git commit messages is crucial for effective version control and collaboration. However, when working with complex projects or codebases, providing additional context can be challenging. In this blog post, we'll explore how to leverage Amazon Q Developer to analyze our code changes for us and produce meaningful commit messages for Git. […]

"Be yourself; everyone else is already taken." -Oscar Wilde In the real world as in the world of technology and authentication, the ability to understand who we are is important on many levels. In this blog post, we'll look at how the ability to uniquely identify ourselves in the AWS console can lead to a […]

In this blog post, we will show you how to manage your compliance controls with AWS Config custom rules (custom rules) written in AWS CloudFormation Guard (cfn-guard) domain-specific language (DSL) with use of conformance packs. AWS CloudFormation Guard, the language used to write custom policy rules is an open-source domain-specific language (DSL) and command line […]

With the pace of innovation with Generative AI applications, there is increasing demand for more granular observability into applications using Large Language Models (LLMs). Specifically, customers want visibility into: Prompt metrics like token usage, costs, and model IDs for individual transactions and operations, apart from service-level aggregations. Output quality factors including potential toxicity, harm, truncation […]

CSA Spotlight: Head of Security Partha Chakraborty | CSA

- cloudsecurityalliance.org - August 07, 2024

An interview with Partha Chakraborty, Associate VP, Head of Security Architecture, Engineering & Innovation at Humana. Get his perspective on CSA's legacy.

Enterprise users use AWS Backup for centralized data protection as part of a defense-in-depth architecture. Its features generally fulfill users' data security and regulatory requirements, but there is demand for additional resiliency against ransomware incidents. Meeting the recovery objectives often involves creating multiple copies of data backups, developing and maintaining custom code for backup processes, […]

This post is written by Tyler Jones, Senior Solutions Architect – Graviton, AWS. Performance tuning the Renaissance Finagle-http benchmark Sometimes software doesn't perform the way it's expected to across different systems. This can be due to a configuration error, code bug, or differences in hardware performance. Amazon APerf is a powerful tool designed to help […]

To make Kubernetes-driven compliance easier to manage, we've updated the CIS Google Kubernetes Engine benchmarks. Here's what's new.

Did you know that Amazon Q Developer, a new type of Generative AI-powered (GenAI) assistant, can help developers and DevOps engineers accelerate Infrastructure as Code (IaC) development using the AWS Cloud Development Kit (CDK)? IaC is a practice where infrastructure components such as servers, networks, and cloud resources are defined and managed using code. Instead […]

Member post originally published on the Cerbos blog by James Walker Decoupling authorization from your main application code makes authorization more scalable, easier to maintain…

Securing AI: Data Privacy & Vulnerabilities | CSA

- cloudsecurityalliance.org - August 07, 2024

Explore the critical balance of AI efficiency and data privacy, focusing on safeguarding training data and managing vulnerabilities in AI frameworks like Ray.

Discover critical vulnerabilities in Roundcube webmail software that could allow hackers to steal sensitive data. Learn about the latest security patc

New SLUBStick exploit increases success rate of Linux kernel attacks to 99%, bypassing security defenses in versions 5.19 and 6.2.

Generative AI–based applications have grown in popularity in the last couple of years. Applications built with large language models (LLMs) have the potential to increase the value companies bring to their customers. In this blog post, we dive deep into network perimeter protection for generative AI applications. We'll walk through the different areas of network […]

CloudBees today revealed it has acquired Launchable, a provider of a test automation platform, to enable DevOps teams to improve both application security

Ransomware-as-a-Service: Challenges & Strategies | CSA

- cloudsecurityalliance.org - August 07, 2024

Unpack the complexity of RaaS and explore why it's challenging to eliminate, alongside strategies for businesses to mitigate risks and strengthen defenses.

Endor Labs today revealed it has added an ability to determine how challenging it might prove to be to upgrade an open source software package

Discover GoGra, a new Go-based backdoor targeting media, and learn about the rising trend of cloud-exploiting malware in cybersecurity.

CrowdStrike Reveals Root Cause of Global System Outages

- thehackernews.com - August 07, 2024

CrowdStrike reveals root cause of global Windows device crash, implements new safety measures, and faces potential lawsuit from Delta Air Lines.

Understanding CTEM in Cybersecurity | CSA

- cloudsecurityalliance.org - August 07, 2024

Explore Continuous Threat Exposure Management (CTEM) and how it offers real-time monitoring and proactive threat response, revolutionizing cybersecurity.

New Chameleon trojan campaign targets Canadian and European users by masquerading as a CRM app, posing significant risks to hospitality and B2C sector

The rocket ship of DevOps will always launch, but success largely depends on the work that is done before the countdown begins.

Apple tightens macOS security with Gatekeeper update in Sequoia, combating malware and requiring System Settings review for unsigned apps.

CrowdStrike: how did we get here?

- surfingcomplexity.blog - August 07, 2024

CrowdStrike has released their final (sigh) External Root Cause Analysis doc. The writeup contains some more data on the specific failure mode. I'm not going to summarize it here, mostly beca…

Vivian Health connects travel nurses with job opportunities across the country. To do that, the platform has innovated not just the job search itself, but also the tooling used by recruiters and hiring managers to get qualified candidates matched to the right job and placed as quickly and as seamlessly as possible. However, the process […]

Japanese | Korean | Spanish At Amazon Web Services (AWS), we continue to listen to our customers, regulators, and stakeholders to understand their needs regarding audit, assurance, certification, and attestation programs. We are pleased to announce that the AWS System and Organization Controls (SOC) 2 report is now available in Japanese, Korean, and Spanish. This […]

Amazon Titan Image Generator v2 provides unprecedented creative capabilities: image conditioning, color control, background removal, and subject preservation via fine-tuning for brand consistency.

Organizations commonly leverage AWS services to enhance the observability and operational excellence of their workloads. However, often it is unclear the actions that teams should take when observability metrics are delivered to them, it can be difficult to understand which metrics need action to remediate and which ones are simply noise. For example, if an […]

A survey of DevOps professionals published today finds that 20% now use AI across all phases of the software development lifecycle (SDLC).

INTERPOL recovers $41 million from a $42.3 million business email scam targeting a Singapore firm using its global payment mechanism.

Join our upcoming Security Summit to learn about the latest innovations and strategies to help protect your business and customers from emerging threats.

The Kubernetes Community Days (KCD) program has blossomed over the past two years thanks to the incredible efforts of our community. We at CNCF have been honored to support these events by offering…

Community post originally published on Dev.to by Sunny Bhambhani In this article, we will be talking about Approach 3 i.e. how to get multiple helm charts installed using a simple bash utility.

This post is written by Craig Warburton, Senior Solutions Architect, Hybrid. Sedji Gaouaou, Senior Solutions Architect, Hybrid. Brian Daugherty, Principal Solutions Architect, Hybrid. Migrating workloads to AWS Outposts rack offers you the opportunity to gain the benefits of cloud computing while keeping your data and applications on premises. For organizations with strict data residency requirements, […]

As the size of an organization's disaster recovery (DR) implementation grows, we often see the role of the network grow in importance. The relationship between DR and the network should not come as a surprise, as we expect network performance and the ability to replicate data between the source environment and the DR site to […]

This blog post demonstrates how to use Amazon Bedrock with a detailed security plan to deploy a safe and responsible chatbot application. In this post, we identify common security risks and anti-patterns that can arise when exposing a large language model (LLM) in an application. Amazon Bedrock is built with features you can use to […]

North Korean hackers Moonstone Sleet push malicious npm packages targeting Windows. Datadog uncovers cyber threats using fake JavaScript libraries.

Suspicious Minds: Insider Threats in The SaaS World

- thehackernews.com - August 06, 2024

Learn how ITDR and SSPM protect your SaaS applications from insider threats, ensuring comprehensive security.

Future of GRC: Predictions for 2030 | CSA

- cloudsecurityalliance.org - August 06, 2024

Explore insights and predictions from RegScale CEO Travis Howerton on the evolving GRC landscape by 2030, including AI-driven trends and compliance challenges.

Kaspersky discovers LianSpy malware targeting Russian Android users, using Yandex Cloud for stealthy data theft since 2021.

Google patches CVE-2024-36971, a high-severity Android kernel flaw exploited in targeted attacks. Learn about the August security updates.

Critical zero-day vulnerability in Apache OFBiz ERP system allows unauthorized remote code execution. Patch available for versions prior to 18.12.15.

Low-Drama 'Dark Angels' Reap Record Ransoms

- krebsonsecurity.com - August 05, 2024

A ransomware group called Dark Angels made headlines this past week when it was revealed the crime group recently received a record $75 million data ransom payment from a Fortune 50 company. Security experts say the Dark Angels have been…

Large enterprises run mission critical applications on AWS. These applications can have hundreds of Amazon Elastic Compute Cloud (Amazon EC2) instances. Backing up Amazon Elastic Block Store (Amazon EBS) volumes is a requirement for these applications for use cases such as disaster recovery, application recovery, rollback, compliance and audit. Stringent data consistency and integrity are […]

Customers run thousands of VMware virtual machines on premises, in VMware Cloud on AWS, and VMware Cloud on AWS Outposts. They use AWS Backup to centrally manage data protection of these VMware environments. Customers, who initiate an Amazon EC2 restore from an AWS Backup for VMware recovery point, encounter a situation where there is no […]

Summer is reaching its peak for some of us around the globe, and many are heading out to their favorite holiday destinations to enjoy some time off. I just came back from holidays myself and I couldn't help thinking about the key role that artificial intelligence (AI) plays in our modern world to help us […]

Why AI Can't Fix Your Production Issues

- thenewstack.io observability - August 05, 2024

AI can follow your instructions but still cannot debug an issue as well as you can.

Amazon Cognito is a customer identity and access management (CIAM) service that can scale to millions of users. Although the Cognito documentation details which multi-tenancy models are available, determining when to use each model can sometimes be challenging. In this blog post, we'll provide guidance on when to use each model and review their pros […]

In the dynamic landscape of web applications and APIs, ensuring fast, reliable, and secure access for all your customers is crucial. With traditional implementations, though, users of global applications often face latency and reliability challenges because of delays and uneven performance due to the complexity of the global internet infrastructure. AWS Global Accelerator enables you […]

With the recent Gitlab Google Cloud integration, you create a Continuous Delivery pipeline using Cloud Run, Gitlab CI/CD and Cloud Deploy.

Member post by Jonathan Munz, Senior Software Engineer at Embrace React Native allows developers to build native mobile apps using Javascript and Typescript for both iOS and Android.

Accedere's Perspective on the CrowdStrike Incident | CSA

- cloudsecurityalliance.org - August 05, 2024

Understand the cause, impact, and resolution of the CrowdStrike & Microsoft outage. The incident reminds us of the importance of robust cybersecurity.

Microsoft is partnering with GitHub to enable its 100 million+ developers to build AI applications directly on the GitHub platform.

Researchers uncover vulnerabilities in Windows Smart App Control and SmartScreen, revealing potential threat access methods without alerts.

Phishing attacks in Kazakhstan by Bloody Wolf group use STRRAT malware to hijack corporate data via fake government websites.

Surviving LockBit: Lessons from a Ransomware Attack | CSA

- cloudsecurityalliance.org - August 05, 2024

Last year, the University of Health Sciences & Pharmacy faced a ransomware attack by the LockBit group. The attack was a needed reality check.

Threat intelligence that can fend off security threats before they happen requires not just smarts, but the speed and worldwide scale that only AWS can offer. Organizations around the world trust Amazon Web Services (AWS) with their most sensitive data. One of the ways we help secure data on AWS is with an industry-leading threat […]

Salesforce is an AWS Partner and a trusted global leader in customer relationship management (CRM). Hyperforce is the next-generation Salesforce architecture, built on Amazon Web Services (AWS). When business applications developed on Hyperforce are integrated with on-premises systems, traffic in both directions will flow over the internet. For customers in heavily regulated industries such as […]

Supreme Court's Loper Bright ruling overturns 40 years of Chevron deference, altering the cybersecurity regulatory landscape

AI-Driven Compliance Revolutionizes Cybersecurity | CSA

- cloudsecurityalliance.org - August 05, 2024

AI-powered compliance transforms cybersecurity, automating risk assessment, monitoring, and incident response, ensuring robust data protection and regulatory adherence.

Enhancing Incident Response Readiness with Wazuh

- thehackernews.com - August 05, 2024

Discover how Wazuh enhances incident response readiness with automated actions, real-time alerts, and third-party integrations

Social Trends - DevOps.com

- devops.com - August 05, 2024

Maybe Maslow was right.

The agency's TRACTOR program will find a solution that will use AI to automate the process of rewriting legacy software to Rust.

High-severity vulnerability in Rockwell Automation ControlLogix devices could allow unauthorized CIP commands. Urgent updates available to patch secur

Welcome to our weekly jobs report, including DevOps engineer roles at Mastercard and NBC Universal, for your perusal.

New Android banking trojan BlankBot targets Turkish users, stealing financial data using keylogging, screen recording, and SMS interception.

Chinese hacking group Evasive Panda compromises ISP to push malware, targeting companies through DNS poisoning and insecure update mechanisms.

How to Manage Linux Software

- thenewstack.io ci-cd - August 04, 2024

This article explains the role of command-line package managers, examines the package manager options for various distributions and demonstrates how to manage software with some of the most common tools.

Bypassing eBPF to Protect Runtimes in Kubernetes Apps

- thenewstack.io kubernetes - August 04, 2024

Generative AI presents new security problems for runtimes of Kubernetes applications. Operant, a runtime application platform provider, offers a non-eBPF solution.

Modeling a CLH lock in TLA+

- surfingcomplexity.blog - August 04, 2024

The last post I wrote mentioned in passing how Java's ReentrantLock class is implemented as a modified version of something called a CLH lock. I'd never heard of a CLH lock before, and …

SRE Weekly Issue #436 – SRE WEEKLY

- sreweekly.com - August 04, 2024

This analysis from Microsoft starts off by examining crash dumps from the incident that were voluntarily submitted by Windows users. Then they explain why security vendors like CrowdStrike might choose to operate in kernel mode, the inherent risks, and alternative options they could use instead.

How To Manage Linux Log Services

- thenewstack.io observability - August 03, 2024

This article explains the rsyslog logging service and compares it to the newer journald system. It uses practical command examples to manage the services and update configuration files.

Linux: Mount Remote Directories With SSHFS

- thenewstack.io networking - August 03, 2024

SSHFS mounts remote directories to a local machine using secure encryption, with a connection that is far more secure than your standard FTP.

US sues TikTok for violating children's privacy laws, alleging illegal data collection and failure to protect underage users. TikTok disputes claims.

Minecraft DDoS tool targets Jupyter Notebooks in latest cyber attack. Discover the new Panamorfi campaign threat.

Azure DevOps is a powerful platform that provides a comprehensive suite of tools for managing the entire software development lifecycle. One of its standout

Cisco Talos reveals Chinese state actors, APT41, breached a Taiwanese research institute using ShadowPad and Cobalt Strike malware.

Supercharge AIOps Efficiency With LLMs

- thenewstack.io devops - August 02, 2024

When we say that LLMs are bad for root cause analysis, we mean it. But that doesn't mean they won't play a critical role.

A Russia-linked threat actor, APT28, is using a car-for-sale phishing lure to deliver a new Windows backdoor called HeadLace.

Learn how to deploy a VM using Terraform from the Google Cloud Marketplace user interface (UI).

BMC, committed to bringing generative AI to the mainframe, has made available a tool in beta that explains code functionality.

Top 3 edge AI trends to look for in 2024

- cncf.io - August 02, 2024

Member post by Abhijeet Kakade, Senior Marketing Expert at MSys Technologies 2023 was the year AI technologies became mainstream. What once was seen in movies is now a staple in daily business…

The CCZT: Built for the Industry, By the Industry | CSA

- cloudsecurityalliance.org - August 02, 2024

Anna Schorr, Training Program Director at CSA, discusses the Certificate of Competence in Zero Trust. Delve into the development & benefits of the CCZT.

Amazon Web Services (AWS) is pleased to announce the completion of our annual Outsourced Service Provider's Audit Report (OSPAR) audit cycle on July 1, 2024. The 2024 OSPAR certification cycle includes the addition of 10 new services in scope, bringing the total number of services in scope to 163 in the AWS Asia Pacific (Singapore) […]

Learn how SMBs and MSPs can simplify, accelerate, and scale cybersecurity with an All-in-One platform. Join our webinar for expert insights and soluti

Critical OFBiz ERP software vulnerability targeted by Mirai botnet, risking business data. Learn about the recent attacks and necessary security updat

New Windows backdoor BITSLOTH exploits BITS for command-and-control, targeting South American government and linked to Chinese actors.

Historic prisoner exchange involves the U.S., Russia, and allies, freeing cybercriminals and political detainees, marking a significant diplomatic ach

Cloudflare's TryCloudflare is being exploited by cybercriminals for malware delivery via phishing emails, reports say.

Cybersecurity researchers from JFrog recently discovered a GitHub Personal Access Token in a public Docker container.

AWS Service Catalog lets you centrally manage your cloud resources to achieve governance at scale of your Infrastructure as Code (IaC) templates. AWS Service Catalog supports AWS CloudFormation natively and allows customers to use other IaC such as Terraform Community and Terraform Cloud via Service Catalog reference engine. We often hear customers asking how to […]

A multicloud strategy presents various challenges, including observing and managing applications and infrastructure across multiple cloud platforms. Maintaining consistent tooling for visualizing operational data and automating actions helps organizations address this challenge. Amazon CloudWatch and AWS Systems Manager are two services that provide unified monitoring, observability, and automation capabilities for workloads deployed on AWS, on-premises, […]

Managing Amazon Athena through identity federation allows you to manage authentication and authorization procedures centrally. Athena is a serverless, interactive analytics service that provides a simplified and flexible way to analyze petabytes of data. In this blog post, we show you how you can use the Athena JDBC driver (which includes a browser Security Assertion […]

Philadelphia, United States, 1st August 2024, CyberNewsWire

Test Open ID Connect Flows Locally - Digi Hunch

- digihunch.com - August 01, 2024

Test Open ID Connect (OIDC) Flows involves several parties. This post discuss how to test the flows with all parties running locally.

Delta Air Lines Inc. Chief Executive Ed Bastian has put a price tag on CrowdStrike Inc.'s debilitating outage to his airline, $500 million, leaving the

FinOps Can Turn IT Cost Centers Into a Value Driver

- thenewstack.io devops - August 01, 2024

FinOps and AI advancements empower businesses to do more and go further than they ever could.

A survey of individuals in development, IT operations and security finds two-thirds are releasing software faster than a year ago.

Our mWISE Conference 2024 is your chance to immerse yourself in the latest threat intelligence, cutting-edge tools, and engage with the strategic minds that are shaping the future of cybersecurity. Register today.

Malicious Python packages on PyPI, promoted through Stack Exchange, steal cryptocurrency and sensitive data.

Over a million domains are at risk from the Sitting Ducks attack, hijacked by cybercriminals exploiting DNS weaknesses.

We're excited to announce that Amazon Web Services (AWS) has completed its first German Insurance Association (GDV) joint audit with GDV participant members, which provides assurance to customers in the German insurance industry for the security of their workloads on AWS. This is an important addition to the joint audits performed at AWS by our regulated customers within […]

Cybersecurity researchers uncover BingoMod, a new Android banking trojan that steals money, wipes devices, and evades detection. Learn how to protect

Protect Your Zoom Accounts from Cybercriminals | CSA

- cloudsecurityalliance.org - August 01, 2024

Cybercriminals exploit Zoom's surge in popularity using phishing, malware, and credential stuffing to steal and trade accounts, highlighting the need for robust security measures.

Setting Microservices Up for Success: Real-World Advice

- thenewstack.io ci-cd - August 01, 2024

Sarah Wells helped the Financial Times move from 12 to 20,000 software releases a year. In this episode of The New Stack Makers, she discusses how it happened and what's needed to make such digital transformations work.

Enterprises face a variety of threats such as natural disasters, cyber-attacks and technology failures that could severely disrupt operations. A comprehensive disaster recovery plan is crucial to quickly respond and recover from these events. In this blog post, we'll show how to plan and implement a comprehensive disaster recovery solution between your VMware on-premises environment […]

Compute Engine general-purpose and memory-optimized X4 and C3 bare metal machine types are now generally available, with certification for SAP HANA.

Learn about best practices for AWS GovCloud (US) DevOps teams to consider as they work to maintain a secure infrastructure and adhere to compliance guidelines.

Obfuscation: There Are Two Sides To Everything

- thehackernews.com - August 01, 2024

Learn about obfuscation in cybersecurity, its dual use in protecting and disguising code, and advanced detection methods.

Mitigating M&A Security Risks in Healthcare | CSA

- cloudsecurityalliance.org - August 01, 2024

As healthcare organizations expand, they become vulnerable to cyber threats. Proactive security testing is a useful strategy to mitigate the risks.

Google Chrome's latest update introduces app-bound encryption, enhancing cookie protection against malware on Windows.

Massive Facebook scam network ERIAKOS targets mobile users with fake websites and ads, stealing personal data.

Recently, some of my former colleagues wrote a blog post on the Netflix Tech Blog about a particularly challenging performance issue they ran into in production when using the new virtual threads f…

U.S. Trades Cybercriminals to Russia in Prisoner Swap

- krebsonsecurity.com - August 01, 2024

Twenty-four prisoners were freed today in an international prisoner swap between Russia and Western countries. Among the eight Russians repatriated were five convicted cybercriminals. In return, Russia has reportedly released 16 prisoners, including Wall Street Journal reporter Evan Gershkovich and…

U.S. Trades Cybercriminals to Russia in Prisoner Swap

- krebsonsecurity.com - August 01, 2024

Twenty-four prisoners were freed today in an international prisoner swap between Russia and Western countries. Among the eight Russians repatriated were five convicted cybercriminals. In return, Russia has reportedly released 16 prisoners, including Wall Street Journal reporter Evan Gershkovich and…

To help them be more productive, developers all over the world are turning to generative AI-powered assistants like Amazon Q Developer, the most capable assistant for accelerating software development. While Amazon Q Developer is great at providing code suggestions, writing new code is one of many things developers have to do on a day-to-day basis. […]

In today's digital landscape, customers have complex and distributed workloads running on AWS, involving a large number of AWS resources across multiple services. Tackling security risks across numerous resources can seem daunting, but with the right approach following best practices, can be addressed in a timely manner. AWS offers tools and services designed to help […]

Introduction Cloud migration is a transformative journey that unlocks new opportunities for businesses. However, this transition can be overwhelming, and it necessitates a phased approach that utilizes different migration strategies. Initially, applications that require minimal changes are migrated using lift and shift strategy. More complex monolithic applications, that require re-architecting or refactoring to leverage cloud-native capabilities, are […]

AWS Discontinues Git-Hosting Service CodeCommit

- thenewstack.io ci-cd - July 31, 2024

Though not widely used, AWS CodeCommit had close integrations with other AWS services, which could cause user frustration with the migration process.

Advertisers can now leverage first-party data with Amazon Marketing Cloud on AWS Clean Rooms, enabling differentiated insights, audience discovery, and effective campaign planning and measurement while maintaining data privacy.

Cloud CISO Perspectives: Why water security can't wait

- GCP security blogs - July 31, 2024

In this newsletter, guest columnist Sandra Joyce discusses why water infrastructure needs to be more cyber-resilient.

New curated OpenTelemetry ingestion pipeline for GKE

- GCP containers blogs - July 31, 2024

A new curated OpenTelemetry Protocol pipeline for GKE helps collect OTLP data from instrumented applications and exports it to Cloud Observability.

Member post originally published on the Nirmata Blog by Jim Bugwadia The Don't Repeat Yourself (DRY) principle of software development advocates avoiding repetition of code that is likely to change.

Get Certified in Platform Engineering, Starting Aug. 6

- thenewstack.io platform-engineering - July 31, 2024

The new certification coursework from PlatformEngineering.org is one of the first of its kind to deliver a full training regimen in this growing IT admin role.

DigiCert to revoke SSL certificates due to domain validation oversight. Urgent action required for affected customers to prevent website disruptions.

Malware campaign targeting software developers expands to multiple platforms, using fake job interviews to deliver data-stealing malware.

Don't Let Your Domain Name Become a "Sitting Duck"

- krebsonsecurity.com - July 31, 2024

More than a million domain names -- including many registered by Fortune 100 firms and brand protection companies -- are vulnerable to takeover by cybercriminals thanks to authentication weaknesses at a number of large web hosting providers and domain registrars,…

Snowflake Data Breach Highlights SaaS Security Needs | CSA

- cloudsecurityalliance.org - July 31, 2024

ShinyHunters breached 560 million records from Snowflake via single-factor authentication, emphasizing the need for robust SaaS security measures like MFA and SSPM.

Boost your security team's efficiency with Material Security's advanced email detection. Save time, reduce false positives, and improve threat respons

Chinese APT10 group targets Japanese firms with LODEINFO and NOOPDOOR malware, Cybereason uncovers prolonged cyber espionage.

Cloud Access Management with Zero Standing Privileges | CSA

- cloudsecurityalliance.org - July 31, 2024

Discover how to enhance privileged access to cloud management consoles with zero standing privileges (ZSP) and the Time, Entitlements, and Approvals (TEA) concept for improved security and user experience.

DevOps Implementation Checklist - iheavy

- iheavy.com - July 31, 2024

Implementing DevOps in an organization can be a transformative process that aligns development and operations, improves collaboration, and accelerates the

This post demonstrates how Amazon Q Developer, a generative AI-powered assistant for software development, helps create Terraform templates. Terraform is an infrastructure as code (IaC) tool that provisions and manages infrastructure on AWS safely and predictably. When used in an integrated development environment (IDE), Amazon Q Developer assists with software development, including code generation, explanation, […]

Development teams adopt DevOps practices to increase the speed and quality of their software delivery. The DevOps Research and Assessment (DORA) metrics provide a popular method to measure progress towards that outcome. Using four key metrics, senior leaders can assess the current state of team maturity and address areas of optimization. This blog post shows […]

Over 107,000 malicious Android apps have been discovered stealing OTPs from SMS messages, targeting over 600 global brands.

Russian and Moldovan companies targeted by XDSpy phishing campaign, deploying DSDownloader malware, amid escalating cyber conflicts.

Dating Material - DevOps.com

- devops.com - July 31, 2024

Wealth is in the eye of the beholder Wealth is in the eye of the beholder.

Meta settles $1.4 billion lawsuit with Texas over illegal biometric data collection, marking a significant victory for user privacy rights.

Lightrun has added a runtime debugging tool that makes use of generative AI to identify the root cause of issues in runtime environments.

An analysis of alerts, code repositories and real-world applications finds high risk to supply chains are commonplace.

ZEST Security has launched a platform that leverages generative AI to remediate code created using infrastructure-as-code (IaC) tools.

Debian Retools APT for Superior Dependency Management

- thenewstack.io ci-cd - July 30, 2024

DebConf/24: As dependency trees get more complicated, and provide more opportunity for security holes, a Debian engineer is revising APT to make better decisions about which packages to update.

Organizations use remote access solutions for secure remote user access to resources hosted on their internal networks. This post shows various deployment models to integrate AWS Network Firewall with AWS Client VPN. AWS Client VPN is a managed client-based VPN service that secures access to your AWS resources, and resources in your on-premises network, over […]

Attention gRPC community! Mark your calendars for August 27th, 2024, as gRPConf returns to the Google Cloud Campus in Sunnyvale, California. The schedule is now live! This is your chance to dive deep…

The Score infrastructure-centric development tool helps developers focus on getting their workload running easily and not getting distracted by infrastructure concerns.

Learn how to implement Amazon EKS monitoring and alerting using a custom solution that automates EKS observability capabilities for dynamic performance metrics.

How to centralize log management with Cloud Logging

- GCP devops/sre blogs - July 30, 2024

Follow these best practices when using Cloud Logging to centralize and manage logs from diverse sources.

Many customers use Amazon Security Lake to automatically centralize security data from Amazon Web Services (AWS) environments, software as a service (SaaS) providers, on-premises workloads, and cloud sources into a purpose-built data lake in their AWS accounts. With Security Lake, customers can choose between native AWS security analytics tools and partner security information and event […]

This week's Kubestronaut in Orbit, Kolawole Olowoporoku wears many hats in his role as a Senior Site Reliability Engineer at SEKAI. Kolawole has a passion for learning and for open source and lives in…

How to Prevent Costly SaaS Misconfigurations | CSA

- cloudsecurityalliance.org - July 30, 2024

Discover how to prevent costly SaaS misconfigurations and secure your organization's sensitive data. Learn from real-life examples and get expert recommendations for robust SaaS security.

Earlier this year, AWS Systems Manager Parameter Store launched a feature that now allows you to share advanced parameters with other AWS accounts, enabling you to centrally manage your configuration data in a multi-account environment. Today, many customers have workloads in multiple AWS accounts that require shared, synchronized configuration data. Now, you can maintain a […]

Las Vegas, Nevada, 30th July 2024, CyberNewsWire

Mandrake spyware found in five Google Play Store apps. Over 32,000 downloads before detection. Advanced evasion techniques used.

The Future of Compliance and Risk Management | CSA

- cloudsecurityalliance.org - July 30, 2024

Delve into the significant technological and regulatory changes that organizations need to prepare for to ensure resilient risk management strategies.

The Power and Peril of RMM Tools

- thehackernews.com - July 30, 2024

Discover real-world examples of RMM exploits and learn how to protect your organization from these attacks.

Explore the latest cybercrime trends and threat intelligence from the dark web. Learn how to safeguard your organization.

Cybersecurity researchers detail phishing campaigns targeting SMBs in Poland, deploying malware like Agent Tesla and Formbook.

Streamline ISO 27001 Certification | CSA

- cloudsecurityalliance.org - July 30, 2024

Navigating ISO 27001 certification can be challenging. Learn how to avoid common pitfalls and streamline the process for a smoother path to achieving this comprehensive security standard.

SideWinder targets maritime facilities in the Indian Ocean and Mediterranean, using spear-phishing and Microsoft Office exploits.

Discover the latest OneDrive phishing scam targeting users worldwide. Learn how cybercriminals exploit social engineering to spread malware through cl

VMware ESXi flaw CVE-2024-37085 actively exploited by ransomware groups to gain admin access and deploy malware.

Amazon Web Services (AWS) is pleased to announce that we have revalidated our AAA rating for the Pinakes qualification system. The scope of this requalification covers 171 services in 31 global AWS Regions. Pinakes is a security rating framework developed by the Spanish banking association Centro de Cooperación Interbancaria (CCI) to facilitate the management and […]

I'm always amazed by the talent and passion of our Amazon Web Services (AWS) community members, especially in their efforts to increase diversity, equity, and inclusion in the tech community. Last week, I had the honor of speaking at the AWS User Group Women Bay Area meetup, led by Natalie. This group is dedicated to […]

Fever is the leading global live-entertainment discovery platform, and it has helped millions of people discover the best experiences in their cities since 2014. With a mission to democratize access to culture and entertainment in real life through its platform, Fever inspires users to enjoy unique local experiences and events, from immersive exhibitions, interactive theatrical […]

This post is written by Dhiraj Mahapatro, AWS Principal Specialist SA, Serverless. AWS Step Functions provides enhanced security with a customer-managed AWS KMS key. This allows organizations to maintain complete control over the encryption keys used to protect their data in Step Functions, ensuring that only allowed principals (IAM role, user, or a group) have access […]

Acronis warns of critical security flaw in Cyber Infrastructure product being exploited. Patch released for vulnerable versions. Users urged to update

IAM group authentication with Cloud SQL for PostgreSQL

- GCP security blogs - July 29, 2024

Learn about the benefits of IAM group authentication, its use cases, and how to start using IAM group authentication with Cloud SQL for PostgreSQL and Cloud SQL for MySQL.

This blog post is the second of a two-part series where we show you how to respond to a specific incident by using Amazon Security Lake as the primary data source to accelerate incident response workflow. The workflow is described in the Unintended Data Access in Amazon S3 incident response playbook, published in the AWS […]

Anyone who has worked with Microsoft Active Directory Domain Services (AD DS) and domain-joined workloads in the past likely knows how critical proper DNS resolution is to healthy operations. Even if you haven't worked with AD DS workloads, if you are reading this post, you have likely heard of some outage that was caused by […]

Member post by Dwayne McDaniel, GitGuardian Leaked credentials, aka secrets, are an easy way for bad actors to gain access to your environments and data. While no one intends to leave these valuable…

Introduction Many organizations with workloads hosted on AWS leverage the advantage of AWS services like AWS CloudFormation, AWS CodeDeploy, and other AWS developer tools while integrating with their existing development workflows. These customers seek to maintain their preferred version control systems, such as GitHub, and continue using their established continuous integration and continuous deployment (CI/CD) […]

Testing code is a fundamental step in the field of software development. It ensures that applications are reliable, meet quality standards, and work as intended. Automated software tests help to detect issues and defects early, reducing impact to end-user experience and business. In addition, tests provide documentation and prevent regression as code changes over time. […]

Hackers exploit misconfiguration in Proofpoint email security, sending millions of spoofed emails in a massive phishing campaign dubbed EchoSpoofing.

Enhancing Security: Change Healthcare Breach | CSA

- cloudsecurityalliance.org - July 29, 2024

The Change Healthcare breach highlights the need for robust MFA and comprehensive identity security. Learn how to protect both human and non-human identities effectively.

Discover how searchable encryption is revolutionizing data security, protecting sensitive data from breaches while keeping it usable

Determining the Data Attack Surface for Snowflake | CSA

- cloudsecurityalliance.org - July 29, 2024

Enterprises using Snowflake, or any other SaaS service, must determine which users have MFA turned on & what sensitive data those users have access to.

IBM's multi-billion dollar deal to buy HashiCorp has left the hybrid cloud industry guessing what the future holds in store for the provider.

Discover how cybercriminals exploit GitHub for malware distribution, netting $100K in a year. Learn about the 'Stargazers Ghost Network' and its impac

Gh0st RAT delivered via evasive Gh0stGambit in drive-by downloads, targeting Chinese-speaking Windows users with fake Chrome installers.

Weekly DevOps jobs report from DevOps.com with highlighted opportunities, including the latest engineer roles at Roche and GSK.

AWS extends existing operational/management capabilities to simplify multicloud oversight. Learn about their approach, recent hybrid/multicloud service launches (18 in 2023), and helpful resources.

Azure DevOps Services is a comprehensive suite of development tools provided by Microsoft, designed to facilitate collaboration and streamline the software

How To Run WebAssembly on Kubernetes

- thenewstack.io kubernetes - July 28, 2024

Wasm functions can scale from zero instances to hundreds of thousands of instances in the blink of an eye — and then back down to zero again just as fast.

Can Cilium Be a Control Plane Beyond Kubernetes?

- thenewstack.io service-mesh - July 28, 2024

Thomas Graf, co-creator of Cilium, discusses how the eBPF-based tool fits in the broader networking landscape.

SRE Weekly Issue #435 – SRE WEEKLY

- sreweekly.com - July 28, 2024

CrowdStrike released a lot more discussion about what happened widetailth their bad deployment, and yet there's still a frustrating lack of detail on the actual cause of the blue screens.

Second-class interactions are a first-class risk

- surfingcomplexity.blog - July 27, 2024

Below is a screenshot of Vizceral, a tool that was built by a former teammate of mine at Netflix. It provides a visualization of the interactions between the various microservices. Vizceral uses mo…

How to Use Self-Healing Code to Reduce Technical Debt

- thenewstack.io devops - July 27, 2024

The idea of self-healing code with LLMs is exciting, but balancing automation and human oversight is still crucial.

Discover how a malicious PyPI package targets macOS users' Google Cloud credentials. Learn about the sophisticated attack and its implications.

French authorities lead European operation to remove PlugX malware from infected systems, collaborating with Europol and cybersecurity firm Sekoia.

Incidents as keys to a lot of value

- surfingcomplexity.blog - July 27, 2024

One of the workhorses of the modern software world is the key-value store. there are key-value services such as Redis or Dynamo, and some languages build key-value data structures right in to the l…

Google says it recently fixed an authentication weakness that allowed crooks to circumvent email verification needed to create a Google Workspace account, and leverage that to impersonate a domain holder to third-party services that allow logins through Google's "Sign in with…

Zero Trust: Key Concepts for Modern Security | CSA

- cloudsecurityalliance.org - July 26, 2024

Explore the evolution of Zero Trust and its modern concepts like Confidence with Validation, Protect Surface, and Trust Boundaries. Learn how these principles can enhance your security strategy.

However, the headaches for the vendor and users continue, from cyber insurance and cyberthreats to Congress and criticism.

Can AI Truly Transform the Developer Experience?

- thenewstack.io devops - July 26, 2024

If your goal is to improve developer experience, your first step should always be to ask your developers how things can be improved.

Building a certificate authority (CA) hierarchy using AWS Private Certificate Authority has been made simple in Amazon Web Services (AWS); however, the CA tree will often reside in one AWS Region in one account. Many AWS customers run their businesses in multiple Regions using multiple AWS accounts and have described the process of creating a […]

Member post by Sergey Pronin, Percona Kubernetes launched in June 2014 – since then, it has played a huge part in popularizing cloud-native application designs and supporting more microservices…

Ravel Expands DevOps Offerings With Bare Metal Solution

- thenewstack.io devops - July 26, 2024

An addition to a content-building platform enables IT and DevOps teams to automate the preparation and deployment of customized images to any machine on a network.

Spanish cybercrime group GXC Team bundles phishing kits with malicious Android apps, targeting banks worldwide with AI-powered phishing platform.

Top 4 Non-Human Identity Use Cases | CSA

- cloudsecurityalliance.org - July 26, 2024

Discover the top four non-human identity (NHI) use cases crucial for security teams, including lifecycle management, secret scanning, third-party risk, and breach response.

Offensive AI: The Sine Qua Non of Cybersecurity

- thehackernews.com - July 26, 2024

Explore the evolution of cybersecurity from the Creeper virus to offensive AI, shaping future defenses.

Data Privacy in the Age of AI: Key Strategies | CSA

- cloudsecurityalliance.org - July 26, 2024

AI raises significant data privacy concerns. Companies must implement robust security, transparency, and accountability measures to protect user data and comply with industry standards.

The cloud oligopoly represents a potentially overlooked area in which businesses must assess their supply chain commitments.

U.S. DOJ indicts North Korean hacker for ransomware attacks on U.S. hospitals, offers $10M reward for information.

Now is the time to engage your SDLC stakeholders and begin the journey of securing your development pipelines.

Discover how the SeleniumGreed campaign exploits exposed Selenium Grid services for crypto mining, posing risks to automated testing frameworks.

CrowdStrike warns of targeted phishing campaign exploiting recent update incident. New threat actor targets German customers with fake installer.

Progress Software urges users to update Telerik Report Server due to a critical security flaw (CVE-2024-6327) with a CVSS score of 9.9.

Platform Engineering Can Help Your Security Team, Too

- thenewstack.io platform-engineering - July 25, 2024

Platform engineering is supposed to solve a lot of the challenges developers face. In my experience, it can also improve an organization's security.

This post assumes a certain level of technical knowledge, including familiarity with DNS terminology, Wireshark, and Amazon Route 53 Resolver endpoints. Introduction The Domain Name System (DNS) is a critical service underpinning nearly the entire internet. As nearly every application begins with DNS resolution, a highly available and performant DNS architecture is crucial for application […]

Querying data efficiently and effectively has become a critical capability for customers across industries. By querying data, customers can filter the contents of data, retrieving only the subset of data that they need. Customers need the ability to query and retrieve specific subsets of data relevant to their current needs or objectives. By extracting information […]

Building with AWS requires you to interact with and manipulate your AWS resources, whether it's to manage infrastructure, deploy applications, or troubleshoot issues and many AWS customers use AWS Cloud9 to do so today. However, developers want the ability to work with AWS resources within their own Integrated Development Environment (IDE) because it allows them […]

Customers can migrate their AWS CodeCommit Git repositories to other Git providers using several methods, such as cloning the repository, mirroring, or migrating specific branches. This blog describes a basic use case to mirror a repository to a generic provider, and links to instructions for mirroring to more specific providers. Your exact steps could vary […]

Member post originally published on the Mia-platform blog by Graziano Casto The information and communication technology sector alone contributes around 1.4% of global emissions…

The threat group Stargazer Goblin is using a novel method for spreading malware by giving fake accounts a veneer of legitimacy.

North Korean hackers expand from espionage to ransomware attacks, targeting critical infrastructure and infiltrating US companies with stolen identiti

Backslash Security has added the ability to simulate upgrades to a higher version of an application, for scanning code and creating SBOMs.

Advanced Strategies for Effective Patch Management | CSA

- cloudsecurityalliance.org - July 25, 2024

Discover why effective patch management remains a challenge and how innovative strategies like zero trust and data-centric approaches can enhance cybersecurity.

86% of IT professionals with Java expertise are migrating some portion of their applications to an open-source edition of the Java platform

Explore six essential application security testing methods to keep your software secure and compliant.

Incident Response in Cloud Security | CSA

- cloudsecurityalliance.org - July 25, 2024

Most organizations have an incident response plan to govern how they will investigate a cybersecurity attack, but the cloud presents distinct differences.

Discover the importance of browser security in modern enterprises and learn new strategies to protect your organization.

Meta removes 63,000 Instagram accounts in Nigeria for financial sextortion, exposing a cybercrime network targeting adults and minors.

A survey of software engineers shows 72% adopt generative AI capabilities somewhere in the development process, with 48% using them daily.

Tenable discloses a vulnerability in Google Cloud Functions, allowing unauthorized access to sensitive data and services

Invest in people, processes and tools to ensure that you will never need to explain why a bug in one small file impacted the entire world.

Docker warns of critical flaw in Engine versions, allowing attackers to bypass authorization. Patch available. Users urged to update immediately

ISC releases patches for BIND 9 DNS software to fix vulnerabilities preventing denial-of-service attacks

Google Chrome introduces detailed security warnings and automatic deep scans for Enhanced Protection users to enhance download safety.

In this blog post, we will build a custom automation document for resolving the non-compliant resource status through AWS Systems Manager Automation. Building an AWS Systems Manager (SSM) document using Amazon Q developer involves creating a JSON or YAML document that defines the desired state of your managed instances in AWS. SSM documents are used […]

Today, we're pleased to announce the general availability of the Observability Matters on Amazon Web Services GameDay. AWS GameDay is a gamified learning event that challenges participants to use AWS solutions to solve real-world technical problems in a team-based setting. Unlike traditional workshops, GameDays are open-ended and non-prescriptive to give participants the freedom to explore and think outside […]

Leveraging Keptn for Automated SLO Analysis

- thenewstack.io observability - July 24, 2024

Learn how to use the open source tool Keptn Lifecycle Toolkit and its new Analysis feature to define, store and prioritize service-level objectives.

Most web services rely on DNS to resolve names to IP addresses and sometimes other pieces of information. Amazon Route 53 provides highly available and scalable recursive DNS resolution, domain registration, and authoritative DNS-hosted zones that include health check capabilities and a broad array of routing capabilities. When using Amazon Route 53, you can scale […]

Coralogix has extended the reach of its observability platform to add real-time user monitoring (RUM) capabilities for mobile applications.

Building a zero CVE strategy

- cncf.io - July 24, 2024

Member post originally published on the Kubesimplify blog by Kunal Verma With the increase in software complexity and as digital threats evolve (as discussed in our previous blog) in today's digital…

In this post, we guide you through five common components of efficient code debugging. We also show you how Amazon Q Developer can significantly reduce the time and effort required to manually identify and fix errors across numerous lines of code. With Amazon Q Developer on your side, you can focus on other aspects of […]

A tool for validating Rapid Response Content updates to the Falcon software improperly let one with "problematic content" get through.

These focus areas and KPIs will provide structure to your approach and help you to improve developer experience (DevEx).

Asking the Right Questions About ASPM | CSA

- cloudsecurityalliance.org - July 24, 2024

In the next two years, do you plan to adopt an Application Security Posture Management (ASPM) solution? Here are answers to the top questions people ask.

How To Get Started Running Small Language Models at the Edge

- thenewstack.io edge-computing - July 24, 2024

How to set up Ollama on the Jetson Orin Developer Kit — a key step in configuring federated language models spanning the cloud and the edge.

Telegram fixes zero-day flaw that allowed malware disguised as videos. Hamster Kombat's popularity sparks malicious copycats.

DevOps for machine learning and artificial intelligence, known as MLOps, evolves to meet the demands of the AI landscape.

Discover how SafeBase's Trust Center platform reduces the need for security questionnaires, saving time and costs.

Next Steps After Deciding on a Penetration Test | CSA

- cloudsecurityalliance.org - July 24, 2024

Deciding on a penetration test is a significant step. Learn the next steps for enhancing cybersecurity, meeting client requests, and satisfying compliance requirements.

Patchwork hackers target Bhutan with Brute Ratel C4 and PGoShell. New tactics include impersonation and red teaming software in sophisticated cyber es

Discover how Nudge Security helps manage SaaS apps, cut costs, and improve security in your organization.

CrowdStrike's faulty update caused a widespread Windows device crash, impacting millions. The company is improving its error handling and testing proc

CISA adds two security vulnerabilities to its Known Exploited Vulnerabilities catalog, urging federal agencies to address them by August 13, 2024.

Microsoft patches Defender flaw exploited to deliver info stealers ACR, Lumma, Meduza in global campaign

Expect it most when you expect it least

- surfingcomplexity.blog - July 24, 2024

Homer Simpson: philosopher Yesterday, CrowdStrike released a Preliminary Post-Incident Review of the major outage that happened last week. I'm going to wait until the full post-incident revie…

Phish-Friendly Domain Registry ".top" Put on Notice

- krebsonsecurity.com - July 23, 2024

The Chinese company in charge of handing out domain names ending in ".top" has been given until mid-August 2024 to show that it has put in place systems for managing phishing reports and suspending abusive domains, or else forfeit its…

Cybersecurity Training Programs for Your Entire Team | CSA

- cloudsecurityalliance.org - July 23, 2024

CSA's cybersecurity training programs provide the cloud security expertise your organization needs to stay secure. Learn more about the packages offered.

How To Run Databases in Kubernetes

- thenewstack.io kubernetes - July 23, 2024

Many people successfully run their databases in Kubernetes, and the number of such deployments is growing daily.

UC Berkeley migrates to Filestore for JupyterHub

- GCP storage blogs - July 23, 2024

By migrating to Filestore, UC Berkeley's data science team has enjoyed a new level of stability and performance for its for its JupyterHub deployment.

Building a search engine with GKE and Vertex AI

- GCP containers blogs - July 23, 2024

Learn about a low-code search architecture built on GKE and with Vertex AI Agent Builder that fetches, processes, and content from RSS feeds.

The Llama 3.1 models are a collection of 8B, 70B, and 405B parameter size multilingual models that demonstrate state-of-the-art performance on a wide range of industry benchmarks, offering new capabilities for your generative AI applications.

Member post originally published on the Cerbos blog by Omu Inetimi In recent times, security in modern applications cannot be overemphasized. It is extremely important to ensure our applications have…

Sure! It's uhh… a bit of a long story though heh. It began in late 2013 when Jeefy (Jeff Sica, also a CNCF employee) and I were developing our own container scheduler using LXC, a sort of precursor to…

PSO & AI: The Future of Adaptive Cybersecurity | CSA

- cloudsecurityalliance.org - July 23, 2024

Explore a novel cybersecurity approach that blends Particle Swarm Optimization (PSO) with AI, swiftly responding to evolving attack vectors.

5 Agile Techniques To Help Avoid a CrowdStrike-Like Issue

- thenewstack.io devops - July 23, 2024

We look at how the techniques of Agile can play a vital part in the discovery and confrontation of issues like the CrowdStrike controversy.

How To Backup Jenkins Data and Configurations

- devopscube.com - July 23, 2024

It is very important to have Jenkins backup with its data and configurations. It includes job configs, builds

In this blog post, we present an augmented approach of managing AWS Cloud WAN segments in a secure, scalable, and on-demand way. When your organization increases the number of AWS accounts and AWS Regions in use, operational and security complexities related with admitting new user-created virtual private clouds (Amazon VPCs) to the network also increase—from […]

Chinese hackers target Taiwan and US NGO with advanced malware. Daggerfly group upgrades cyber arsenal for espionage, exploiting vulnerabilities.

Enhance Compliance with Continuous Controls Monitoring | CSA

- cloudsecurityalliance.org - July 23, 2024

Discover how Continuous Controls Monitoring (CCM) leverages automation and real-time data to enhance compliance and security, streamlining GRC efforts and improving your organization's security posture.

Observability Takes Flight With Cloud Canaries

- thenewstack.io kubernetes - July 23, 2024

Just out of stealth, the startup offers lightweight agents, a neural network, and an open platform as a cheaper, faster, and more efficient alternative to established tool providers.

SCW today added an agent to its portfolio of application security that assesses the security competency of developers as they commit code.

Discover FrostyGoop, a new ICS malware targeting energy sectors. Learn about its Modbus TCP exploitation and impact on critical infrastructure.

Secure employee onboarding by eliminating temporary passwords. Discover how Specops' First Day Password enhances cybersecurity from day one.

European Commission challenges Meta's 'pay or consent' model, giving until September 2024 to address concerns or face potential sanctions.

Hackers use swap files to hide skimmers on e-commerce sites, capturing credit card data and evading detection.

CERT-UA warns of Russian-linked cyberattacks on Ukrainian research institutions using HATVIBE and CHERRYSPY malware. APT28 suspected behind sophistica

Image Recognition - DevOps.com

- devops.com - July 23, 2024

An NVIDIA H100 card, typical for AI work, costs $29,449.95 on Amazon. Go figure.

In this Jenkins tutorial, I explained the detailed steps to set up Jenkins master and scale Jenkins build

Google abandons plans to phase out third-party cookies in Chrome, opting for user choice amid privacy concerns and regulatory scrutiny.

A still, small sound

- surfingcomplexity.blog - July 23, 2024

One of the benefits of having attended a religious elementary school (despite being a fairly secular one as religious schools go) is exposure to the text of the Bible. There are two verses from the…

This post is written by Vignesh Selvam (Senior Product Manager – Amazon MQ), Simon Unge (Senior software development engineer – Amazon MQ). Amazon MQ for RabbitMQ announced support for quorum queues, a type of replicated queue designed for higher availability and data safety. This post presents an overview of this queue type, describes when you […]

Momento: Caching at Scale and More, Without All the Hassle

- thenewstack.io storage - July 22, 2024

Former DynamoDB team, which set out to simplify caching for developers, adds Topics pub/sub messaging pipeline.

AWS Secrets Manager is a service that helps you manage, retrieve, and rotate database credentials, application credentials, OAuth tokens, API keys, and other secrets throughout their lifecycles. You can use Secrets Manager to replace hard-coded credentials in application source code with a runtime call to the Secrets Manager service to retrieve credentials dynamically when you […]

3 Ways To Improve Your Container Build Process

- thenewstack.io containers - July 22, 2024

To replace an image layer on a central registry and have all the running images update individual layers is a handy protocol.

Organizations running high-performance computing (HPC) workloads on premises often want to move data to the cloud to leverage scalability, performance, cost optimization, and other benefits of the cloud. For edge locations with limited or no available network bandwidth, online migrations can take a long time or be impossible. In locations where there is limited bandwidth […]

Last week, AWS Heroes from around the world gathered to celebrate the 10th anniversary of the AWS Heroes program at Global AWS Heroes Summit. This program recognizes a select group of AWS experts worldwide who go above and beyond in sharing their knowledge and making an impact within developer communities. Matt Garman, CEO of AWS […]

Spanner dual-region configurations for data residency

- GCP security blogs - July 22, 2024

New Spanner dual-region configurations in Australia, Germany, India, and Japan span two different regions within the same country.

Livex AI build AI agents on GKE infrastructure

- GCP containers blogs - July 22, 2024

LiveX AI chose Google Kubernetes Engine (GKE) to deploy and operate containerized AI applications at scale.

Zero Trust Research Working Group Interview | CSA

- cloudsecurityalliance.org - July 22, 2024

CSA Zero Trust Working Group Member, Vaibhav Malik, shares his insights on Zero Trust and his tips for advancing in the cybersecurity industry.

A Chinese crime syndicate, Vigorish Viper, uses an advanced cyber suite to run a cybercrime network, including illegal gambling and human trafficking.

Latin American hackers exploit cloud services for phishing and malware distribution. Google warns of serverless computing abuse and takes action again

Cloud Identity Security: Strategies for Protecting Data | CSA

- cloudsecurityalliance.org - July 22, 2024

"Attackers don't break in. They log in." Learn how to secure cloud environments with a focus on identity security, zero standing privileges, and the shared responsibility model.

Enhance your organization's security with Tines' AI-powered SMS analysis workflow, preventing phishing and malware attacks

Learn how to create effective vCISO reports that enhance client engagement and demonstrate cybersecurity value.

SocGholish malware campaign exploits BOINC project, infecting thousands of computers. AsyncRAT and V8 JavaScript used to evade detection in sophistica

Our weekly report of some great job opportunities for DevOps professionals, including engineer roles at Google and Walmart.

Play ransomware's new Linux variant targets VMWare ESXi, expanding its reach. US leads in victims, with manufacturing and services most affected.

In this blog, I have given the step by step tutorial to deploy Jenkins as StatefulSet on the

SRE Weekly Issue #434 – SRE WEEKLY

- sreweekly.com - July 21, 2024

The big news this week, of course, is the CrowdStrike-related series of outages in airports, banks, and many other businesses. Here's their statement on the situation.

CrowdStrike warns of Remcos RAT malware targeting Latin America amid flawed update crisis causing IT disruptions.

Teen arrested in UK for links to global cybercrime group. Suspected Scattered Spider member connected to MGM Resorts hack.

Community post by Andrés Vega, CNCF TAG Security Recent events involving CrowdStrike's Falcon security software have underscored a critical lesson across the industry : the importance of having a…

The Cloud Storage client library transfer manager improves throughput by allowing client libraries to parallelize uploads and downloads.

Cyber Public Health: A new approach to cybersecurity

- GCP security blogs - July 19, 2024

Cyber Public Health is a new take on cybersecurity that applies lessons from public health to cyber. Learn how Google Cloud is involved with this new approach.

Learn how to implement user authentication in your GenAI app-accessing database. This step-by-step guide will help you safeguard your AI applications.

Teradata is a leading cloud data analytics provider with two high performance data processing and analytics solutions: VantageCloud Enterprise and VantageCloud Lake. These Teradata solutions are backed by a Massively Parallel Processing (MPP) database and a shared-nothing architecture where each node operates independently with dedicated resources such as CPU, memory, and storage. Teradata uses Amazon […]

Airlines, hospitals, banks and other businesses were disrupted when a faulty software update knocked Windows users of their systems.

A faulty software update from cybersecurity vendor Crowdstrike crippled countless Microsoft Windows computers across the globe today, disrupting everything from airline travel and financial institutions to hospitals and businesses online. Crowdstrike said a fix has been deployed, but experts say…

Enhance AI Reliability: LLM Observability & Trust API | CSA

- cloudsecurityalliance.org - July 19, 2024

Large Language Models bring significant security challenges. Explore how a proposed LLM Observability & Trust API can help ensure responsible AI usage.

Platform Engineering: It Is All About the Tooling

- thenewstack.io devops - July 19, 2024

For platform engineering success, IT admins must start by selecting and providing the best combinations of tools for the developer teams inside their operations.

Russian nationals plead guilty in US court for LockBit ransomware attacks. Learn about their roles, victims, and potential sentences in this cybercrim

CrowdStrike's faulty Windows update causes global disruptions, impacting various sectors. Fix deployed; recovery in progress.

Recent NHI Attacks: Insights and Recommendations | CSA

- cloudsecurityalliance.org - July 19, 2024

Stay ahead of non-human identity (NHI) attacks with insights from recent high-profile breaches. Learn how to secure your organization with key recommendations and best practices.

Quali has added a generative artificial intelligence (AI) capability to its Torque platform for managing infrastructure-as-code.

Discover the importance of identity intelligence in mitigating cyber threats and protecting sensitive data. Learn how Cybersixgill can help secure you

Assessment Framework for Anything as a Service (XaaS) | CSA

- cloudsecurityalliance.org - July 19, 2024

Learn about the Enterprise Authority to Operate Controls Framework, an assessment framework that targets small Anything-as-a-Service (XaaS) providers.

Pro-Houthi group OilAlpha targets Yemen humanitarian organizations with Android spyware, posing a significant cyber threat to aid efforts.

Summary of "AI Leaders Spill Their Secrets" Webinar

- thehackernews.com - July 19, 2024

To provide a concise and comprehensive summary of the "AI Leaders Spill Their Secrets" webinar, highlighting key speakers, discussions, and insights.

The integration of artificial intelligence (AI) into Azure DevOps pipelines transforms the manual software development and delivery process.

Chinese hacking group APT41 targets global industries in six countries, using sophisticated tactics to steal sensitive data in prolonged cyber attacks

SolarWinds releases critical security patches for Access Rights Manager software to prevent potential data breaches and code execution.

A survey of software engineering professions has uncovered disconcerting signs of software supply chain insecurity.

WazirX crypto exchange loses $230M in hack. North Korean actors suspected. UN probes similar attacks.

Surveys find developers (over two-thirds) said they are losing eight or more hours of the week to inefficiencies, with managers aware.

What Does It Mean to Keep Clusters Lean?

- thenewstack.io devops - July 18, 2024

Following the lean approach can help us significantly improve Kubernetes ROI, improve workload performance, and save time spent on maintenance and troubleshooting.

Learn how to deploy hybrid transactional and analytical services with Bigtable features like data boost, request priorities and write flow control.

Enroll in Google Cloud's Modern SecOps Masterclass on Coursera. Learn to enhance and streamline your security operations.

With new node types, lower costs, license portability and incentives, it's a great time to move your VMware workloads to Google Cloud VMware Engine.

Turkish is spoken by 100 million speakers and is the most widely spoken language of the Turkic language family that is spoken by 200 million speakers world wide. Turkish is native to Türkiye…

Researchers uncover HotPage adware module masquerading as ad blocker, installing malicious kernel driver for elevated Windows access and browser.

In this guide, I have listed the popular DevOps certifications, along with top choices, so you can choose

10 Essential Security Questions for Vendor Review | CSA

- cloudsecurityalliance.org - July 18, 2024

Ensure your vendors align with your security goals. Use these 10 essential questions to evaluate potential vendors' security practices and mitigate risks effectively.

Automated testing and mocking need to be the most prioritized area in your SDLC to eliminate friction for your developer team.

Join our free webinar to learn how to transform developers into security champions and improve your AppSec posture.

Travel industry hit by 21% bot attack surge in 2023. Learn about the rising bot threats and security strategies

Secure SaaS: Lessons from the Twilio Authy API Breach | CSA

- cloudsecurityalliance.org - July 18, 2024

Twilio's Authy API breach underscores the need for robust MFA security. Learn steps to harden, detect, and educate against evolving cyber threats targeting SaaS applications.

Integrating threat modeling into the DevOps workflow is essential to identify and mitigate potential security threats.

Discover how SAP AI Core vulnerabilities could expose customer data and lead to supply chain attacks. Learn about the 'SAPwned' flaws and their impact

Discover how global organizations are targeted by a cyber espionage campaign using open-source tools.

Tricentis today revealed it has acquired SeaLights, a provider of a SaaS platform that uses ML algorithms to keep track of changes to code.

Valory has launched an AI agent that is specially designed to act as a software engineer for building multiple types of agents.

Meta suspends AI use in Brazil after data authority's ban. Privacy concerns rise as personal data for AI training faces scrutiny globally.

Cisco patches critical SSM On-Prem flaw. CISA adds three actively exploited vulnerabilities to KEV catalog. Federal agencies given August 7 deadline t

Businesses store large volumes of data in their data lakes and rely on this data to extract insights and make important business decisions. However, business stakeholders sometimes lack the technical skills required to run complex queries against their data lakes. Instead, they rely on data scientists or analysts to build reports and dashboards or to […]

AppsFlyer is a global leader in mobile attribution and marketing analytics. AppsFlyer helps businesses understand the impact and their marketing efforts across every channel and device, through a comprehensive measurement platform and privacy cloud that fosters ecosystem collaboration while preserving customers' privacy. Within AppsFlyer, data is the core, it gives the ability to expose detailed […]

North Korean hackers update BeaverTail malware to target macOS users through fake MiroTalk app, expanding cyber espionage campaign against job seekers

Introduction In today's dynamic business landscape, operational efficiency and cost optimization are two critical ingredients for a successful business outcome. This is especially true for companies navigating through digital transformation. In 2020, Thomson Reuters (TR), a leader at the intersection of content and technology with trusted data, committed to a cloud-first strategy with Amazon Web […]

AWS Audit Manager introduced the AWS common controls library to help Governance, Risk and Compliance (GRC) teams efficiently map their enterprise controls into Audit Manager for evidence collection. The common controls library provides customers with a simpler way to collect evidence that supports overlapping controls across multiple compliance standards, streamlining the evidence collection process, reducing […]

Announcing GKE extended support

- GCP containers blogs - July 17, 2024

With GKE extended support, you can receive support for a specific GKE minor version for up to 24 months.

Interval tree implementation in Xline

- cncf.io - July 17, 2024

The Reason for Implementing Interval Trees In a recent refactoring of Xline, we identified a performance bottleneck caused by two data structures on the critical path: the Speculative Pool and the…

VMware's 'Private Cloud' Solution Emerges Under Broadcom

- thenewstack.io networking - July 17, 2024

The company detailed several features, including VMware Cloud Foundation's management, in line with hyper-convergence and combining storage operations environments under a single umbrella, uniting or "de-siloing" them.

New Cloud Security Guidance | CSA

- cloudsecurityalliance.org - July 17, 2024

CSA's Security Guidance v5 is here! Learn about the differences from v4, what's included, and how it helps you achieve more secure cloud computing.

FIN7 cybercrime group evolves tactics, advertises ransomware tool, and updates AvNeutralizer with new capabilities to evade security solutions.

Accidental insiders pose serious cybersecurity risks. Learn how to mitigate these threats with training and proactive measures.

What is the Purpose of Data Access? | CSA

- cloudsecurityalliance.org - July 17, 2024

Implementing a zero trust model and understanding data location, access, and classification are essential for effective data security and compliance in today's digital landscape.

In a world of escalating cyber threats, even air-gapped clouds aren't safe. Google Distributed Cloud uses Zero Trust to transform air-gapped clouds.

Google Distributed Cloud air-gapped appliance is GA

- GCP compute blogs - July 17, 2024

The Google Distributed Cloud air-gapped appliance is an integrated hardware and software solution that lets you run workloads at the tactical edge.

Chinese hackers target Italian firms with advanced 9002 RAT malware. APT17 group launches sophisticated phishing attacks on government entities.

Mastering Leadership: Key Skills for Modern Success | CSA

- cloudsecurityalliance.org - July 17, 2024

Effective leadership is crucial for business success. Learn how to develop leadership skills, build trust, and inspire your team in today's complex work environment.

Exploring the benefits of real-time API monitoring for third-party integrations and provides a guide on implementing it effectively.

Microsoft reveals Scattered Spider's use of RansomHub and Qilin ransomware. Learn about the evolving cybercrime landscape and new ransomware threats.

Critical Apache HugeGraph vulnerability exploited in the wild. Urgent update required to prevent remote code execution attacks. Patch now available.

The CRA is a new law set to go into effect soon and serves as a framework designed to enhance the security of products including mobile apps.

How To Setup Highly Available Jenkins

- devopscube.com - July 17, 2024

This blog will discuss setting up a Highly available Jenkins using the open-source version. Before getting into the

How to Apply Microservice Architecture to Embedded Systems

- thenewstack.io edge-computing - July 16, 2024

Embedded systems — applications made up of small, dedicated computers, embedded in a particular device — require a different approach for microservices.

Data security is a top priority for customers using AWS cloud services. Based on customer input, AWS has "designed-in" methods enabling customers to automate common security workflows such as password rotation. The principals of this automation follows the AWS Well-Architected Framework which helps cloud architects build secure, high-performing, resilient, and efficient infrastructure for a variety […]

When a load balancer or proxy cannot preserve the client's original IP address, it may rewrite the IP address or use its own IP address for routing purposes. In this scenario, common practices such as inserting the original IP address into the request headers (for example, X-Forwarded-For) or utilizing Proxy protocol are widely used to […]

Private network for data movement in generative AI In this post, we cover the architecture patterns for building secure, private network connectivity for data movement in generative artificial intelligence (generative AI) using Amazon Web Services (AWS) and AWS Partner Network (APN) services. Data privacy and security are top of mind for customers exploring generative AI […]

An analysis of 2.5 million GitHub Actions workflow files from organizations and users surfaces thousands of potential vulnerabilities.

Network distributed applications at global scale

- GCP networking blogs - July 16, 2024

A prescriptive guide for building next-generation distributed applications with the Cross-Cloud Network.

This week's Kubstronaut in Orbit, Eleni Grosdouli, brings diverse experiences to her role as a DevOps Consulting Engineer at Cisco Systems. She's the go-to person for DevOps and Kubernetes Automation…

CCSK v5: Updated Cloud Security Knowledge | CSA

- cloudsecurityalliance.org - July 16, 2024

Learn about the Certificate of Cloud Security Knowledge (CCSK) v5. This cloud security training helps you and your team stay secure in the age of AI.

AWS customers often operate hundreds of applications and have to monitor and manage individual resources to make sure their applications are available, secure, cost-optimized, and performing optimally. In this blog post, we will walk through how to use Terraform to create an application for use with myApplications, add resources to new and existing applications, and strategies for scaling application management using Terraform.

Discover the details of the massive Konfety ad fraud operation leveraging 'evil twin' apps on Google Play Store

Leveraging OSCAL Automation for Risk Management | CSA

- cloudsecurityalliance.org - July 16, 2024

By integrating OSCAL with advanced technologies like AI, organizations can achieve efficient and accurate compliance processes.

Cloud Canaries emerged from stealth to provide a set of lightweight agents that leverage a neural network to monitor performance.

Learn about the growing identity-based threats in SaaS applications and how to mitigate them with ITDR and robust identity security measures

Data Breach Accountability: Who's to Blame? | CSA

- cloudsecurityalliance.org - July 16, 2024

The only way to truly protect sensitive, controlled, and private data is to fully encrypt it using the most advanced encryption methodology.

Malicious npm packages with hidden backdoor code targeting open source developers have been removed.

Iranian hacker group MuddyWater shifts tactics, deploying new backdoor BugSleep in cyberattacks targeting Middle East and European countries.

Discover how Void Banshee APT exploits Microsoft MHTML flaw to spread Atlantida stealer. Learn about the attack chain and cybersecurity implications.

By adopting IaC best practices organizations can significantly enhance their operational agility and responsiveness to changes.

Manage every cloud native deployment using a GitOps approach declarative and automated processes are baked into your business culture.

Introduction Culture Amp is an employee experience platform that provides the insights into employee engagement, performance, and development that organizations need to build a category-defining culture. Culture Amp's mission is to create a better world of work. Developer feedback loops An efficient developer feedback loop is a critical part of an effective development process – […]

CISA warns of actively exploited vulnerability in GeoServer GeoTools. Critical flaw allows remote code execution. Users urged to patch immediately.

Kaspersky exits U.S. market after Commerce Department ban citing security risks. U.S. customers advised to switch by September 29.

While website performance issues are a common occurrence, pinpointing their root causes can be a challenging task. In this post, you will learn how to simplify the performance troubleshooting process by unlocking the potential of the Server-Timing header. This header allows backend components to communicate timing metrics and other insights relevant to performance monitoring in […]

Protecting against bot threats requires insights into the client environment beyond what is available through network-level characteristics of a request, such as TCP or HTTP payload signatures. AWS WAF uses CAPTCHA and Challenge actions to undertake a client-side interaction, whether on a mobile device or browser, to understand this client environment before they can be […]

This blog covers the fundamental Jenkins architecture and its related components. If you are a beginner in Jenkins,

The Compute Flexible CUD covers Cloud Run, most GKE Autopilot Pods and the premiums for Autopilot Performance and Accelerator compute classes.

As expected, there were lots of exciting launches and updates announced during the AWS Summit New York. You can quickly scan the highlights in Top Announcements of the AWS Summit in New York, 2024. My colleagues and fellow AWS News Blog writers Veliswa Boya and Sébastien Stormacq were at the AWS Community Day Cameroon last […]

Leaked GitHub token found in Docker container could have compromised Python repositories. Malicious PyPI packages exfiltrate data to Telegram bot. Lea

At least a dozen organizations with domain names at domain registrar Squarespace saw their websites hijacked last week. Squarespace bought all assets of Google Domains a year ago, but many customers still haven't set up their new accounts. Experts say…

The EU AI Act is a legal framework that establishes obligations for AI systems based on their potential risks and levels of impact. Here's Google Cloud's proactive approach to the new law.

In this newsletter, CISO Phil Venables shines a light on the importance of security team budget discussions - and how to make them a success.

As security best practices have evolved over the years, so has the range of security telemetry options. Customers face the challenge of navigating through security-relevant telemetry and log data produced by multiple tools, technologies, and vendors while trying to monitor, detect, respond to, and mitigate new and existing security issues. In this post, we provide […]

KCD post originally published on Social Maharaj by Atulpriya Sharma Being a food and travel blogger, I often attend a lot of food meet-ups where I get to experience different dishes and meet new…

How to Regain an Enterprise-Level View of Security | CSA

- cloudsecurityalliance.org - July 15, 2024

For a holistic view of security, organizations must implement new cybersecurity workflows, automate manual processes, and foster collaboration.

This post is co-authored with Andy Suarez and Kevin Breton (from KnowBe4). This blog post continues the discussion from Event-Driven Architecture using Amazon EventBridge – Part 1. The previous post covered the adoption and design of an event-driven architecture by KnowBe4, a leading security awareness training provider. In this post, we highlight the development and […]

BEC and VEC Attacks Target Automotive Industry | CSA

- cloudsecurityalliance.org - July 15, 2024

Research reveals the automotive industry has become a popular target for business email compromise and vendor email compromise attacks. Learn why.

We're excited to announce the successful completion of the Trusted Information Security Assessment Exchange (TISAX) assessment on June 11, 2024 for 19 AWS Regions. These Regions renewed the Information with Very High Protection Needs (AL3) label for the control domains Information Handling and Data Protection. This alignment with TISAX requirements demonstrates our continued commitment to […]

CRYSTALRAY hackers infect 1,500+ victims using SSH-Snake and other tools, exploiting vulnerabilities for credential theft and cryptocurrency mining

Discover how infostealer malware threatens your data and learn steps to protect yourself from cybercriminals.

What is Non-Human Identity Management? Mastering NHIM | CSA

- cloudsecurityalliance.org - July 15, 2024

Effective Non-Human Identity Management (NHIM) is critical for securing modern digital ecosystems. Learn how to manage NHIs, mitigate risks, and enhance security posture.

The results of a survey of software developers and engineering professionals surfaces high DevOps burnout rates despite AI advances.

Highlighting five job opportunities, including DevOps engineer roles at Zoom and NetApp, for your perusal.

The Issues at Hand - DevOps.com

- devops.com - July 15, 2024

Technology's promise of better communication has led to a reality of social disconnection. Technology's promise of better communication has led to a reality of social disconnection.

Singapore banks phase out OTPs for online logins to combat phishing. Digital tokens to become mandatory within 3 months.

Discover HardBit ransomware's new version with enhanced obfuscation, passphrase protection, and unique extortion tactics. Learn about its evolving thr

The onboarding of new DevOps team members is a pivotal step in ensuring productivity and cohesion. A well-structured onboarding process helps new hires

SRE Weekly Issue #433 – SRE WEEKLY

- sreweekly.com - July 14, 2024

This article covers five skills:

IAM Roles for any workload - Digi Hunch

- digihunch.com - July 14, 2024

This post takes a deep dive into how IAM role works on EC2 instance and how IAM Role Anywhere extends the capability to any workload.

PlatformCon: What's the Impact of Platform Engineering?

- thenewstack.io platform-engineering - July 13, 2024

Building an internal developer platform can improve more than just developer productivity, according to a panel of experts at PlatformCon 2024.

Linux: Synchronize Local and Remote Directories With Rsync

- thenewstack.io storage - July 13, 2024

How do you synchronize two Linux directories on your local network? Using a combination of rsync and cron will never fail you. Here's how.

AT&T confirms major data breach affecting wireless customers. Hackers accessed call records and text interactions. Learn about the impact and security

AT&T Corp. disclosed today that a new data breach has exposed phone call and text message records for roughly 110 million people -- nearly all of its customers. AT&T said it delayed disclosing the incident in response to "national security…

Summary In this blog post, we explore an approach that leverages Windows operating system tools to extract critical metric data directly from Windows Servers. At Amazon Web Services (AWS), we offer the Migration Evaluator agentless collector and AWS Application Discovery Service to facilitate workload discovery. However, some customers run highly secure workloads where deploying assessment tools, enabling […]

Member post originally published on Devtron's blog by Abhinav Dubey TL;DR: The blog talks about how ephemeral environments with Devtron become much easier, reducing the complexities…

DarkGate malware uses Samba file shares in a short-lived campaign targeting North America, Europe, and Asia.

Australian couple arrested in Brisbane for spying on behalf of Russia, marking first espionage charges under 2018 laws.

The Importance of STAR Level 1 for Achieving Level 2 | CSA

- cloudsecurityalliance.org - July 12, 2024

Understand why obtaining CSA STAR Level 1 is critical for achieving and sustaining CSA STAR Level 2 certification.

Venue.sh has launched its own DevOps platform. Initially presented as a tool catalog for software engineering teams to access throughout their development and delivery phases, the company has lofty ambitions for extending the platform's functionality, remit and scope. Venue.sh has launched its own DevOps platform and the company has ambitions to extend the platform's functionality and scope. .

Join our webinar to learn how to protect against credential theft, the top cyber threat of 2024.

Critical Exim email server vulnerability CVE-2024-39929 discovered. Update to version 4.98 to prevent potential attacks.

Key Insights from the 2024 Verizon DBIR | CSA

- cloudsecurityalliance.org - July 12, 2024

The 2024 Verizon DBIR highlights key trends in data breaches and cyberattacks. Use this report to strengthen your security practices and become a security-first organization.

US DoJ exposes Russian AI-powered bot farm spreading disinformation. Nearly 1,000 social media accounts seized in multi-country operation.

If left unpatched, the vulnerability in the code repository could let threat actors run malicious code and access sensitive information.

By acquiring Tabular, Databricks can combine Apache Iceberg expertise with its own Delta Lake format, and promises to unify the increasingly fragmented market for data lakehouses.

Today, Amazon Web Services (AWS) announced the release of workspace context awareness in Amazon Q Developer chat. By including @workspace in your prompt, Amazon Q Developer will automatically ingest and index all code files, configurations, and project structure, giving the chat comprehensive context across your entire application within the integrated development environment (IDE). Throughout the […]

Introduction Container image tags offer a user-friendly way to manage and keep track of different versions of container images. However, they also present a security risk to organizations due to their mutable nature. Without protections in place, a container image tag can be changed in a container image repository to point to a different container […]

The traditional way customers had to interact with AWS account resources was through the AWS Management Console, SDKs, or command line interface (CLI) calls. However, these methods do not provide a quick way to gather information about AWS resources without writing scripts or navigating thought the AWS Management Console. The ability to use natural language […]

Staff post by Chris Aniszczyk Date/Time: July 11 at 8am For the last several years we have tracked open source project velocity, which has enabled us to monitor the trends and technologies that…

Discover how hackers are using sophisticated techniques to inject malware into NuGet packages, targeting developers and compromising software supply c

Palo Alto Networks patches critical vulnerabilities in its products, including authentication bypass flaws.

The Proliferation of Cybersecurity Solutions | CSA

- cloudsecurityalliance.org - July 11, 2024

Enterprises are facing a proliferation of cybersecurity tools, resulting in fragmented security. We need to regain an enterprise-level view of security.

Ambassador post originally published on Medium by Emin Alemdar We all know that Kubernetes troubleshooting is difficult and it can get pretty complex from time to time. We can easily get lost in the…

We want continuous database reliability, we want our deployments to not get blocked, applications to not fail and databases to not slow down.

Chinese APT41 group upgrades malware arsenal with DodgeBox loader and MoonWalk backdoor, employing advanced evasion techniques for cyber espionage cam

Cybersecurity at the 2024 Olympics: Preparing for Threats | CSA

- cloudsecurityalliance.org - July 11, 2024

Cyber threats loom over the 2024 Olympics, with sophisticated attacks likely from state-backed actors. Robust cybersecurity measures are critical to safeguard the Games.

OpenTelemetry (OTel) is going to do for IT operations what open-source software originally did for application development.

Affordable PAM solutions offer SMEs robust security, compliance, and threat mitigation with quick, cost-effective implementation.

Data Security: Classification Insights to Robust Controls | CSA

- cloudsecurityalliance.org - July 11, 2024

Effective data security requires understanding data context and implementing robust controls. A unified data intelligence layer enhances security, compliance, and operational efficiency.

Discover how Poco RAT, a new remote access trojan, targets Spanish-speaking industries through sophisticated phishing campaigns and Google Drive explo

Bringing together the power of LLMs with ML purpose-built for root cause analysis gives your team the best of both worlds

Critical PHP flaw CVE-2024-4577 exploited for remote access trojans, cryptominers, and DDoS botnets. Update PHP now.

GitLab, Citrix, and VMware release critical security patches. CISA warns about OS command injection flaws. Agencies recommend Zero Trust adoption.

The Stark Truth Behind the Resurgence of Russia's Fin7

- krebsonsecurity.com - July 10, 2024

The Russia-based cybercrime group dubbed "Fin7," known for phishing and malware attacks that have cost victim organizations an estimated $3 billion in losses since 2013, was declared dead last year by U.S. authorities. But experts say Fin7 has roared back…

Observability is a critical aspect for maintaining the health and performance of any distributed system. Organizations rely on data from diverse sources, including AWS services as well as third-party ISVs (independent software vendor) to gain insights into their system's health. Establishing secure connections to these diverse data sources enables visualization and analysis of observability data […]

Amazon Web Services (AWS) is pleased to announce the successful attestation of our conformance with the National Institute of Standards and Technology (NIST) Secure Software Development Framework (SSDF), Special Publication 800-218. This achievement underscores our ongoing commitment to the security and integrity of our software supply chain. Executive Order (EO) 14028, Improving the Nation's Cybersecurity […]

Store, index, retrieve, and search vectors with in-memory performance for use cases like retrieval augmentation, semantic caching, and anomaly detection through single-digit millisecond queries.

Effortlessly build apps with AI-powered low-code tools, enabling organizations to create secure custom apps in minutes without dev teams - streamlining processes like claims, inventory, and approvals.

Identity and access management may seem like a gentle hill at first, but it gets steep fast. Here's a guide to IAM terms and concepts to keep you on solid footing.

Enhance company knowledge bases with new Amazon Bedrock connectors for Confluence, Salesforce, SharePoint, and web domains - empowering RAG models with contextual data for more accurate and relevant responses.

Agents for Amazon Bedrock now offer Memory to retain user context and Code Interpreter to dynamically execute code snippets—whether for data analysis, visualization, or complex problem-solving.

Craft generative AI apps from conversations using natural language and approved data sources. Customize securely shared apps, specifying data sources per card and new APIs for programmatic app management.

Streamline your ML workflows with this generative AI assistant providing tailored guidance, code generation, and error troubleshooting, to build, train, and deploy models efficiently.

Guardrails for Amazon Bedrock adds hallucination detection and an independent API to fortify generative AI applications with customized guardrails across any model, ensuring responsible and trustworthy outputs.

Unlock hyper-relevant code suggestions tailored to your codebase; enhance productivity with Amazon Q Developer's private customization while maintaining robust data privacy and security standards.

Discussing not only the challenges and successes of DevOps but also the broader considerations essential for growth in the IT ecosystem.

Member post originally published on Greptime's blog by tison This article introduced the differences between InfluxQL, Flux, and SQL as query languages. SQL is a more common and general language for…

DevOps Embraces Observability Across Stacks for LLM Era

- thenewstack.io devops - July 10, 2024

While no one knows exactly what the impact of AI will be on software development and deployment, CI/CD, and DevOps, as the dust settles in the future, it will be up to proper observability processes, tools and practices to analyze it all.

New ransomware group EstateRansomware exploits Veeam software vulnerability, uses dormant VPN accounts for initial access, and deploys persistent back

Adopting ASPM: Enhancing Security and Efficiency by 2026 | CSA

- cloudsecurityalliance.org - July 10, 2024

By 2026, 40% of organizations will adopt ASPM to manage software security. ASPM enhances visibility, integrates tools, and streamlines remediation, ensuring robust cybersecurity.

Smash-and-Grab Extortion

- thehackernews.com - July 10, 2024

Zero-day attacks dominated 2023-2024, highlighting the urgent need for improved IoT security and isolated partitioning.

Microsoft's July update patches 143 security flaws, including five critical and two actively exploited vulnerabilities.

Discover how ITDR solutions close identity security gaps exposed by ransomware, offering real-time, multi-dimensional threat detection and response.

Third Party Vendor Assessments in the Age of LLMs | CSA

- cloudsecurityalliance.org - July 10, 2024

Explore how to adapt existing vendor assessments to gather critical information about the integration of LLMs within the organizational ecosystem.

Google introduces passkeys for high-risk users in Advanced Protection Program, expands dark web reports, and partners with Internews for global securi

Elliptic's report reveals Huione Guarantee's involvement in $11 billion worth of cyber scams and money laundering

ViperSoftX malware evolves, using eBook torrents and CLR integration to evade detection. Learn about its new tactics and how it threatens.

OpenSSH vulnerability CVE-2024-6409 found in Red Hat Linux 9 may enable remote code execution. Discover more.

Supporting file-based workloads with growing performance demands over time is a continuous challenge for organizations. As datasets expand, static infrastructure struggles to keep pace, resulting in disruptive migrations to new infrastructure. Organizations need highly scalable file storage that delivers speed at-scale today, while adapting seamlessly to future requirements. Amazon FSx for NetApp ONTAP provides fully […]

With AWS Glue's new visual interface, data teams can collaboratively build ETL pipelines, bridging the gap between analysts and engineers through an intuitive, shareable canvas.

Along with a plethora of new launches, read about the latest models in Amazon Bedrock and new features for Amazon Q.

CloudTrail data event logging enables auditing for governance and compliance of object operations like PutObject and GetObject. Leverage high performance and low cost for latency-sensitive workloads.

Microsoft Patch Tuesday, July 2024 Edition

- krebsonsecurity.com - July 09, 2024

Microsoft Corp. today issued software updates to plug 139 security holes in various flavors of Windows and other Microsoft products. Redmond says attackers are already exploiting at least two of the vulnerabilities in active attacks against Windows users.

Mirantis Builds on OpenStack To Serve Up a VMware Alternative

- thenewstack.io platform-engineering - July 09, 2024

"The world is looking for alternatives to VMware," said Shaun Omeara, the chief technology officer of Mirantis.

Discover the price performance and sustainability benefits of Graviton4 with Amazon EC2 R8g instances, ideal for memory-intensive workloads.

Least privilege is an important security topic for Amazon Web Services (AWS) customers. In previous blog posts, we've provided tactical advice on how to write least privilege policies, which we would encourage you to review. You might feel comfortable writing a few least privilege policies for yourself, but to scale this up to thousands of […]

In this post, we continue with our recommendations for achieving least privilege at scale with AWS Identity and Access Management (IAM). In Part 1 of this two-part series, we described the first five of nine strategies for implementing least privilege in IAM at scale. We also looked at a few mental models that can assist […]

AWS customers come to AWS Resilience Hub for the ability to assess their application against their Recovery Time Objectives (RTO), the maximum acceptable time an application can be in a disrupted state, and Recovery Point Objectives (RPO), the maximum amount of data that can be lost due to disruption. Although customers come for the assessment […]

Learn how Isima tested Compute Engine Z3 VMs on storage-dense ecommerce workloads to achieve outstanding speed and scale.

This blog is the second part to a 2 part series on how to secure your Amazon API Gateway with Amazon Cognito, in machine to machine (M2M) communication use cases. In the previous blog post, we dove deep into the different use cases involving M2M communication and how it contributes to business modernization, and why […]

Introduction vSphere HA is a fundamental and frequently used feature of vSphere. If any of several failure scenarios occur, it restarts a virtual machine. The failure scenarios range from VM or host crashes to unresponsive hosts (for example, due to network isolation or outage). Translating vSphere High Availability (HA) to the public cloud can be […]

Introduction When we think about modernization, we're used to think about the process of breaking down a monolithic application, or moving to a microservices architecture. But let's think for a moment on the business side. For example, think about the challenges and risks involved in moving information over phone calls or emails. We want to […]

Member post by Liam Randall, Cosmonic CEO and CNCF Ambassador and Bailey Hayes, Cosmonic CTO, Bytecode Alliance TSC director, and WASI SG co-chair The advent of containers marked an inflection point…

Migrating to an open-source stack is a better solution as it gives you control over telemetry data and reduces observability costs.

RADIUS protocol's BlastRADIUS vulnerability allows attackers to bypass integrity checks and authenticate unauthorized users.

How CSA Membership Enhances Your STAR Submission | CSA

- cloudsecurityalliance.org - July 09, 2024

Being a Corporate Member on the CSA STAR Registry allows organizations to boost their brand awareness, build trust, and access exclusive support from CSA.

Users of productivity software and collaboration services such as Microsoft 365 want to protect their data and often tell us that data durability is one of their highest priorities. With the recent increases in reported cyber incidents, increasing data resilience against threats such as ransomware and other events that may compromise data durability is key. […]

AWS Security Hub is a cloud security posture management (CSPM) service that performs security best practice checks across your Amazon Web Services (AWS) accounts and AWS Regions, aggregates alerts, and enables automated remediation. Security Hub is designed to simplify and streamline the management of security-related data from various AWS services and third-party tools. It provides […]

A survey of executives working for organizations with revenues above $350 million finds coding errors cause costly manufacturing shutdowns.

Hackers exploit Jenkins misconfiguration for remote code execution and cryptocurrency mining. Ensure robust security to protect servers.

HUMINT: Diving Deep into the Dark Web

- thehackernews.com - July 09, 2024

Discover how cybercriminals behave in Dark Web forums- what services they buy and sell, what motivates them, and even how they scam each other.

Houthi-linked hackers deploy GuardZoo Android malware, targeting Middle East military personnel.

Developers are already tasked with creating and managing APIs; they must also be empowered to secure them easily.

Global cybersecurity agencies warn about China-linked APT40's rapid exploit adaptation, targeting vulnerabilities in widely-used software across multi

Creating a intuitive yet secure self-service portal for users consuming IT resources has become a key undertaking for many organizations.

Discover how threat actors are exploiting jQuery in a complex supply chain attack, targeting npm, GitHub, and jsDelivr. Learn about the risks and impl

Boomi this week launched a control plane for APIs to enable organizations to centrally manage and govern them.

Users everywhere expect stable, consistent, and high-performing applications, regardless of where an application is hosted. However, end users often experience variability and congestion over the public internet, which can be especially problematic when users are geographically distant from the application. These issues can be a major obstacle to providing your users with the online experience […]

Have you ever pondered the intricate workings of generative artificial intelligence (AI) models, especially how they process and generate responses? At the heart of this fascinating process lies the context window, a critical element determining the amount of information an AI model can handle at a given time. But what happens when you exceed the […]

Customers in Manufacturing, Real Estate, Engineering and Construction, Healthcare and other related industries often have remote facilities with limited network bandwidth where large amounts of data generated at the edge needs to be stored, processed and analyzed for making decisions in real time. For example, applications running in manufacturing plants need low latency access to […]

Hunting the Stealth Hacker in the Kubernetes Jungle

- thenewstack.io kubernetes - July 08, 2024

Let log analysis be the guide for your Kubernetes security safari.

I counted only 21 AWS news since last Monday, most of them being Regional expansions of existing services and capabilities. I hope you enjoyed a relatively quiet week, because this one will be busier. This week, we're welcoming our customers and partners at the Jacob Javits Convention Center for the AWS Summit New York on […]

This post is written by Marcos Ortiz, Principal AWS Solutions Architect and Khubyar Behramsha, Sr. AWS Solutions Architect. In this post, you learn how organizations can evolve from a single-Region architecture API Gateway to a multi-Region one, using a reliable failover mechanism without dependencies on AWS control plane operations. An AWS Well-Architected best practice is […]

CloudSorcerer, a new APT group, targets Russian government using cloud services like Microsoft Graph and Yandex Cloud for sophisticated cyber espionag

In today's fast-paced digital world, businesses must evolve and adapt to meet their customers' changing needs. We are excited to announce that our online store is transitioning to a Print On Demand…

Slurm: An HPC workload manager

- cncf.io - July 08, 2024

Member post originally published on SuperOrbital's blog by Sean Kane In this article, we are going to explore Slurm, a popular open-source high-performance computing (HPC1) workload manager…

Dark web malware logs reveal thousands of CSAM consumers. Info-stealer malware logs aid law enforcement in tracking child exploitation.

New Eldorado ransomware targets Windows and Linux systems, affecting 16 companies. Discover the latest ransomware threats and cybersecurity measures.

Application Security Posture Management (ASPM) aligns security and development teams, integrating security into the SDLC and enhancing collaboration for secure, efficient development.

Amazon Virtual Private Cloud (Amazon VPC) provides two options for controlling network traffic: network access control lists (ACLs) and security groups. A network ACL defines inbound and outbound rules that allow or deny traffic based on protocol, IP address range, and port range. Security groups determine which inbound and outbound traffic is allowed on a […]

Cybersecurity gaps exposed: Only 5% of CISOs report to CEOs, 2/3 are two levels down. CISOs must present risks in business terms to bridge communicat

How to Calculate Security Posture | Secure Your Data | CSA

- cloudsecurityalliance.org - July 08, 2024

With a clear methodology, data security teams can provide clarity into their organizations' data security posture and identify threats before they arise.

Mekotio Trojan resurges, targeting Latin American banks with phishing emails and fake pop-ups to steal banking credentials.

Unpatched Gogs Git service flaws pose severe security risks, enabling attackers to breach and manipulate code.

Apple removes 25 VPN apps from its Russian App Store following a request from Russia's Roskomnadzor, intensifying internet control.

DevOps.com is now providing a weekly DevOps jobs report through which opportunities for DevOps professionals will be highlighted.

Key points to help you effectively manage Terraform infrastructure at scale, ensuring your systems are resilient, scalable and compliant.

Choice - DevOps.com

- devops.com - July 08, 2024

Many options does not necessarily reflect a variety of choice. Many options does not necessarily reflect a variety of choice.

Book review: How Life Works

- surfingcomplexity.blog - July 07, 2024

In the 1980s, the anthropologist Lucy Suchman studied how office workers interacted with sophisticated photocopiers. What she found was that people's actions were not determined by predefined…

How to Manage Linux Storage

- thenewstack.io storage - July 07, 2024

This article demonstrates how to add and identify storage space, including partitioning and installing a filesystem. It also shows the commands you need to investigate drive space utilization.

Azure Cloud Deployment Checklist - iheavy

- iheavy.com - July 07, 2024

Deploying applications and services to Azure, Microsoft's cloud computing platform, requires a comprehensive and well-structured approach to ensure a

SRE Weekly Issue #432 – SRE WEEKLY

- sreweekly.com - July 07, 2024

In this debugging story, an engineer wielded SystemTap to figure out why a Kafka broker was doing a ridiculous amount of reads.

Azure Migration Checklist - iheavy

- iheavy.com - July 06, 2024

Migrating applications, data, and infrastructure to Azure, Microsoft's cloud computing platform, is a significant step for any organization. A well-planned

Quick takes on Rogers Network outage executive summary

- surfingcomplexity.blog - July 06, 2024

The Canadian Radio-television and Telecommunications Commission (CRTC) has posted an executive summary of a report on a major telecom outage that happened in 2022 to Rogers Communications, which is…

In May 2024, Amazon Web Services (AWS) launched a new feature for internet-facing Application Load Balancers. This enhancement allows you to provision an internet-facing Application Load Balancer without needing public IPv4 addresses, enabling clients to connect using only IPv6 addresses. To connect, clients resolve the AAAA DNS records assigned to the Application Load Balancer. The […]

Introduction Technologies such as machine learning (ML), artificial intelligence (AI), and Generative AI (GenAI) unlock a new era of efficient and sustainable manufacturing while empowering the workforce. Areas where AI can be applied in manufacturing include predictive maintenance, defect detection, supply chain visibility, demand forecasting, product design, and many more. Benefits include improving uptime and […]

Efficiency and bad outcomes

- surfingcomplexity.blog - July 05, 2024

Yossi Kreinin has a new blog post out about how the push for greater efficiency in organizations leads to negative outcomes, because it leads to teams pursuing local efficiency goals rather than do…

Dapr improves the zero trust security posture of distributed systems out of the box by assigning application identities to all apps, ensuring that mTLS is enabled by default for all interservice and infrastructure communication.

TAG post from TAG App Delivery Calling all developers! We're excited to announce the launch of the new App Development Working Group within the TAG App Delivery. This group is dedicated to bridging…

Kubestronaut in Orbit: Peter Barczi

- cncf.io - July 05, 2024

Peter, one of our first Kubestronauts, has been working with Kubernetes only since 2021 but has still managed to pass all of CNCF's Kubernetes certifications. He's currently the Sr. DevOps Engineer /

Elastic Profiling Agent Offers a 4th Pillar of Observability

- thenewstack.io observability - July 05, 2024

OpenTelemetry's profiling agent should prove to be useful for users because it goes deeper for observability analysis by extending to the code level.

Kubernetes Autoscaling: Q&A With Fairwinds CTO Andy Suderman

- thenewstack.io kubernetes - July 05, 2024

In this interview, we delve deep into the intricacies of Kubernetes autoscaling with Andy Suderman, CTO of Fairwinds

If you have a business-critical mobile app, you may find your observability solution is dropping some of your mobile app observability data.

OVHcloud mitigates record-breaking 840 Mpps DDoS attack, highlights surge in attack frequency and intensity, and warns of potential MikroTik router th

Join our exclusive webinar to learn how ITDR solutions protect against identity-based cyber attacks. Register now

Exploring MicroOS, OpenSUSE's Immutable Container OS

- thenewstack.io containers - July 05, 2024

MicroOS is OpenSUSE's container-centric immutable Linux distribution. Here is how to set it up and give it a test run.

Blueprint for Success: Implementing a CTEM Operation

- thehackernews.com - July 05, 2024

Learn how Continuous Threat Exposure Management (CTEM) can enhance your cybersecurity strategy by providing comprehensive attack surface visibility an

GootLoader malware evolves with new versions, using SEO poisoning and disguised payloads to compromise systems.

Polyfill supply chain attack impacts 380,000+ hosts, including major companies. New domains and related attacks discovered.

Discover Zergeca, a new sophisticated botnet capable of DDoS attacks and more. Learn about its features, targets, and potential impact on cybersecurit

Dirty writes

- surfingcomplexity.blog - July 05, 2024

For databases that support transactions, there are different types of anomalies that can potentially occur: the higher the isolation level, the more classes of anomalies are eliminated (at a cost o…

Choosing the right software development platform gives a firm foundation for getting it right the first time.

If your company's API management solution is multi-gateway, event-native and AI-forward, then you will be ahead of the competition.

The rapid integration of Generative AI (GenAI) in the last few years has shifted the base toward new testing solutions.

Microsoft reveals critical security flaws in Rockwell Automation devices, allowing remote code execution and DoS attacks.

SRE practices are set to undergo significant transformations, driven by technological advancements and changing organizational needs.

Brazil bans Meta from using personal data for AI training, citing privacy concerns and risks to children. Meta has 5 days to comply or face fines.

Global law enforcement operation MORPHEUS dismantled nearly 600 cybercrime servers linked to Cobalt Strike attacks.

Twilio's Authy app suffers data breach exposing millions of phone numbers. Users urged to update app and stay vigilant against potential phishing.

Modeling B-trees in TLA+

- surfingcomplexity.blog - July 04, 2024

I've been reading Alex Petrov's Database Internals to learn more about how databases are implemented. One of the topics covered in the book is a data structure known as the B-tree. Rela…

English | French | German | Italian | Spanish Last month, we shared that we are investing €7.8 billion in the AWS European Sovereign Cloud, a new independent cloud for Europe, which is set to launch by the end of 2025. We are building the AWS European Sovereign Cloud designed to offer public sector organizations […]

Serverless technologies not only minimize the time that builders spend managing infrastructure, they also help builders reduce the amount of application code they need to write. Replacing application code with fully managed cloud services improves both the operational characteristics and the maintainability of your applications thanks to a cleaner separation between business logic and application […]

The Not-So-Secret Network Access Broker x999xx

- krebsonsecurity.com - July 03, 2024

Most accomplished cybercriminals go out of their way to separate their real names from their hacker handles. But among certain old-school Russian hackers it is not uncommon to find major players who have done little to prevent people from figuring…

Troubleshooting GKE Networking Connectivity issues

- GCP containers blogs - July 03, 2024

Outlining various debugging steps in troubleshooting GKE networking connectivity issues.

A survey of AppSec professionals finds nearly two-thirds work for organizations that have had their software supply chains compromised.

Datadog Brings Big Observability Directly to Your Phone

- thenewstack.io devops - July 03, 2024

On-Call offers everything that a pager solution provides, allowing you to receive alerts on your phone, while it additionally supports functionalities that can be run on Datadog.

Install NordVPN on Linux for an Added Layer of Security

- thenewstack.io networking - July 03, 2024

NordVPN not only hides your IP address/location and encrypts your traffic, but it also blocks trackers and ads.

Cybersecurity in M&A: Navigating SEC Rules and Zero Trust | CSA

- cloudsecurityalliance.org - July 03, 2024

Cybersecurity incidents in M&A deals require swift SEC reporting and robust risk management. Adopt a zero trust approach to mitigate cyber threats and ensure compliance.

A Deep Dive Into Flaky Tests - DevOps.com

- devops.com - July 03, 2024

Managing flaky tests is an ongoing iterative approach where you identify, understand and fix intermittent or unpredictable tests.

The Emerging Role of AI in Open-Source Intelligence

- thehackernews.com - July 03, 2024

AI and ML revolutionize open-source intelligence, enhancing real-time analysis, multilingual processing, and predictive analytics for better decision-

Quantum Readiness Importance: A Comprehensive Guide | CSA

- cloudsecurityalliance.org - July 03, 2024

Quantum computing represents a formidable challenge. Delve into the critical aspects of quantum readiness and its impact on digital security.

Discover how hackers exploit Microsoft MSHTML to deploy MerkSpy spyware, targeting users globally.

FakeBat loader malware spreads via drive-by attacks using SEO poisoning and fake software updates, delivering payloads like IcedID and Lumma.

Discover the 'Supposed Grasshopper' cyberattack campaign targeting Israeli entities using open-source frameworks and custom WordPress sites as deliver

South Korean ERP vendor targeted by hackers using Xctdoor malware. North Korean groups suspected.

The DevOps methodology has become a cornerstone for delivering high-quality software rapidly and efficiently. A critical aspect of this approach is continuous

During the modernization of mainframe applications, testing is the most important and time-consuming phase. AWS Mainframe Modernization Application Testing is an AWS cloud-native service generally available and designed to reduce testing time and cost at scale. In this blog post, we will describe the testing approach, its benefits and show an Application Testing walkthrough. Mainframe […]

AWS Trusted Advisor Priority helps you focus on the most important recommendations for optimizing your cloud deployments, improving resilience, and addressing security gaps. As an AWS Enterprise Support customer, you gain access to prioritized and context-driven recommendations, curated both by your AWS account team and machine-generated checks from AWS services. Note: AWS Trusted Advisor Priority […]

Load testing is an integral step in the quality assurance phase of a software development lifecycle, that offers you confidence about the performance of your workload before it is deployed to production. Once that workload moves to production, you monitor its health using synthetic monitoring. Load testing and synthetic monitoring typically test the same application […]

Our Sensitive Data Protection Discovery service now supports Cloud Storage, in addition to BigQuery, BigLake, and Cloud SQL. Here's how it can help you.

Serverless ICYMI Q2 2024 | Amazon Web Services

- AWS compute blogs - July 02, 2024

Welcome to the 26th edition of the AWS Serverless ICYMI (in case you missed it) quarterly recap. Every quarter, we share all the most recent product launches, feature enhancements, blog posts, webinars, live streams, and other interesting things that you might have missed! In case you missed our last ICYMI, check out what happened last […]

Another maintainer of an open-source software project has decided to no longer actively update an IP address parsing utilities used widely by JavaScript developers.

Member post by Anjali Udasi, Technical Writer, Zenduty and Shubham Srivastava, Developer Relations Engineer, Zenduty Joel Studler and Ashan Senevirathne took the stage at KubeCon + CloudNativeCon…

DevOps Isn't Dead, but It's Not in Great Health Either

- thenewstack.io devops - July 02, 2024

The Continuous Delivery Foundation reports that DevOps initiatives seem to be stalling out.

Supremacy of AI in Compliance Services | CSA

- cloudsecurityalliance.org - July 02, 2024

Traditional compliance methods are inadequate in the face of growing complexities, but AI is here to transform the landscape of compliance services.

What's the Future of Distributed Ledgers?

- thenewstack.io networking - July 02, 2024

Building DLTs by best open source practices will ensure their safety, said Dr. Leemon Baird and Andrew Aitken in this episode of The New Stack Makers.

A report published by Aqua Security finds that as many as 18% of secrets inadvertently exposed are not being discovered.

Clean architecture is a software design philosophy that prioritizes the separation of concerns within a software system.

Discover how the 'Indirector' attack threatens Intel CPUs and learn about the 'TIKTAG' vulnerability in Arm processors.

Ransomware payments soar by 500%, averaging $2 million in 2024. Learn why next-gen MFA is crucial.

Cloud Security in 2024: Insecure Identities | CSA

- cloudsecurityalliance.org - July 02, 2024

99% of organizations that experienced cloud-related breaches blamed insecure identities. Read the report and improve your cloud security!

IBM has made available IBM Concert, leveraging generative artificial intelligence and knowledge graphs to surface in real-time dependencies.

China-linked hackers exploit Cisco switch flaw to deliver malware. Unpatched D-Link routers expose user accounts.

Meta's ad-free subscription faces EU scrutiny for breaching competition rules, risking hefty fines. Users demand real choices.

Australian man charged for creating fake Wi-Fi hotspots on flights to steal personal data. Learn how to protect yourself from 'evil twin' Wi-Fi attack

Many organizations have critical legacy Java applications that are increasingly difficult to maintain. Modernizing these applications is a necessary, daunting, and risky task that takes the focus off of creating new value or features. This includes undocumented code, outdated frameworks and libraries, security vulnerabilities, a lack of logging and error handling, and a lack of […]

Cloud Security Alliance RFI: Leveraging GenAI | CSA

- cloudsecurityalliance.org - July 01, 2024

Request for Information (RFI): CSA is looking for companies that are interested in partnering with CSA to develop new solutions that utilize Generative AI.

Cross-Cloud Network enables an Oracle multicloud

- GCP networking blogs - July 01, 2024

Cross-Cloud Network sets up private, dedicated connections between Google Cloud and Oracle Cloud Infrastructure (OCI).

CocoaPods patches critical vulnerabilities that exposed thousands of iOS and macOS apps to supply chain attacks.

AWS Summit New York is 10 days away, and I am very excited about the new announcements and more than 170 sessions. There will be A Night Out with AWS event after the summit for professionals from the media and entertainment, gaming, and sports industries who are existing Amazon Web Services (AWS) customers or have […]

Ambassador post by Taylor Thomas, CNCF Ambassador and Director of Engineering at Cosmonic WebAssembly (Wasm) components are here and already unlocking new computing patterns. Meanwhile…

Phantom Secrets: The Hidden Threat in Code Repositories

- thenewstack.io cloud-native - July 01, 2024

Credentials, API tokens, and passkeys developers add to code can remain exposed for years even after they were assumed to be deleted, Aqua Security finds.

Discover how Transparent Tribe's latest Android malware campaign targets mobile users, and learn about new threats like Snowblind in Southeast Asia.

Conceptworld software installers trojanized with data-stealing malware. Users of Notezilla, RecentX, and Copywhiz urged to check for compromise.

Phishing attacks have evolved with cybercriminals now using QR codes to steal sensitive data. Learn how to protect against these sophisticated quishing attacks and tactics.

Fauna has added an ability to maintain strict enforcement of schema to its document-relational database using a declarative language.

Critical OpenSSH vulnerability allows remote code execution on Linux systems. Patch now to protect against potential attacks on millions of exposed se

Discover how to secure machine identities and reduce secrets sprawl with end-to-end secrets management solutions.

IT-OT Convergence: Enhancing Security and Efficiency | CSA

- cloudsecurityalliance.org - July 01, 2024

Converging IT and OT enhances efficiency, security, and innovation in digital transformation. Secure integration ensures data-driven decisions and robust operational performance.

Juniper Networks has released critical security updates for routers to fix an authentication bypass vulnerability. Apply patches now to secure your de

A Matter of Attitude - DevOps.com

- devops.com - July 01, 2024

Most times, we only find what we're looking for. Attitude is a key factor in how we perceive the world. Most times, we only find what we're looking for. Attitude is a key factor in how we perceive the world.

A round up of five great DevOps opportunities for your perusal, including positions at Cisco Systems and Costco Wholesale.

Customers build, deploy, and maintain millions of web applications on AWS and many customers deploy these applications using the Apache web application server. Web application performance is a key metric in modern enterprise applications. On AWS customers leverage Amazon CloudWatch to monitor response times, uptime, and provide SLAs. Engineering teams that run large scale applications […]

SRE Weekly Issue #431 – SRE WEEKLY

- sreweekly.com - June 30, 2024

This is a really thorny one. As individual subprocesses started infinitely looping, their system shifted load to other datacenters, masking the problem. A coinciding failure in the load shifting system made things even more interesting.

Although provisioning load balancers directly from clusters has been the Kubernetes native method for exposing services, in some cases this creates a provisioning process that doesn't align with the architecture of the applications. Therefore, there's a need to have another mechanism for it. For those use-cases, which we describe in this post, provides the functionality […]

Google Chrome to block Entrust certificates from November 2024 due to security concerns. Website operators urged to switch CAs to avoid disruption.

North Korean hackers deploy malicious Chrome extension TRANSLATEXT to steal data from South Korean academics studying North Korean affairs.

Google is helping to improve cybersecurity at rural and underserved hospitals. Here's how.

Member post originally published on Since its launch in June 2014, Kubernetes has revolutionized container orchestration, transforming how applications are managed and scaled. The Data on Kubernetes…

After the domain was bought by a Chinese company in February, it began putting malicious code into scripts distributed via its CDN.

The agency is urging developers to transition to memory-safe programming languages to reduce security flaws and make software safer.

GitLab releases security updates fixing 14 vulnerabilities, including critical CI/CD flaw CVE-2024-5655. Update now to ensure protection.

8220 Gang exploits Oracle WebLogic Server flaws using fileless execution techniques to drop XMRig miner payload.

SRE in the Age of AI - DevOps.com

- devops.com - June 28, 2024

In its purest form, site reliability engineering (SRE) is what you get when you treat operations like it is a software problem.

Explore the evolving landscape of SaaS security risks, threat actor tactics, and essential strategies for protecting enterprise data.

Ensuring AI safety, privacy, and bias prevention starts with robust data management. Implement ISO 42001's A.7 controls for secure, reliable, and responsible AI systems.

Researchers unveil SnailLoad, a new side-channel attack exploiting network latency to infer web activity remotely, achieving up to 98% accuracy in vid

Discover critical security flaws in Emerson gas chromatographs. Learn about vulnerabilities, potential risks, and urgent firmware updates for industri

Orca Security this week added the ability to scan source code stored in GitHub and GitLab repositories for vulnerabilities.

A company can improve its developer experience (DevEx) by tweaking its continuous integration and continuous delivery (CI/CD) process.

DevSecOps principles focus on automating information security processes and introducing security measures early in software development.

TeamViewer detects security breach, investigates with experts. No customer data impacted. Health-ISAC warns of APT29 exploitation.

Streamline virtual desktop management: provision non-persistent desktops, configure apps and resources, and automatically scale capacity based on demand, all from a centralized platform.

As machine learning models grow more advanced, they require extensive computing power to train efficiently. Many organizations are turning to GPU-accelerated Kubernetes clusters for both model training and online inference. However, properly monitoring GPU usage is critical for machine learning engineers and cluster administrators to understand model performance and to optimize infrastructure utilization. Without visibility […]

AWS Certificate Manager (ACM) is a managed service that you can use to provision, manage, and deploy public and private TLS certificates for use with Elastic Load Balancing (ELB), Amazon CloudFront, Amazon API Gateway, and other integrated AWS services. Starting August 2024, public certificates issued from ACM will terminate at the Starfield Services G2 (G2) root […]

Trace data from origin to insights with an intuitive visual graph, empowering engineers, analysts, and admins to validate provenance, troubleshoot pipelines, and ensure governance with ease.

Canonical Offers LTS 'Distroless' Containerized Apps for K8s

- thenewstack.io cloud-native - June 27, 2024

Canonical's Long Term Support (LTS) Ubuntu releases provided users with 12 years of guaranteed security maintenance. Now the company is expanding the program for containerized open source apps — No distribution needed.

JFrog Combines DevOps, DevSecOps, MLOps with Qwak Buy

- thenewstack.io devops - June 27, 2024

JFrog's solution will now enable building, deployment, management and monitoring of AI workflows to classic ML models, all on a unified platform.

Manage your code across popular git repositories with Amazon CodeCatalyst's new integration with GitLab.com and Bitbucket Cloud. Use blueprints and Amazon Q feature development.

Vitess 20 is now Generally Available

- cncf.io - June 27, 2024

Project post by the Vitess Maintainer Team We're delighted to announce the release of Vitess 20 along with version 2.13.0 of the Vitess Kubernetes Operator. Version 20 focuses on usability and…

With the introduction of trusted identity propagation, applications can now propagate a user's workforce identity from their identity provider (IdP) to applications running in Amazon Web Services (AWS) and to storage services backing those applications, such as Amazon Simple Storage Service (Amazon S3) or AWS Glue. Since access to applications and data can now be […]

P2PInfect botnet evolves to target Redis servers with ransomware and crypto miners, showcasing new financial motivations and advanced evasion techniqu

PyTorch, Docker and AI Openness Highlight AI_dev Europe

- thenewstack.io containers - June 27, 2024

The AI_dev conference showcases an open model tool and Docker WebGPU support for developers, but PyTorch Rust integration is not on the agenda.

Dumping a Database with an AI Chatbot | CSA

- cloudsecurityalliance.org - June 27, 2024

Utmost care should be taken to secure AI chatbots. A Synack vulnerability was discovered that allows full access to the database and filesystem.

The Secrets of Hidden AI Training on Your Data

- thehackernews.com - June 27, 2024

Discover the hidden risks of AI in SaaS tools. Learn how AI training impacts data security and privacy. Essential insights for safeguarding your organ

Waltham, Massachusetts, 27th June 2024, CyberNewsWire

Cloud Security in 2024: A Shifting Landscape | CSA

- cloudsecurityalliance.org - June 27, 2024

The 2024 Thales Cloud Security Study provides a comprehensive look at the current state of cloud security. Here are the key takeaways.

Learn how to build secure blockchain applications in Python with AlgoKit, the comprehensive toolkit for Algorand developers.

Discover how a critical flaw in Vanna.AI library exposes databases to remote code execution and the growing risks of AI prompt injection attacks.

Russian national indicted in U.S. for cyber attacks before Ukraine invasion. DOJ offers $10M reward.

Critical security flaw in Fortra FileCatalyst Workflow allows database tampering. Patch available.

London Stock Exchange Group (LSEG) has 30 PB of Tick History-PCAP data, which is ultra-high-quality global market data that is based on raw exchange data, timestamped to the nanosecond. An additional 60 TB is generated every day. LSEG sought to migrate their data from Wasabi cloud storage, LSEG was looking for a new solution to […]

The 5 Worst Anti-Patterns in API Management

- thenewstack.io microservices - June 26, 2024

This list is not exhaustive, but it covers the most common practices. These recommendations should not prevent you from trying different processes.

Some of my customers need assistance while operating their Amazon Elastic Compute Cloud (Amazon EC2) infrastructure. They need to: Review the disk usage of various volumes/ disks within an EC2 instance. To do it in a scalable way, one does not need to access the instance either through a Remote Desktop Session (RDP) or use […]

To help make CMEK configuration more efficient, we're introducing Cloud KMS Autokey, which automates CMEK key control operations.

Critical MOVEit Transfer flaw exploited in wild. Progress Software urges immediate patching. CISA reports separate intrusion on chemical security tool

Grafana Relies on Embrace to Pull Mobile Data

- thenewstack.io observability - June 26, 2024

With the integration of Embrace, Grafana Cloud now allows users to connect gather complete frontend telemetry data from mobile apps.

Datadog at its DASH 2024 conference added a bevy of tools and capabilities to streamline DevSecOps workflows, including Datadog On-Call.

Amazon SQS boosts performance, scaling capabilities, and energy efficiency without impacting existing behavior - a behind-the-scenes look at AWS's continuous improvement journey.

Logging Out - DevOps.com

- devops.com - June 26, 2024

There will come a time when our online accounts live on well after we are gone, and our credit cards will be charged accordingly. There will come a time when our online accounts live on well after we are gone, and our credit cards will be charged accordingly.

Harmful risks of credential stuffing attacks can range from unauthorized access to your company's confidential data to identity theft, financial loss, and legal consequences. Learn how to protect yourself.

AI's Impact on Vulnerability Management | CSA

- cloudsecurityalliance.org - June 26, 2024

Explore how AI can exploit vulnerabilities and learn key takeaways for vulnerability management and remediation, emphasizing the need for rapid response and leveraging AI for security.

Explore key strategies to secure software supply chains effectively amidst rising cyber threats. Learn about SBOMs, SLSA, and DevSecOps best practices

Chinese and North Korean hackers target global infrastructure with ransomware, blurring lines between cybercrime and espionage.

Apple releases critical security updates for AirPods and visionOS, addressing Bluetooth vulnerabilities and potential exploits in spatial computing.

We do not know if cloud minimalism is the answer to cloud complexity, but it provides pathways to onboard and explore cloud computing.

Discover how the Caesar Cipher Skimmer targets e-commerce platforms, compromising credit card data. Learn to protect your website from this new threat

Discover how the updated Medusa Android banking trojan targets users in 7 countries, featuring new stealth capabilities and expanded reach.

McLean, United States of America, 26th June 2024, CyberNewsWire

A new level of assistant is emerging — as AI technology is embedded directly into development and testing tools.

An AI agent is a series of prompts that leverage AI to carry out a role within the engineering team, such as the business owner or tester.

Google blocks ads on sites using compromised Polyfill.io. Over 110,000 websites affected. Learn about the security risks and alternative solutions.

Microsoft is a Leader in this year's Gartner® Magic Quadrant for Data Science and Machine Learning Platforms. Learn more.

Improving Data Quality: Anomalo and Automated Monitoring

- thenewstack.io observability - June 25, 2024

Anomalo can revamp your organization's data quality with ML-based monitoring, automated root cause analysis, and data pipeline support.

AI Deepfake Security Concerns | CSA

- cloudsecurityalliance.org - June 25, 2024

Understand the critical topic of AI deepfakes, why they're so concerning, and why IT professionals should be deeply invested in learning more.

Coding From Scratch Creates New Risks

- thenewstack.io devops - June 25, 2024

The good news for organizations is that CodeOps combines AI and human ingenuity to minimize these risks while saving time and money.

To empower systems researchers, we recently released Thesios, a collection of synthesized Google I/O traces for storage servers and disks.

Learn how generative AI can help with SRE tasks

- GCP devops/sre blogs - June 25, 2024

Resources to learn generative AI concepts and how to leverage it to enhance your operational efficiency as an SRE.

A key challenge for SaaS providers is designing secure, scalable tenant routing mechanisms to identify tenants and route requests to appropriate resources. Effective tenant routing ensures isolation, scalability, and security. This post explores strategies for routing HTTP requests in multi-tenant SaaS environments on AWS, including considerations, best practices, and example scenarios. For routing strategies at […]

Sapient.ai today launched a testing automation platform that makes use of AI and automatically creates unit tests as the apps are developed.

Member post originally published on the Logz.io blog by Jake O'Donnell It may sound complicated and daunting, but so much of observability is about discovering the unknown unknowns in your critical…

Building Security Around Human Vulnerabilities | CSA

- cloudsecurityalliance.org - June 25, 2024

Cyber awareness training doesn't prevent people from making mistakes. Instead, focus on building a security program that considers human error.

Hollow Core Fiber is an innovative optical fiber that is set to optimize the Microsoft Azure global cloud infrastructure. Learn more.

If you are using tools with PaC, start building some policies, and if not, consider experimenting with those tools.

A survey of C-level executives and security experts finds 39% of respondents reporting they work for organizations currently using AI tools.

Overview GitHub Actions is a continuous integration and continuous deployment platform that enables the automation of build, test and deployment activities for your workload. GitHub Self-Hosted Runners provide a flexible and customizable option to run your GitHub Action pipelines. These runners allow you to run your builds on your own infrastructure, giving you control over the […]

JFrog today revealed it has acquired Qwak to add a machine learning operations platform to its portfolio of DevOps tools and platforms.

CNAPP, CIEM & Cloud Security Maturity | CSA

- cloudsecurityalliance.org - June 25, 2024

A cloud-native application protection platform (CNAPP) that integrates CIEM can level up your cloud security.

Broadcom today extended VCF to provide templates that make it simpler for DevOps teams to provide self-service catalogs to developers.

Discover GrimResource, a new cyber threat leveraging MSC files for stealthy code execution. Stay informed and protected against this evolving cybersec

Discover Boolka, a new cyberthreat using SQL injections and malicious scripts to steal data and deploy the BMANAGER trojan on vulnerable websites glob

SEC Updated Guidance on Cybersecurity Disclosures | CSA

- cloudsecurityalliance.org - June 25, 2024

Understand the SEC's updated guidance on disclosing cybersecurity incidents, including key requirements, materiality definitions, and the importance of transparency for public companies.

How to Cut Costs with a Browser Security Platform

- thehackernews.com - June 25, 2024

Discover how browser security enhances efficiency and cuts costs in cybersecurity with real-life CISO testimonials.

Julian Assange freed after 5 years, pleads guilty to classified info leak. WikiLeaks founder heads to Australia as 14-year legal battle ends.

WordPress plugins compromised to create rogue admin accounts. Users advised to check for suspicious activity and remove malicious code. Security alert

Four Vietnamese hackers indicted for $71M cybercrime spree. Phishing, supply chain attacks, and data theft targeted US companies over three years.

In today's rapidly evolving digital landscape, the cloud has become the backbone of innovation, scalability, and efficiency for businesses worldwide. As customers embark on their cloud migration journeys, whether the migration has been motivated by the intention of accelerating innovation, reducing operational and infrastructure costs, or exiting your on-prem datacenter, migrating to the cloud presents […]

Fetch provides a convenient and rewarding platform for consumers to earn points and redeem them for various goods and services, making it an attractive option for those looking to maximize the value of their everyday purchases. As of May 2024, the Fetch app ranked #25 in the Shopping category and has 4.8 stars out of […]

A survey of tech pros finds that while 80% of respondents say their org is ready to use AI tools, the enthusiasm for these tools is higher among C-level execs.

In January 2024, we introduced Migration Hub Journeys to guide and accelerate the migration and modernization of applications. Journeys help optimize planning, execution, and tracking through task-based templates with expert guidance, specialized tools, and cross-team collaboration, enabling you to migrate and modernize applications seamlessly. Today, we're excited to publish new migration journey templates for AWS […]

Building a Platform Team at a 153-Year-Old Company

- thenewstack.io platform-engineering - June 24, 2024

The digital transformation of Hellmann Worldwide Logistics, as described at PlatformCon 2024, carries lessons other organizations can adapt.

Assessing integration security risks across prospective SaaS vendors successfully has been critical in helping pinpoint the most secure vendors over time.

Introduction This post discusses Amazon Elastic Container Service (Amazon ECS) Service Connect, a capability that provides a secure and scalable way to connect different Amazon ECS service deployments. This enables seamless communication between micro-services while reducing the operational overhead. It provides features such as service discovery, load balancing, and network traffic metrics. This post primarily […]

What's new with GKE Cluster Autoscaler

- GCP containers blogs - June 24, 2024

Enhancements to GKE Cluster Autoscaler deliver improvements such as better deployment time and application response latency.

Originally published on the appCD blog by Asif Awan You've been working on a new application for your company. It is going to address business requirements needed to delight customers.

Google's Project Naptime empowers AI to autonomously uncover vulnerabilities, revolutionizing automated security assessments.

This week, I had the opportunity to try the new Anthropic Claude 3.5 Sonnet model in Amazon Bedrock just before it launched, and I was really impressed by its speed and accuracy! It was also the week of AWS Summit Japan; here's a nice picture of the busy AWS Community stage. Last week's launches With many […]

Critical security flaw (CVE-2024-37032) discovered in Ollama, an open-source AI platform, could lead to remote code execution.

Introduction When I take my car in for service for a simple oil change, the technician often reads off a litany of other services my car needs that I had put off since the previous service (and maybe the service before that, too). I tend to wait for the "check engine" light to come on […]

CSPM vs. ASPM: Security for Cloud and Application | CSA

- cloudsecurityalliance.org - June 24, 2024

Explore the differences between CSPM and ASPM, and learn how to effectively leverage both to secure cloud infrastructure and applications, ensuring comprehensive risk management.

DevOps.com is providing a weekly DevOps jobs report through which opportunities for DevOps professionals will be highlighted.

Does your team suffer from duplicate git Issues? How about competing or over-stuffed pull requests? A group of researchers have discovered all sorts of ways your dev team may be working with less-than-optimal efficiency.

Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill's threat experts.

Dmitri Alperovitch's Vision for Cyber Defense | CSA

- cloudsecurityalliance.org - June 24, 2024

Understand the evolution of cybersecurity, the role of the cloud in revolutionizing IT, and the challenges of dealing with third-party apps.

Chinese hackers target Taiwan and other countries in extensive cyber espionage campaign, exploiting vulnerabilities in internet-facing devices for int

Learn about Rafel RAT, an Android malware tool posing as popular apps. Explore its risks, impacts, and preventive measures for mobile security.

SRE Weekly Issue #430 – SRE WEEKLY

- sreweekly.com - June 23, 2024

Lots of great tips in the comments if you're looking to tune your resume.

AI-in-a-Box With Podman AI Lab

- thenewstack.io containers - June 22, 2024

Wondering how to get started on this new-fangled Generative AI trend? For Linux folks, Red Hat's Podman Desktop "AI Lab" offers an easy onramp to AI experimentation.

ExCobalt targets Russian firms with GoRed backdoor. New cyber threat uses supply chain attacks and advanced tools for espionage across sectors.

In this blog post you'll learn how to use a new feature in AWS CodeDeploy to deploy your application one Availability Zone (AZ) at a time to help increase the operational resilience or your services through improved fault isolation. Introducing change to a system can be a time of risk. Even the most advanced CI/CD […]

Discover how AdsExhaust adware targets Meta Quest app users, manipulates browsers, and generates unauthorized revenue through sophisticated techniques

Introduction As a builder, AWS CloudFormation provides a reliable way for you to model, provision, and manage AWS and third-party resources by treating infrastructure as code. First-time and experienced users of CloudFormation can often encounter some challenges when it comes to development of templates and stacks. CloudFormation offers a vast library of over 1,250 resource […]

US Treasury sanctions 12 Kaspersky executives, citing cyber threats. Company and CEO unaffected. Follows Commerce Dept. ban on Kaspersky software.

The marriage of machine learning and DevOps practices has given birth to MLOps, a specialized field focused on automating the

Tips for benchmarking TCP and UDP bulk flows

- GCP networking blogs - June 21, 2024

Boost your network performance with expert tips on TCP & UDP bulk flows benchmarking.

Full visibility into hybrid infrastructures is crucial for supporting the secure development and deployment of modern applications.

DevSecOps has promise and pitfalls, and we need a path forward to achieve a balance between speed and security.

Member post originally published on the Mia-Platform blog by Giovanna Monti, Full Stack Developer, Mia-Platform Entering the world of a fast-paced tech company can feel like diving headfirst into a…

How Expedia Group Moved From 21 Platform Stacks to 1

- thenewstack.io platform-engineering - June 21, 2024

Learn how the online travel company performed a massive migration project affecting 6,000 developers — during a pandemic.

Chinese hackers target government agencies worldwide with SugarGh0st and SpiceRAT malware.

Discover how the PHANTOM#SPIKE phishing campaign targets Pakistan with military-themed emails, spreading malware via ZIP file attachments.

SmartBear this week extended its efforts to bring generative AI to its test automation portfolio to include test data and API contracts.

Introduction In this blog, you will learn how to choose the right project management methodology to accelerate cloud transformations. According to the Harvard Business Review, over 70% of digital transformations fail. One of the reasons is the lack of proper governance leading to poor cross-functional alignment. To avoid this common pitfall, organizations must choose a […]

Do SOC 2 and ISO 27001 the Right Way with CSA STAR | CSA

- cloudsecurityalliance.org - June 21, 2024

CSA CEO Jim Reavis provides an overview of the SOC 2 and ISO 27001 frameworks and how they relate to the CSA STAR program.

Discover how a malvertising campaign tricks users with fake software downloads to spread the Oyster malware.

Discover the critical SolarWinds Serv-U vulnerability exploited by threat actors. Update now to secure sensitive files from unauthorized access.

Building on the foundation laid by DevSecOps, ASPM represents a leap forward in operationalizing these principles within the CI/CD process.

GenAI helps mainframe developers maintain consistency across the codebase, reducing the risk of introducing errors or vulnerabilities.

US bans Kaspersky software citing national security risks. Russian cybersecurity firm given 100 days to cease US operations.

AWS CodeArtifact now supports Rust packages, enabling secure storage and management of Rust crates within your organization's private repositories, mitigating legal and security risks from external package sources while ensuring efficient collaboration across teams.

On March 8, 2024, KrebsOnSecurity published a deep dive on the consumer data broker Radaris, showing how the original owners are two men in Massachusetts who operated multiple Russian language dating services and affiliate programs, in addition to a dizzying…

Miami, United States, 20th June 2024, CyberNewsWire

Kubestronaut in Orbit: Zhilong Wang

- cncf.io - June 20, 2024

Zhilong Wang is one of the first Kubestronauts in China. As a cloud-native technology expert, he has over 10 years of frontline experience in internet development and architecture…

Haven't Migrated Off CentOS Yet? You Have Until June 30

- thenewstack.io devops - June 20, 2024

As the clock ticks down, the imperative is clear: act now, secure your systems and ensure a smooth transition to a supported enterprise Linux operating system.

This powerful and cost-effective model outperforms on intelligence benchmarks, with remarkable capabilities in vision, writing, customer support, analytics, and coding to revolutionize your workflows.

Troubleshooting Google Cloud Load Balancing backends

- GCP networking blogs - June 20, 2024

Learn about your troubleshooting options when a Google Cloud load balancer has backends that are failing to pass health checks.

Member post originally published on the Devtron blog by Nishant As the adoption of Kubernetes continues to grow, organizations encounter numerous challenges in securing their software development and…

AI Resilience & Diversity | Strengthen AI Systems | CSA

- cloudsecurityalliance.org - June 20, 2024

Explore AI resilience, robustness, and plasticity. Understand how incorporating diversity into AI systems can offer a more resilient framework.

Russian hackers target French diplomats in sophisticated cyber attacks. ANSSI warns of ongoing threats to diplomatic entities and IT firms.

Discover the critical UEFI firmware flaw affecting Intel processors. Learn how to secure your devices against potential cyber threats.

Dubai, UAE, 20th June 2024, CyberNewsWire

Navigating the EU AI Act: Key Compliance Strategies | CSA

- cloudsecurityalliance.org - June 20, 2024

Explore crucial elements of the EU AI Act for AI compliance, focusing on transparency, privacy, risk management, and ethical principles to ensure responsible AI development and use.

We continue to expand the scope of our assurance programs at Amazon Web Services (AWS) and are pleased to announce that 113 services are now certified as compliant with the Cloud Infrastructure Services Providers in Europe (CISPE) Data Protection Code of Conduct. This alignment with the CISPE requirements demonstrates our ongoing commitment to adhere to the heightened expectations for […]

Cary, United States, 20th June 2024, CyberNewsWire

Discover how MSPs in 2024 are coping with tool overload in cybersecurity. Explore integrated solutions like Guardz to streamline operations and boost

7 Steps for Achieving PCI DSS Compliance as a New CISO | CSA

- cloudsecurityalliance.org - June 20, 2024

Newly hired CISOs, follow these 7 strategies to effectively achieve and maintain PCI DSS compliance, from assessing current compliance levels to establishing robust security and reporting structures.

Symantec uncovers a long-running Chinese cyber espionage campaign targeting Asian telecom operators since 2021, deploying custom malware and stealing

Fickle Stealer, a new Rust-based malware, and AZStealer, an open-source Python stealer, target sensitive data via multiple attack chains and exfiltrat

Discover SquidLoader, a new evasive malware spreading via phishing attacks in China. Learn its tactics and cybersecurity implications.

Certain organizations may experience unexpected or outlier cross-region data transfer charges and require time to identify which of their systems or workloads are initiating them. In such cases, it may be useful to temporarily block data transfers to within a particular region. This temporary restriction can prevent further unwanted charges and allows time for audit […]

Introduction Many customers use Amazon Elastic Container Service (ECS) for running their mission critical container-based applications on AWS. These customers are looking for safe deployment of application and infrastructure changes with minimal downtime, leveraging AWS CodeDeploy and AWS CloudFormation. AWS CloudFormation natively supports performing Blue/Green deployments on ECS using a CodeDeploy Blue/Green hook, but this […]

Kraken exchange falls victim to a $3 million crypto theft exploiting a zero-day flaw, with the researcher refusing to return the stolen funds.

Like a Russian doll, an IDP is a layer on top of an SSP that offers tools to streamline the entire software development lifecycle. The SSP is about functionality and automation for everyone involved.

Use Amazon SageMaker with MLflow to track experiments, compare runs, register candidate models, and transition models from experimentation to production.

Introduction The CloudFormation Linter, cfn-lint, is a powerful tool designed to enhance the development process of AWS CloudFormation templates. It serves as a static analysis tool that checks CloudFormation templates for potential errors and best practices, ensuring that your infrastructure as code adheres to AWS best practices and standards. With its comprehensive rule set and […]

Congratulations to CNCF's 2024 Term 1 (March – May) LFX Program mentees who have finished the program successfully! Following a three-month program working with 28 different Graduated, Incubating…

Discover how UNC3886 exploits Fortinet and VMware vulnerabilities in sophisticated cyber espionage campaigns. Learn about advanced persistence methods

Kahn had a communications perspective, Cerf came with a computing perspective, and together they worked on connecting diverse computing networks — up to 256 of them.

Both CoE and platform engineering aim to boost productivity and collaboration. Which is best for your shop?

Learn how to create a Helm chart with our easy-to-follow Helm Charts Tutorial. This guide covers structure, components,

Explore the dangers of Google Tag Manager misconfigurations with real-world examples. Learn how to safeguard your data and comply with privacy laws

Discover the latest cybersecurity threat targeting Chinese-speaking users with malicious VPN installers and AI-driven malware campaigns.

Discover how markopolo's Vortax scam targets cryptocurrency users with malware, posing serious cybersecurity threats across platforms

The rapid advancements in large language model (LLM) coding assistants have sparked debates about the future of coding.

The pace of digitization impacts on creativity, and burnout is a very present issue estimated to affect four in five software developers.

Discover critical vulnerabilities in Mailcow server software allowing remote code execution and XSS attacks.

Generative AI, powered by large language models (LLMs), introduces a transformative solution to the challenges of modern observability.

A survey shows while 60% work for organizations that update web applications weekly, 75% test their web applications monthly or less often.

OpenAI Whisper is a pre-trained model for automatic speech recognition (ASR) and speech translation. It has demonstrated strong ASR performance across various languages, including the ability to transcribe speech in multiple languages and translate them into English. The Whisper model is open-sourced under the Apache 2.0 license, making it accessible for developers to build useful […]

The new hierarchical namespace capabilities bring file system optimizations to Cloud Storage buckets.

Enterprise AI Requires a Lean, Mean Data Machine

- thenewstack.io devops - June 18, 2024

How your business approaches this could determine whether it evolves with the next phases of AI or becomes a vestige locked in the past.

Discover how the EU's proposal to scan private messages for CSAM risks encryption and sparks a debate on privacy versus child safety.

Malware analysis. Summarization and search for SecOps. Faster patching. CISO Phil Venables looks at three promising AI use cases for cybersecurity.

Where AI meets cloud native security

- cncf.io - June 18, 2024

Not sure where to get started when it comes to cloud native security and artificial intelligence? Look no further than CloudNativeSecurityCon North America 2024 in Seattle, which opens up with the co…

Ambassador post originally published on the Oras blog by Feynman Zhou The ORAS project maintainers are proud to announce ORAS CLI v1.2.0 and ORAS-go v2.5.0. These two releases are ready for production…

Introduction Monitoring the health and performance of your media services is critical to ensuring a seamless viewing experience for your customers. Amazon CloudWatch provides powerful monitoring capabilities for AWS resources. Setting up comprehensive dashboards can be a time-consuming process, especially for organizations managing with large number of resources across multiple regions. The Automatic CloudWatch Dashboard solution […]

At AWS, we consider reliability as a capability of services to withstand major disruptions within acceptable degradation parameters and to recover within an acceptable timeframe. Service reliability goes beyond traditional disciplines, such as availability and performance, to achieve its goal. Components of a system or application will eventually fail over time. Like our CTO Werner Vogels […]

Cybercriminals exploit free software lures and social engineering tactics to deploy Hijack Loader, Vidar Stealer, and other malware, targeting unsuspe

Cybersecurity Language: Enhancing Security and Compliance | CSA

- cloudsecurityalliance.org - June 18, 2024

Learn how aligning terminology across security, risk, and compliance teams enhances operational efficiency, improves decision-making, and fortifies organizational resilience.

The latest version of the AWS HITRUST Shared Responsibility Matrix (SRM)—SRM version 1.4.3—is now available. To request a copy, choose SRM version 1.4.3 from the HITRUST website. SRM version 1.4.3 adds support for the HITRUST Common Security Framework (CSF) v11.3 assessments in addition to continued support for previous versions of HITRUST CSF assessments v9.1–v11.2. As […]

Explore key findings from a survey on SaaS security investment trends, challenges, and improvements across enterprises.

New Threat: Discovery of the Log4j XMRig Malware | CSA

- cloudsecurityalliance.org - June 18, 2024

Uptycs uncovered an ongoing operation within the Log4j campaign that aims to deploy an XMRig cryptominer malware onto the targeted systems.

Let's figure out what AI does well, where it falls short, and whether DevOps professionals should fear it and start re-skilling today.

Researchers uncover a new malware campaign targeting exposed Docker API endpoints to deliver cryptocurrency miners and remote access tools.

VMware releases critical updates for Cloud Foundation, vCenter Server, and vSphere ESXi, fixing remote code execution and privilege escalation flaws.

Singapore Police extradite two men from Malaysia for alleged Android malware scam targeting citizens' bank accounts, resulting in financial losses.

Shift Left is Dead - DevOps.com

- devops.com - June 18, 2024

By setting up a strategy and outlining product and IT requirements, developers need not take shortcuts and security risks.

The Devil and the Details - DevOps.com

- devops.com - June 18, 2024

When a culture is unable to understand the details of a situation all that's left is to create an illusion of simplicity. When a culture is unable to understand the details of a situation all that's left is to create an illusion of simplicity.

Customers who develop APIs can control access to them using Amazon Cognito user pools as an authorizer. Testing these APIs should take into account the additional security controls in place to effectively validate that the APIs are working, and Amazon CloudWatch Synthetics enables proactive testing of these APIs. If you are using Amazon Cognito User […]

As independent software vendors (ISVs) shift to a multi-tenant software-as-a-service (SaaS) model, they commonly adopt a shared infrastructure model to achieve cost and operational efficiency. The more ISVs move into a multi-tenant model, the more concern they may have about the potential for one tenant to access the resources of another tenant. SaaS systems include […]

Last week, my alma mater Standard Bank Group (SBG) hosted a Software Engineering Conference and invited me to be one of the keynote speakers. SBG has presence throughout Africa and this hybrid conference was attended by almost 2,000 engineers from across the continent. It was amazing to reconnect with long-time friends and former colleagues, and […]

Object Storage Is Key To Taming Cloud Costs

- thenewstack.io storage - June 17, 2024

Rising cloud costs have been a recurring theme in recent years. We saw enterprise cloud use skyrocket during 2020; in

Enhancements to IPv6 Hybrid Connectivity portfolio

- GCP networking blogs - June 17, 2024

The IPv6 Hybrid Connectivity portfolio now supports IPv6 BGP sessions, Partner Interconnect IPv6, and IPv6-only HA-VPN.

Generative AI apps have different network traffic patterns than other apps. New capabilities across the Google Cloud networking stack can help.

Two new Confidential Computing offerings have been designed to protect the privacy and confidentiality of AI/ML workloads. Here's how.

We are thrilled to welcome the latest cohort of CNCF Ambassadors! These passionate and dedicated individuals are recognized for their outstanding contributions to the cloud native community.

Member post originally published on the Buoyant blog by William Morgan Topology Aware Routing is a feature of Kubernetes that prevents cluster traffic within one availability zone from crossing to…

ASUS releases crucial updates for multiple router models to address critical authentication bypass and buffer overflow vulnerabilities. Users urged to

Conference leaders share their thoughts on the latest trends and challenges in cloud native security, and the sessions they are most looking forward to.

5 ChatGPT Jailbreak Prompts Being Used by Criminals | CSA

- cloudsecurityalliance.org - June 17, 2024

Examine the top ChatGPT jailbreak prompts that cybercriminals use to generate illicit content, including DAN, Translator Bot, AIM, and BISH.

When Amazon Web Services (AWS) launched Amazon Q Developer agent for code transformation as a preview last year to upgrade Java applications, we saw many organizations desire to significantly accelerate their Java upgrades. Previously, these upgrades were considered daunting, a time-consuming manual task requiring weeks if not months of effort and with Amazon Q Developer they […]

The Erawan Release of a DevSecOps platform provides a set of new and enhanced capabilities to help automate applications security along with integration with Backstage, an open-source internal developer platform originally developed by Spotify that is now being advanced under the auspices of the Cloud Native Computing Foundation (CNCF).

Sygnia reveals 3-year cyber espionage campaign by China-linked Velvet Ant group, exploiting F5 BIG-IP for persistence and deploying PlugX malware.

Discover the importance of DevSecOps in modern software development. Learn to integrate security seamlessly for safer applications.

5 Best Practices to Secure AWS Resources | CSA

- cloudsecurityalliance.org - June 17, 2024

Review five best practices for securing AWS resources to gain a better understanding of how to protect your cloud environments.

Platform engineering represents the evolution of DevOps into a more structured and service-oriented model.

Discover how compromised websites are exploited to distribute BadSpace, a dangerous Windows backdoor via fake browser updates

Check out our weekly spotlight on current DevOps job postings, including positions at Deutsche Bank and Prudential Financial.

Discover the latest threat of NiceRAT malware targeting South Korean users via cracked software.

In today's fast-paced technology landscape, ensuring optimal user experience and efficient resource utilization is crucial. Even minor performance bottlenecks can significantly impact user experience and business success. With the rising popularity of ARM architectures like AWS Graviton, benchmarking applications across different architectures is essential for making informed decisions. Comprehensive benchmarking helps evaluate the suitability and […]

Combining Write Ahead Log (WAL) with replication in a hybrid consistency model is recommended for resilient systems requiring fault tolerance.

Scattered Spider member arrested in Spain. Group evolves tactics, targets SaaS apps for data theft. FBI prepares charges against hackers tied to high-

SRE Weekly Issue #429 – SRE WEEKLY

- sreweekly.com - June 16, 2024

Time to get down into the bits and bytes of how

Smishing Triad expands to Pakistan, while Google uncovers Brazilian threat actors PINEAPPLE, UNC5176, and FLUXROOT.

Pakistan-based UTA0137's cyber espionage campaign targeting Indian government with DISGOMOJI malware, exploiting DirtyPipe and Firefox scam.

Meta delays AI training on EU user data following regulatory intervention. Noyb files complaint in 11 European countries alleging GDPR violations.

A 22-year-old man from the United Kingdom arrested this week in Spain is allegedly the ringleader of Scattered Spider, a cybercrime group suspected of hacking into Twilio, LastPass, DoorDash, Mailchimp, and nearly 130 other organizations over the past two years.

Broadcom: Investing in Mainframe Success Beyond Code

- thenewstack.io devops - June 14, 2024

Broadcom's Mainframe Software Division is reshaping the traditional vendor-customer relationship by investing in modernizing the mainframe ecosystem and fostering a symbiotic partnership between both parties.

When managing a hybrid-cloud infrastructure, monitoring system health is essential for maintaining business continuity. Setting up comprehensive monitoring provides visibility into performance and availability of infrastructure components. By establishing alert thresholds and promptly responding to alarms, administrators can identify degraded performance or outages early. Quickly diagnosing and fixing the issues maximizes uptime. AWS Storage Gateway, […]

Learn how to configure an IAM Roles Anywhere solution that lets AWS Partner CRM Connector users authenticate with Salesforce using temporary AWS credentials, eliminating the need to hardcode them.

To plot a successful path to your company's future, you can't afford to throw it away or cede it to someone else to hold and control.

Does Nutanix Eat the Lunch VMware Doesn't Want?

- thenewstack.io cloud-native - June 14, 2024

At issue is how the business model for VMware products recently changed from that of a perpetual license-driven company to a subscription company.

Amazon Elastic Kubernetes Service (Amazon EKS) offers a powerful, Kubernetes-certified service to build, secure, operate, and maintain Kubernetes clusters on Amazon Web Services (AWS). It integrates seamlessly with key AWS services such as Amazon CloudWatch, Amazon EC2 Auto Scaling, and AWS Identity and Access Management (IAM), enhancing the monitoring, scaling, and load balancing of containerized […]

Engaging effectively with application teams is key in scaling out your cloud migration initiative. Some application teams want minimal involvement in the migration process. Others view it as opportunity to enable their engineers and learn by doing. In this post, I discuss the pros and cons and suitability criteria of three engagement models. Deliver ("do-for" […]

Member post by Fredric Newberg, CTO and Co-Founder of Embrace OTel spans are very powerful for gaining an understanding of the performance of mobile applications. However, given the restriction placed…

Grafana Labs and Embrace, a provider of a platform for troubleshooting mobile applications, this week extended their alliance to include integration with Grafana Cloud.

Noyb files complaint against Google's Privacy Sandbox, alleging user tracking and GDPR violations.

CSA Spotlight: Vishwas Manral | CSA

- cloudsecurityalliance.org - June 14, 2024

Longtime Cloud Security Alliance partner Vishwas Manral shares how CSA is leading the conversation when it comes to cloud and AI security.

It has become clear that developers prefer GraphQL over REST APIs for web client interfaces to deliver and use content more effectively.

Discover expert strategies for securing petabyte-scale data in this exclusive webinar. Essential insights for CISOs and IT professionals

Discover how regulated industries are adopting military-grade cyber defenses to mitigate risks and uphold compliance in an era of escalating cyber thr

Mastering Zero Trust Security in IT Operations | CSA

- cloudsecurityalliance.org - June 14, 2024

Adopting Zero Trust requires careful planning and execution. Here are a few steps to take to begin your Zero Trust implementation.

How the Kubernetes Community Celebrated Its 10th Anniversary

- thenewstack.io kubernetes - June 14, 2024

In many ways, the 10th anniversary of Kubernetes became a celebration of the community itself — of all the maintainers and contributors, the SIGs and developers advocates — and especially, all of the Kubernetes users around the world.

Discover critical vulnerabilities in ZKTeco biometric access systems, risking data theft and unauthorized access. Learn mitigation strategies now.

Explore how North Korean hackers are intensifying cyber attacks on Brazil's finance, aerospace, and defense sectors.

Mend.io this week added a MendAI tool to its application security portfolio that identifies code generated by an AI model.

Discover why Microsoft delays its AI-powered Recall feature for Copilot+ PCs due to privacy and security concerns.

Learn about best practices and components that define a great blueprint while exploring a fully working, serverless blueprint.

What Does the Modern Data Stack Actually Mean?

- thenewstack.io platform-engineering - June 13, 2024

Daniel Avancini offers some perspective on what the modern data stack means by outlining the history of data stacks, and the characteristics of a modern data stack.

Two Google Cloud security tools can help mitigate the risks posed by the XZ Utils vulnerability. Here's how.

Systems engineering learning resources to become an SRE

- GCP devops/sre blogs - June 13, 2024

Learn more about systems engineering and how to get started with these key resources curated by Google's Site Reliability Engineering (SRE) team.

Compute Engine spend optimization part 2

- GCP compute blogs - June 13, 2024

To save Compute Engine costs, you can fine-tune disk sizes, leverage committed use discounts, explore Cloud NAT, schedule instances, and use Spot VMs.

Learn more on how to approach and think about pricing throughout your cloud adoption journey with Azure.

Arid Viper launches mobile espionage campaign using trojanized Android apps to deliver AridSpy spyware, targeting Middle East users via fake messaging

Learn about Sleepy Pickle, a new threat exploiting machine learning models via pickle files. Protect your data now!

Harnessing Threat Intelligence for Proactive Security | CSA

- cloudsecurityalliance.org - June 13, 2024

Learn how threat intelligence transforms security from reactive to proactive, with strategies for prioritizing efforts, strengthening defenses, and enhancing incident response.

Are your third-party SaaS risks under control? Discover the four-step process to secure your SaaS ecosystem.

Shreds.AI today unveiled a namesake generative artificial intelligence (AI) platform based on a large language model (LLM) it trained.

The Imperative of Zero Trust for Federal Agencies | CSA

- cloudsecurityalliance.org - June 13, 2024

Bureaucratic resistance challenges Zero Trust adoption within government agencies. But the Identity and Access Management benefits are crucial.

Cisco Talos uncovers Operation Celestial Force, a long-running malware campaign by Pakistan-linked threat actors targeting Indian entities since 2018

SSLoad malware delivered by new PhantomLoader, evading detection. Offered as MaaS, it conducts reconnaissance and deploys payloads like Cobalt Strike.

Ukrainian Cyber Police arrest man for aiding Conti and LockBit ransomware groups, while U.S. takes down dark web drug markets.

Google warns of a Pixel Firmware security flaw (CVE-2024-32896) actively exploited as a zero-day. June 2024 update fixes 50 vulnerabilities.

Noodle RAT, a cross-platform backdoor used by Chinese hackers for espionage and cybercrime, targets Windows and Linux systems since 2016.

Google Thanks Docker, and Solomon Hykes Comes Home

- thenewstack.io kubernetes - June 12, 2024

The success of Kubernetes would not have been possible without the emergence of Docker. That's a big takeaway from the 10th anniversary celebration at Google HQ.

PlatformCon: How Spotify Manages Infrastructure with GitOps

- thenewstack.io platform-engineering - June 12, 2024

At PlatformCon this week, Spotify engineer Tim Hansen described how the music service relied on GitOps principles to automate infrastructure provisioning.

Based on discussions with several SAP on AWS customers, we have discovered that the number of SAP administration or operational task requirements often exceed the capacity of the available team. Due to lack of time, resources, and heavy focus on operations, strategic initiatives like digital transformations often remain unaddressed. Although 1P and 3P automation solutions […]

10 Years of Kubernetes: Past, Present, and Future

- thenewstack.io devops - June 12, 2024

Matt Butcher reflects on how things started, how Kubernetes marched to maturity, and how it displayed potential to expand into the WebAssembly movement.

Learn how Microsoft can help you and your team take advantage of an array of learning materials and interactive events that build your cloud expertise.

Using Generative AI assistants, instead of requiring a small army of software engineers, a smaller team will be able to manage applications.

CCSK v5: The New Standard in Cloud Security Expertise | CSA

- cloudsecurityalliance.org - June 12, 2024

The upcoming version of the Certificate of Cloud Security Knowledge has been revised to include new topics such as AI. Learn what's coming in CCSK v5.

Wiz researchers uncover an ongoing cryptojacking campaign targeting misconfigured Kubernetes clusters to mine Dero cryptocurrency.

Customers are increasingly seeking tools and solutions that can help them achieve their desired outcomes more efficiently and effectively. In the context of cloud management, the need for self-service capabilities has become more pronounced as organizations strive to optimize their cloud resources, improve security, and enhance their overall cloud operations. AWS Service Catalog offers the […]

2024 DBIR: Key Vulnerability Exploitation Trends | CSA

- cloudsecurityalliance.org - June 12, 2024

Explore the 2024 Verizon DBIR insights on vulnerability exploitation, rising attack vectors, and the critical need for faster remediation to enhance data security.

The Splunk data management tools allow IT organizations to preprocess via a single pipeline to provide a consistent level of visibility

Lessons from the Ticketmaster-Snowflake Breach

- thehackernews.com - June 12, 2024

Learn about the Ticketmaster-Snowflake breach, cybersecurity lessons, and how to safeguard data effectively.

Symantec uncovers Black Basta ransomware exploiting Windows flaw. Learn about Cardinal group's cyber threats via Microsoft products.

Integrating SASE and Zero Trust PAM for Enhanced Security | CSA

- cloudsecurityalliance.org - June 12, 2024

Discover how combining SASE and Zero Trust PAM strengthens enterprise security by providing comprehensive visibility, rigorous access controls, and compliance across digital environments.

Learn about WARMCOOKIE, a new Windows backdoor targeting job seekers in a sophisticated phishing campaign.

China-backed hackers exploit Fortinet flaw, breaching 20,000 systems globally. Dutch NCSC reveals state-sponsored cyber campaign.

Microsoft's June Patch Tuesday fixes 51 vulnerabilities, including critical flaws. Stay protected with the latest updates.

Google Cloud and Oracle Partner to accelerate cloud transformation with Oracle Database@Google Cloud.

Patch Tuesday, June 2024 "Recall" Edition

- krebsonsecurity.com - June 11, 2024

Microsoft today released updates to fix more than 50 security vulnerabilities in Windows and related software, a relatively light Patch Tuesday this month for Windows administrators. The software giant also responded to a torrent of negative feedback on a new…

We're excited to announce that our Europe (London) Region has renewed our accreditation for United Kingdom (UK) Police-Assured Secure Facilities (PASF) for Official-Sensitive data. Since 2017, the Amazon Web Services (AWS) Europe (London) Region has been assured under the PASF program. This demonstrates our continuous commitment to adhere to the heightened expectations of customers with […]

AWS is focusing most of its cybersecurity efforts on a new generation of cloud infrastructure that is inherently more secure.

Streamlined APM Integration in Cloud Native Buildpacks

- thenewstack.io devops - June 11, 2024

For those reluctant to use open source Buildpacks, it's time to reconsider.

Amazon Web Services (AWS) provides tools that simplify automation and monitoring for compliance with security standards, such as the NIST SP 800-53 Rev. 5 Operational Best Practices. Organizations can set preventative and proactive controls to help ensure that noncompliant resources aren't deployed. Detective and responsive controls notify stakeholders of misconfigurations immediately and automate fixes, thus […]

How Cynet Makes MSPs Rich & Their Clients Secure

- thehackernews.com - June 11, 2024

Discover how Cynet's All-in-One Cybersecurity Platform revolutionizes MSP operations, maximizing efficiency, profit, and client protection.

Google was named a Leader in The Forrester Wave: Cybersecurity Incident Response Services Report for Q2 2024. Read more about the report.

New research reveals SecShow, a Chinese actor using DNS probes to measure responses from open resolvers.

Amazon Web Services (AWS) is designed to be the most secure place for customers to run their workloads. From day one, we pioneered secure by design and secure by default practices in the cloud. Today, we're taking another step to enhance our customers' options for strong authentication by launching support for FIDO2 passkeys as a […]

AWS Cloud WAN is a managed wide-area networking (WAN) service that you can use to build and operate wide area networks that connect your data centers and branch offices, as well as your Amazon Virtual Private Cloud (Amazon VPC) VPCs. You can use network policies to centrally configure and automate network management and security tasks, […]

Responsible AI compliance with AWS Audit Manager's "Generative AI Best Practices v2" framework for SageMaker.

New custom policy checks for critical resources, public access detection, and guided revocation to remove unused permissions - proactively securing AWS environments with tailored analysis and actionable insights.

Streamline compliance and security analysis using natural language query generation. Ask questions like "What errors occurred last month?" and get ready-to-run SQL queries tailored to your needs – no technical expertise required.

Amazon GuardDuty expands malware scanning to secure S3 uploads, enabling continuous monitoring and isolation of malicious files without infrastructure overhead.

Fortify your AWS account security with new passkey MFA and mandatory root user MFA. Experience seamless authentication while bolstering protection against unauthorized access.

What is Continuous Controls Monitoring? | CSA

- cloudsecurityalliance.org - June 11, 2024

Continuous Controls Monitoring has revolutionized GRC by streamlining audits, providing real-time assessment of an organization's security controls.

Discover the top 10 network vulnerabilities and actionable solutions from Vonahi Security's annual pentest report.

Assessing AI Risks: Questions for Vendor Compliance | CSA

- cloudsecurityalliance.org - June 11, 2024

Learn how to assess AI risks with third-party vendors by focusing on cybersecurity, industry regulations, and company culture to ensure compliance and data protection.

Discover Apple's groundbreaking Private Cloud Compute system, enhancing cloud AI processing with top-tier security.

Cybersecurity researchers have identified an updated version of ValleyRAT with new commands for capturing screenshots, process filtering, and more.

Up to 165 Snowflake customers affected by data theft and extortion campaign.

Arm discloses a critical vulnerability (CVE-2024-4610) in Mali GPU Kernel Drivers. This flaw, actively exploited, affects versions from r34p0 to r40p0

The collaboration of a software testing solutions company with AI from IBM to help streamline the software testing process for developers.

Today, we're announcing that a new AWS Region will be coming to Taiwan by early 2025. The new AWS Asia Pacific (Taipei) Region will consist of three Availability Zones at launch, and will give AWS customers in Taiwan the ability to run workloads and store data that must remain in Taiwan. Each of the Availability […]

Organizations meet business and regulatory requirements by having visibility and control over backup environments. You want a streamlined solution to continuously monitor, detect, and track policy drifts across your backup deployments at scale. This need is driven by the growing complexity of AWS environments, the proliferation of data across diverse AWS services and regions, and […]

As Amazon CTO Werner Vogels said, "Encryption is the tool we have to make sure that nobody else has access to your data. Amazon Web Services (AWS) built encryption into nearly all of its 165 cloud services. Make use of it. Dance like nobody is watching. Encrypt like everyone is." Security is the top priority […]

Hydrolix Takes on Skyrocketing Log Data Bills

- thenewstack.io observability - June 10, 2024

It offers a cost-efficient way to handle a firehose of immutable log data plus reporting and analytics with index search on top of object storage.

The purpose of this blog is to provide guidance on how AWS License Manager can solve common license management challenges faced by organizations during Mergers & Acquisitions (M&A). In Deloitte's white paper "Making a 'poison pill" easier to swallow: How to manage M&A-related software licensing costs and compliance risks", Deloitte highlights three major obstacles faced […]

This proposal aims to introduce the physical plan conversion, validation, and fallback mechanisms from the Gluten project into Apache Spark.

To help mitigate the risks associated with excessive privileges and misuses of elevated access, we are excited to announce Google Cloud's built-in Privileged Access Manager.

Slurm-GCP v6 is now GA

- GCP compute blogs - June 10, 2024

Slurm-GCP v6 helps automate the installation, deployment, and running Slurm, simplifying HPC workload management on Google Cloud.

Securely deploying a network architecture that aligns with FedRAMP High? We've outlined several best practices. Here's how you can use them.

In the last AWS Weekly Roundup, Channy reminded us on how life has ups and downs. It's just how life is. But, that doesn't mean that we should do it alone. Farouq Mousa, AWS Community Builder, is fighting brain cancer and Allen Helton, AWS Serverless Hero, his daughter is fighting leukemia. If you have a […]

Mergers and acquisitions (M&As) offer organizations the opportunity to scale operations, diversify product lines, and capture new markets. However, they come with a set of challenges, such as the nuances of integrating legacy IT systems, complying with stringent regulations, and maintaining business continuity, etc. Eliminating the redundancy of resources and optimizing processes to bring consistency […]

A new phishing attack distributing More_eggs malware is targeting recruiters by posing as job applicants on LinkedIn.

Member post originally published on Fairwinds' blog by Dexter Garner There are many things you can monitor in Kubernetes but you need to understand what is mission-critical in terms of monitoring.

Torrance, United States / California, 10th June 2024, CyberNewsWire

Securing AWS S3 Buckets: Risks and Best Practices | CSA

- cloudsecurityalliance.org - June 10, 2024

Discover how to secure AWS S3 buckets by addressing common risks like unauthorized access and malware uploads, and learn best practices for permissions, encryption, and monitoring.

Attention Azure users! Microsoft warns of potential abuse of Azure Service Tags by malicious actors. Learn how to protect your cloud resources from un

Google takes down 1,320 YouTube channels and 1,177 Blogger blogs linked to Chinese influence operation. Find out more about the coordinated campaign t

Cybersecurity CPEs: Unraveling the What, Why & How

- thehackernews.com - June 10, 2024

Did you know CISSP holders need to earn 120 CPE credits every three years? Learn how these credits help keep your skills sharp and your certifications

The Human Element in AI-Enhanced SOCs | CSA

- cloudsecurityalliance.org - June 10, 2024

Security Operations Centers are using AI to boost defenses. SOC analysts play a crucial role interpreting AI outputs and ensuring continuous improvement.

Highlighting some of the latest career opportunities in the world of DevOps, including available positions at Ascendion, Peraton and NVIDIA.

AI Training - DevOps.com

- devops.com - June 10, 2024

There will come a time when how AI works will be a an unknowable mystery that can be explained only by a belief in the existence of magic. There will come a time when how AI works will be a an unknowable mystery that can be explained only by a belief in the existence of magic.

New threat actor Sticky Werewolf is expanding its targets in Russia and Belarus, hitting sectors like pharmaceuticals and aviation.

Much of your project's commercial success hangs on its infrastructure. It is a powerful thing that can speed

How Data Integration Is Evolving Beyond ETL

- thenewstack.io storage - June 09, 2024

Forward-looking technologies are generally cutting-edge and used by early adopters, offering some business value.

Linux Skills: Manage System Services

- thenewstack.io operations - June 09, 2024

System administrators are responsible for service management on Linux devices. Here is what they need to know about configuration, startup options, security and more.

SRE Weekly Issue #428 – SRE WEEKLY

- sreweekly.com - June 09, 2024

This article presents in incident theme that I've lived through many times but never had such a pithy name for.

New Critical PHP Vulnerability CVE-2024-4577 allows remote code execution on Windows.

Microsoft's AI-powered Recall feature sparked major privacy concerns. Now, it's becoming an opt-in.

Last night a very special event offered over three hours of insights and history about the world's second-largest open source

WarpStream, an AWS Partner, is a drop-in replacement for Apache Kafka. WarpStream's cloud-native architecture makes it as easy to deploy and manage as a stateless web server like NGINX. WarpStream clusters can scale up to handle multiple GiB-per-second workloads as quickly as compute resources are assigned and then scale back down to zero after the […]

Kubernetes is ten years old!

- cncf.io - June 07, 2024

On June 6, 2014, Joe Beda made the first commit to Kubernetes, and suddenly a movement was born. Kubernetes has changed the world over the last ten years. Happy 10th birthday Kubernetes!

Ransomware, DDoS, data breaches—attacks are on the rise. But there's hope. Basic cyber hygiene can make a difference.

Researchers have uncovered that the LightSpy spyware, previously thought to target iOS, has a macOS variant.

Ambassador post originally published on the Logz.io blog by Dotan Horovits Troubleshooting within Kubernetes environments can be a daunting task. If we could only have a magical artificial…

Member blog post by Abhishek Singh, Christos Kalkanis, Alexander Wert, and Bahubali Shetti of Elastic In March 2023, OpenTelemetry took a big step towards this goal by merging a profiling data model…

Khushboo Khatter is an IT professional with over 8 years of experience and 6 of those working with Kubernetes. She has a passion for cloud technologies and enjoys exploring cutting-edge CNCF tools.

Application Security Solutions: CNAPP vs CSPM vs ASPM | CSA

- cloudsecurityalliance.org - June 07, 2024

Learn about the differences between ASPM, CSPM, and CNAPP security solutions and how to make informed application security decisions.

With the emergence of generative AI being incorporated into every aspect of how we utilize technology, a common question that customers are asking is how to properly audit generative AI services on AWS, such as Amazon Bedrock, Amazon Sagemaker, Amazon Q Developer, and Amazon Q Business. In this post, we will demonstrate common scenarios that […]

How to Protect High-Profile Employees' Sensitive Data | CSA

- cloudsecurityalliance.org - June 07, 2024

This blog breaks down the data sources that generate the most actionable notifications regarding high-profile employees' data.

Cyber Landscape is Evolving - So Should Your SCA

- thehackernews.com - June 07, 2024

Traditional SCA tools often miss critical vulnerabilities and create alert fatigue. Learn how to protect your software supply chain from emerging thre

The article highlights the growing concerns and regulatory challenges around the use of AI technologies by major tech companies.

Hardware Security Module Security Considerations | CSA

- cloudsecurityalliance.org - June 07, 2024

A hardware security module (HSM) is a platform for performing cryptography functions. Here are important security controls for HSM as a Service.

Operators, administrators, developers, and many other personas leveraging AWS come across multiple common issues when it comes to troubleshooting in the AWS Console. To help alleviate this burden, AWS released Amazon Q. Amazon Q is AWS's generative AI-powered assistant that helps make your organizational data more accessible, write code, answer questions, generate content, solve problems, […]

AWS CodeBuild now supports managed self-hosted GitHub Action runners, allowing you to build powerful CI/CD capabilities right beside your code and quickly implement a build, test and deploy pipeline. Last year AWS announced that customers can define their GitHub Actions steps within any phase of a CodeBuild buildspec file but with a self-hosted runner, jobs […]

FBI has 7,000+ decryption keys for LockBit ransomware to help victims recover their data for free. If you're a victim, don't pay the ransom.

Ukrainian defense forces targeted by SPECTR malware in SickSync espionage campaign. Learn more about the tactics used by the Vermin group and how to p

Cybercriminals are exploiting vulnerabilities in Docker and ThinkPHP to deploy cryptominers and web shells.

CentOS 7's official end of life is June 30th. What should a DevOps team do? Consider your choices.

Siemens is a technology company focused on industry, infrastructure, transport, and healthcare. From resource-efficient factories, resilient supply chains, and smart buildings and grids, to cleaner and more comfortable transportation and advanced healthcare, the company creates technology with purpose, adding real value for its customers. Siemens technology is everywhere, supporting the critical infrastructure and vital industries […]

Map enterprise controls to AWS data sources effortlessly with predefined, pre-mapped controls based on auditor reviews. Automatically inherit improvements as Audit Manager updates.

Several Cisco platforms will gradually be integrated into one, including Cisco AppDynamics, the Cisco ThousandEyes networking monitor service and the Splunk platform.

Software sprints have become an article of faith in the technology world. In competitive industries that are driven by software,

Securely sharing large files and providing controlled access to private data are strategic imperatives for modern organizations. In an era of distributed workforces and expanding digital landscapes, enabling efficient collaboration and information exchange is crucial for driving innovation, accelerating decision-making, and delivering exceptional customer experiences. At the same time, the protection of sensitive data remains […]

During a recent visit to Microarch, Ben Titzer described Virgil as a language designed for building lightweight high-performance systems.

Another five myths about platform engineering

- GCP devops/sre blogs - June 06, 2024

Part two of a series on platform engineering myths, covering how it's built, what it does, and what it doesn't do.

GKE Compliance reports on cluster and workload posture

- GCP containers blogs - June 06, 2024

The new GKE Compliance makes maintaining compliance for your Kubernetes clusters is easier than ever before.

Introduction Galaxy is a scientific workflow, data integration, and digital preservation platform that aims to make computational biology accessible to research scientists that do not have computer programming or systems administration experience. Although it was initially developed for genomics research, it is largely domain agnostic and is now used as a general bioinformatics workflow management […]

As we celebrate the anniversary of the first Kubernetes commit, we're thrilled to announce the Kubernetes 10th Anniversary Logo Design Contest winner and unveil the winning design.

Guest post by Rajiv Thakkar, Director of Product Marketing, Portworx, Pure Storage (LinkedIn) Today, June 6, marks the 10th anniversary of Kubernetes. Kubernetes originally began as a project in…

Kubernetes: 48% of Users Struggle With Tool Choice

- thenewstack.io platform-engineering - June 06, 2024

Platform engineering appears to ease some of the pain points associated with using Kubernetes in production, says a new survey by Spectro Cloud.

Despite their critical role in data integration, Extract, Transform and Load processes are prone to challenges, especially during testing.

Kubernetes is the most popular container orchestration platform in the world right now, and its popularity doesn't seem to be waning

Making the Backslash application security platform even more secure with news of added support as well as a revamped, simpler user interface.

Muhstik DDoS botnet is exploiting a critical vulnerability (CVE-2023-33246) in Apache RocketMQ to infect servers.

Zero Trust Hitting 'Critical Mass' at Federal Level | CSA

- cloudsecurityalliance.org - June 06, 2024

In this recap of a recent fireside chat, hear from Chris DeRusha, Federal CISO at the OMB, about the OMB's 2022 Zero Trust Executive Order.

Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill's threat experts.

AI in Risk Assessment and Mitigation | CSA

- cloudsecurityalliance.org - June 06, 2024

Companies often overlook the security risks that come with AI. This article introduces you to the concept of AI risk management.

Discover the importance of complex passwords and continuous monitoring to safeguard your organization.

Threat actors are now exploiting legitimate packer software to distribute malware. Learn how BoxedApp is being abused to target financial institutions

Starting Dec 1, 2024, Google Maps Timeline data will be stored locally on users' devices, boosting privacy.

Attention Python developers! A malicious package named "crytic-compilers" was found on PyPI, delivering the Lumma information stealer.

Meta created an internal toolkit to help improve the accuracy of AI predictions. Its engineers say it has a hefty set of features that makes a big difference.

The vibrant AWS community is made up of millions of builders worldwide. Within this global audience, there are technical enthusiasts who are going above and beyond to solve problems and generously share their learnings and best practices to empower others—the AWS Heroes. These inspirational leaders make significant contributions, and the AWS Heroes program is our […]

The add-on simplifies finding, understanding, and optimizing tests via a chat interface.

Member post originally published on the Palark blog by Dmitry Shurupov, editor-in-chief, Palark In the recent werf v2.0 release, the CI/CD solution has unveiled a new deployment engine called Nelm.

By Taylor Dolezal, Head of Ecosystem, CNCF The Cloud Native Computing Foundation (CNCF) is thrilled to announce our second cohort of the Zero to Merge program. This comprehensive four-week journey…

Unlock a transformative approach to managing container networking with Advanced Container Networking Services for your Azure Kubernetes Service clusters. Learn more.

BigQuery now integrates with Sensitive Data Protection with native SQL functions that allow interoperable deterministic encryption and decryption.

Aviator scales developer collaboration with Google Cloud

- GCP devops/sre blogs - June 05, 2024

Learn how Aviator is bringing Google-level engineering productivity to developers with help from Google Cloud.

The Risks of AI: Air Canada's Chatbot Debacle | CSA

- cloudsecurityalliance.org - June 05, 2024

A recent incident involving Air Canada's AI chatbot serves as a reminder of the risks associated with relying solely on AI technology.

The Kubernetes Gateway API, an inherent Kubernetes component, offers a standardized approach for managing and configuring incoming traffic inside Kubernetes deployments.

The Prerogative of Power - DevOps.com

- devops.com - June 05, 2024

When corporate governance is executed by edict, the only practical way for the lower echelons to disagree is to head for the nearest exit.

Chinese state-sponsored hackers target Southeast Asian government in complex cyber espionage campaign.

Unpacking 2024's SaaS Threat Predictions

- thehackernews.com - June 05, 2024

The hidden use of AI in SaaS apps is a growing concern! Over 8,500 apps embed AI, many leveraging user data without clear transparency.

CSA Spotlight: Thought Leadership with Shruti Kulkarni | CSA

- cloudsecurityalliance.org - June 05, 2024

Hear from Cybersecurity Architect Shruti Kulkarni about helping to produce CSA's Zero Trust research and thought leadership.

RansomHub emerges as a rebranded Knight ransomware, linked to recent high-profile attacks.

Critical updates released for NAS326 and NAS542 devices address severe vulnerabilities that could allow unauthenticated attackers to execute OS comman

A bug in TikTok allowed hackers to take control of high-profile accounts through a zero-click account takeover exploit.

Join us in Philadelphia, Pennsylvania, on June 10–12, 2024, for AWS re:Inforce, a security learning conference where you can enhance your skills and confidence in cloud security, compliance, identity, and privacy. As an attendee, you will have access to hundreds of technical and non-technical sessions, an Expo featuring Amazon Web Services (AWS) experts and AWS […]

The Power of Nautobot and the Path to a Data-Driven Future

- thenewstack.io networking - June 04, 2024

Network automation is a rapidly evolving field, so it's important to balance developing strong fundamentals with keeping up with emerging technology trends.

Today, we released the CloudFront Hosting Toolkit, an open source command line interface (CLI) tool to help you deploy fast and secure front-ends in the cloud. Install the CloudFront Hosting Toolkit CLI through npm, run two commands, and CloudFront Hosting Toolkit CLI automatically creates the deployment pipeline and infrastructure needed to build, deploy, and serve your front-end […]

Russian organizations under sustained cyberattack! APT group HellHounds is using a new Windows variant of Decoy Dog malware to infiltrate critical inf

How to Attract the Right Talent for Your Engineering Team

- thenewstack.io platform-engineering - June 04, 2024

The person you hire won't just be coding in a silo; they'll be communicating and collaborating with different teams across the organization.

What's new withGoogle Cloud NetApp Volumes

- GCP storage blogs - June 04, 2024

The Google Cloud NetApp Volumes fully managed file storage service has new enterprise data management capabilities.

Critical security flaw discovered in Progress Telerik Report Server (CVE-2024-4358, CVSS 9.8/10). Remote attackers could bypass authentication.

CSA STAR: Securing the Cloud and Beyond | CSA

- cloudsecurityalliance.org - June 04, 2024

Understand the elements of the CSA STAR program and learn what's coming in the future, including genAI assurance and mappings with other standards.

Member post by Nigel Douglas, Senior Developer Advocate at Sysdig Kubernetes will celebrate its 10th anniversary at the "KuberTENes Birthday Bash" this week. This milestone is a perfect time to…

Today, we released the CloudFront Hosting Toolkit, an open source command line interface (CLI) tool to help you deploy fast and secure front-ends in the cloud. Install the CloudFront Hosting Toolkit CLI through npm, run two commands, and CloudFront Hosting Toolkit CLI automatically creates the deployment pipeline and infrastructure needed to build, deploy, and serve your front-end […]

Streamlining Compliance with AI: Faster, Error-Free Audits | CSA

- cloudsecurityalliance.org - June 04, 2024

Discover how AI transforms compliance management by automating error detection, routine tasks, and speeding up the process, helping organizations stay ahead in a fast-changing regulatory landscape.

Browser Isolation, once the gold standard for browser security, is no longer sufficient in today's SaaS-centric world. Learn about the limitations and

A limited number of Snowflake customers are being targeted using stolen credentials via infostealing malware.

A sophisticated malware campaign is deploying Cobalt Strike to seize control of compromised hosts in Ukraine.

Detecting Suspicious Activity in Email Communications | CSA

- cloudsecurityalliance.org - June 04, 2024

Learn about the techniques, tools, and technologies to use for vendor fraud detection.

Notorious DarkGate malware has shifted to using AutoHotkey for its last stages, making detection even more challenging.

Google Sovereign Cloud's collaboration with customers, local sovereign partners, governments, and regulators has grown. Read on to learn how.

The U.S. cybersecurity agency has added Oracle WebLogic Server Vulnerability CVE-2017-3506 to its Known Exploited Vulnerabilities catalog.

Overview When operating complex, distributed systems in the cloud, quickly identifying the root cause of issues and resolving incidents can be a daunting task. Troubleshooting often involves sifting through metrics, logs, and traces from multiple AWS services, making it challenging to gain a comprehensive understanding of the problem. So how can you streamline this process […]

Understand the Google Cloud - Gitlab integration

- GCP devops/sre blogs - June 03, 2024

The Google Cloud - GitLab integration improves the developer experience by removing complexity from managing tools and helping them maintain “flow.”

Introduction Freddie Mac has a mission to provide a stable US housing Market. Freddie Mac identified the need for faster application delivery, scalable performance, increased resiliency, and cost optimization of their existing application portfolio. To achieve their mission goals, Freddie Mac undertook a migration from on-premises Kubernetes to Amazon Elastic Kubernetes Service (Amazon EKS). As […]

Member post originally published on SuperOrbital's blog by Keegan McCallum In the previous parts of this blog post series, we explored the fundamentals of using the NVIDIA Device Plugin to manage GPU…

Serverless Architecture & Cloud-Native App Protection | CSA

- cloudsecurityalliance.org - June 03, 2024

The benefits of serverless architecture, including identity and access management, help reduce attack surfaces & secure cloud-native applications.

Life is not always happy, there are difficult times. However, we can share our joys and sufferings with those we work with. The AWS Community is no exception. Jeff Barr introduced two members of the AWS community who are dealing with health issues. Farouq Mousa is an AWS Community Builder and fighting brain cancer. Allen […]

A new suspicious package named "glup-debugger-log" has been discovered on the npm registry, designed to drop a RAT on compromised systems.

Law enforcement is seeking information on an individual named Odd, believed to be the mastermind behind the Emotet malware.

Cloud Threats Deploying Crypto CDN | CSA

- cloudsecurityalliance.org - June 03, 2024

A malicious campaign used the blockchain-based Meson service to reap rewards ahead of the crypto token unlock. Learn what happened in the attack.

Discover how AI is transforming enterprise security and the associated risks in Cato's latest SASE Threat Report.

Decommissioning Orphaned & Stale Non Human Identities | CSA

- cloudsecurityalliance.org - June 03, 2024

Unmanaged non-human identities (NHIs) pose a significant security risk since they often operate outside traditional IT security reviews.

Researchers discovered authorization bypass vulnerabilities in Cox modems that could have allowed hackers to access and control millions of devices.

North Korea-linked threat actor Andariel is using a new Golang-based backdoor called Dora RAT to target educational and manufacturing sectors in South

Are you open to work? Or perhaps just considering a change? Check out our weekly round-up of DevOps job opportunities.

Beware of fake browser updates! Cybercriminals are using this tactic to deliver dangerous malware like BitRAT and Lumma Stealer.

Just getting started with DevSecOps and need a primer for the tools and processes to employ? This should help.

Action item template

- surfingcomplexity.blog - June 02, 2024

We're thrilled that you want to contribute to improving the system in the wake of an incident! For each post-incident action that you are proposing, we would appreciate it if you would fill o…

DEVOPS WEEKLY ISSUE #700 - 2nd June 2024

- devopsweeklyarchive.com - June 02, 2024

Devops Weekly is going to take a break.

SRE Weekly Issue #427 – SRE WEEKLY

- sreweekly.com - June 02, 2024

Written by a GitHub employee, this article seeks to answer the titular question, with discussions of noise reduction concerns and incidents that affect only a subset of customers.

Hugging Face detected unauthorized access to its Spaces platform. A subset of secrets might have been accessed without authorization.

AWS users who need to comply with the most stringent US government security and compliance requirements operate their workloads in AWS GovCloud (US), which is architected as a separate partition providing network and identity isolation. A common use case for AWS GovCloud (US) users is to operate in both AWS GovCloud (US) Regions and commercial AWS Regions, such as […]

Over 600,000 routers bricked in a massive cyber attack targeting a single U.S. ISP.

Cluster.dev: Expanding the Options for SaaS Deployment

- thenewstack.io cloud-native - May 31, 2024

The concerns about data security and compliance compel certain customers to explore alternative ways of SaaS implementation.

Amazon Connect's analytics data lake centralizes customer data for powerful performance analysis without complex pipelines.

Using GKE golden signals, Generali identified annual savings of more than €260,000 per year, representing a 41% reduction in GKE spend.

Community post originally published on dev.to by Sunny Bhambhani There may be cases wherein we just need to update a Kubernetes configmap or any other Kubernetes object based on our requirements.

KCD post originally published on Linkedin by the Kubernetes Community Days UK – London team From https://www.cncf.io/kcds/ KCDs are community-organized events that gather adopters and technologists…

Navigate Ransomware Attacks in a Digital World | CSA

- cloudsecurityalliance.org - May 31, 2024

Ransomware attacks have become a prevalent threat, disrupting businesses and causing significant financial losses.

Amazon CodeCatalyst is a modern software development service that empowers teams to deliver software on AWS easily and quickly. Amazon CodeCatalyst provides one place where you can plan, code, and build, test, and deploy your container applications with continuous integration/continuous delivery (CI/CD) tools. CodeCatalyst recently announced the teams feature, which simplifies management of space and […]

Microsoft highlights the critical need to secure internet-exposed OT devices amidst rising cyber attacks.

Metrics, Traces, Logs — And Now, OpenTelemetry Profile Data

- thenewstack.io observability - May 31, 2024

With the addition of profiling to OpenTelemetry, we expect continuous production profiling to hit the mainstream.

What is Agile Compliance? | Continuous Monitoring | CSA

- cloudsecurityalliance.org - May 31, 2024

Learn all about agile compliance and how continuous monitoring is revolutionizing risk management and governance.

This blog post is written by Brian Daugherty, Principal Solutions Architect. Enrico Liguori, Solution Architect, Networking. Sedji Gaouaou, Senior Solution Architect, Hybrid Cloud. Network traffic inspection on AWS Outposts rack is a crucial aspect of making sure of security and compliance within your on-premises environment. With network traffic inspection, you can gain visibility into the […]

The software testing and monitoring company SmartBear has introduced GenAI technology to tools, enhancing software development and testing.

Digital content sharing has exponentially increased cyber threat risks. Everfox's prevention-based approach is the future of cybersecurity.

Achieving ISO 9001: Key Compliance Strategies | CSA

- cloudsecurityalliance.org - May 31, 2024

Learn the essential steps for aligning your QMS with ISO 9001 clauses 4-10, covering context, leadership, planning, support, operation, performance evaluation, and improvement.

Russian GRU-backed threat actor APT28 is behind campaigns targeting networks across Europe with HeadLace malware and credential-harvesting web pages.

OpenAI has identified and cut off five covert operations from China, Iran, Israel, and Russia that abused AI tools to manipulate online discourse.

Catchpoint's value proposition is simple to understand. It monitors website and application performance beyond your own infrastructure to provide a "user's-eye view."

This can help DevSecOps teams identify open source software projects that are not being well maintained.

CVE-2024-1086, a high-severity flaw in the Linux kernel, is actively exploited, allowing attackers to gain root access.

'Operation Endgame' Hits Malware Delivery Platforms

- krebsonsecurity.com - May 30, 2024

Law enforcement agencies in the United States and Europe today announced Operation Endgame, a coordinated action against some of the most popular cybercrime platforms for delivering ransomware and data-stealing malware. Dubbed "the largest ever operation against botnets," the international effort…

The Path to SOC 2 Compliance for Startups | CSA

- cloudsecurityalliance.org - May 30, 2024

SOC 2 compliance for startups can be a massive undertaking. Submitting to the CSA STAR Registry demonstrates your path to SOC 2 certification and more.

AWS customers using Terraform as their IaC tool can now benefit from faster time-to-market by building cloud infrastructure with the latest AWS innovations that are typically available on the Terraform AWS CC Provider on the day of launch.

Cloudflare disrupts month-long phishing campaign by Russia-aligned FlyingYeti targeting Ukraine.

Cisco Talos uncovers a previously unknown cyber espionage group targeting organizations in the U.S., Europe, and Asia since 2021.

Mandiant founder and outgoing CEO Kevin Mandia shares the highlights from his keynote address at the RSA Conference earlier this month.

Google Cloud recently asked Coalfire to examine our current processes and measured alignment and maturity toward NIST and ISO objectives for AI development. Here's what they found.

Compute Engine spend optimization part 1

- GCP compute blogs - May 30, 2024

The first five of ten ways to reduce Compute Engine costs, from optimizing your infrastructure to taking advantage of discounts.

Member post by DatenLord In the previous article, we started from why we need command deduplication mechanism, introduced the necessity of deduplication and some problems of the current deduplication…

RedTail malware strikes again! Now exploiting a critical Palo Alto Networks firewall vulnerability (CVE-2024-3400).

Researchers have discovered several vulnerabilities in popular WordPress plugins that allow attackers to create rogue admin accounts.

In this post, we'll show how you can use AWS Private Certificate Authority (AWS Private CA) to issue a wide range of X.509 certificates that are tailored for specific use cases. These use-case bound certificates have their intended purpose defined within the certificate components, such as the Key Usage and Extended Key usage extensions. We […]

Learn how to enhance your cybersecurity program with a robust cyber resilience strategy, ensuring your organization can quickly recover from breaches and adverse events.

How to Build Your Autonomous SOC Strategy

- thehackernews.com - May 30, 2024

Learn how AI-driven tools can revolutionize your Security Operations Center by automating alert triage and enhancing efficiency.

Europol takes down major malware loader operations in Operation Endgame. Over 100 servers dismantled and four arrests made.

Explore the critical role of visibility in applying the principle of least privilege, reducing risks from unused privileges, and achieving a zero trust environment.

U.S. Department of Justice dismantled a botnet consisting of 19 million infected devices.

Okta warns of a vulnerability in the cross-origin authentication feature of their Customer Identity Cloud (CIC).

Is Your Computer Part of 'The Largest Botnet Ever?'

- krebsonsecurity.com - May 29, 2024

The U.S. Department of Justice (DOJ) today said they arrested the alleged operator of 911 S5, a ten-year-old online anonymity service that was powered by what the director of the FBI called "likely the world's largest botnet ever." The arrest…

A data perimeter on Amazon Web Services (AWS) is a set of preventive controls you can use to help establish a boundary around your data in AWS Organizations. This boundary helps ensure that your data can be accessed only by trusted identities from within networks you expect and that the data cannot be transferred outside […]

Many users rely on Amazon Elastic Compute Cloud (Amazon EC2) instances and Amazon Elastic Block Store (Amazon EBS) volumes to run their business critical Microsoft Windows-based workloads on AWS. These critical applications often span across multiple EBS volumes attached to EC2 instances. To make sure of the integrity and recovery of such vital workloads, users […]

A new malicious Python package named "pytoileur" has been discovered in the Python Package Index (PyPI) repository.

Node Overhead: The Hidden Cost Eating Your Kubernetes Spend

- thenewstack.io kubernetes - May 29, 2024

Because node costs are generally the largest drivers of Kubernetes spending, a few percent in spending lost to node overhead can greatly impact the bottom line.

Streamline data access with trusted identity propagation: simplify sign-in, define fine-grained permissions, and audit using actual user identities across selected AWS analytics services.

Common myths about platform engineering

- GCP devops/sre blogs - May 29, 2024

We present five common myths about platform engineering - what it is and what it isn't - that we've heard when folks aren't considering the whole picture.

Amazon Web Services (AWS) is pleased to announce the successful renewal of the United Kingdom Cyber Essentials Plus certification. The Cyber Essentials Plus certificate is valid for one year until March 22, 2025. Cyber Essentials Plus is a UK Government–backed, industry-supported certification scheme intended to help organizations demonstrate controls against common cyber security threats. An […]

With numerous AWS accounts in an organization, receiving an external security finding like a vulnerability assessment or pen test report impacting multiple resources can be challenging. Without a centralized resource viewing and search capability, identifying the affected resources require switching and inspecting each account individually, which is time-consuming and inefficient. Security vulnerabilities are time-sensitive, and […]

Harness today revealed it has acquired Split Software to help extend the features management capabilities of its DevOps portfolio.

Check Point has discovered a zero-day vulnerability (CVE-2024-24919) in its Network Security gateway products, which has been exploited in the wild.

New banking trojan targets Brazilian institutions! AllaSenha, a custom variant of AllaKore RAT, is stealing credentials and leveraging Azure cloud for

The Shift to SDP: Enhanced Cybersecurity | CSA

- cloudsecurityalliance.org - May 29, 2024

VPNs are being heavily scrutinized. Software-Defined Perimeter is a cybersecurity model that's becoming the go-to solution for secure remote access.

The 2024 elections face unprecedented cyber threats and AI-driven disinformation. Learn about key risks, protection strategies, and the importance of robust security measures.

RSA Conference 2024 drew 650 speakers, 600 exhibitors, and thousands of security practitioners from across the globe to the Moscone Center in San Francisco, California from May 6 through 9. The keynote lineup was diverse, with 33 presentations featuring speakers ranging from WarGames actor Matthew Broderick, to public and private-sector luminaries such as Cybersecurity and Infrastructure Security […]

JFrog and GitHub today revealed a partnership through which they will work together to integrate their respective DevOps platforms.

Community post by Rob Williamson Microservice autoscaling and event-driven decoupling are both paths to help you deliver on the same purpose – maximum performance AND efficiency for applications.

eorgia man sentenced to 10 years for laundering $4.5M+ through BEC and romance scams.

With over 80,000 tech employees laid off in early 2024, effective offboarding is more challenging than ever.

Moonstone Sleet is a new North Korean threat actor targeting individuals and organizations in various sectors with ransomware and custom malware.

Cloud Security Assessment Fundamentals in 2024 | CSA

- cloudsecurityalliance.org - May 29, 2024

Cybersecurity risks necessitate cloud security assessment. Assessment mechanisms and principles must match the rapidly evolving threat ecosystem.

How Data Helps Lego Click Developer Experience into Place

- thenewstack.io platform-engineering - May 29, 2024

The Lego Group platform team is building an internal developer platform that prioritizes the effects of data and self-service on developer experience.

Open to Work - DevOps.com

- devops.com - May 29, 2024

No matter what you call it, being out of work is a harrowing experience.

BreachForums is back! Just two weeks after a coordinated law enforcement takedown, the notorious cybercrime marketplace has resurfaced.

Unleash unparalleled power with U7i instances: up to 32 TiB DDR5 memory, 896 vCPUs, and unmatched performance for in-memory databases like SAP HANA, Oracle, and SQL Server.

Treasury Sanctions Creators of 911 S5 Proxy Botnet

- krebsonsecurity.com - May 28, 2024

The U.S. Department of the Treasury today unveiled sanctions against three Chinese nationals for allegedly operating 911 S5, an online anonymity service that for many years was the easiest and cheapest way to route one's Web traffic through malware-infected computers…

Toyota Connected North America, founded in 2016, focuses on developing and delivering advanced technology and data services for Toyota and Lexus vehicles. Toyota Connected's mission is to make mobility a more accessible, exciting, and human-centric experience for everyone. To this end, Toyota Connected uses data connectivity to serve more than 8 million retail customers, hundreds […]

Organizations of all sizes operate in a compliance landscape that is complex, dynamic, and evolving rapidly, facing internal requirements as well as industry or government regulations. A multicloud strategy creates additional challenges to maintain compliance policies across cloud providers. With AWS, you can implement compliance processes faster and more easily with automation, ready-to-use templates, and […]

Banking on Identity Management to Boost Revenue

- thenewstack.io operations - May 28, 2024

Startup Userfront takes on the complexity of scaling customer accounts for SaaS companies as they grow.

Picking an iPaaS in the Age of Application Overload

- thenewstack.io operations - May 28, 2024

In this article, we will explore what companies should consider when picking a modern iPaaS (Integration Platform as a Service) solution.

FQDN in Cloud NGFW simplifies managing firewall rules

- GCP networking blogs - May 28, 2024

The new FQDN feature in Cloud Next Generation Firewall (NGFW) lets you specify the domain name in your firewall rule rather than IP addresses.

Recent enhancements to the global front end solution

- GCP networking blogs - May 28, 2024

A deeper look at how the global front end solution improves the performance, protection, and scalability of their internet-facing web services.

This blog post is the first of a two-part series that will demonstrate the value of Amazon Security Lake and how you can use it and other resources to accelerate your incident response (IR) capabilities. Security Lake is a purpose-built data lake that centrally stores your security logs in a common, industry-standard format. In part […]

Unlocking Trust: The Power of Blockchain Technologies | CSA

- cloudsecurityalliance.org - May 28, 2024

Learn how blockchain technology inherently supports digital trust across various industries.

As businesses transition to cloud-based infrastructure, establishing reliable connectivity between on-premises and cloud environments becomes a critical requirement. AWS Direct Connect provides a dedicated network link that extends a corporate data center network into the Amazon Web Services (AWS) Cloud. At the core of this connection is the Border Gateway Protocol (BGP), a dynamic routing […]

Community post by Antonio Berben, Principal Solutions Architect at Solo.io (Linkedin | GitHub) In a Testing In Production (TIP) scenario, a critical aspect is routing traffic based on runtime…

Cary, United States, 28th May 2024, CyberNewsWire

Indian national pleads guilty to stealing over $37M through fake Coinbase website.

Hello PCI DSS 4.0: Key Changes | CSA

- cloudsecurityalliance.org - May 28, 2024

As of March 31, 2024, PCI DSS 3.2.1 has been retired. Here are several key changes or new requirements that were added in PCI DSS v4.0.

A full conference pass is $1,099. Register today with the code flashsale150 to receive a limited time $150 discount, while supplies last. We're counting down to AWS re:Inforce, our annual cloud security event! We are thrilled to invite security enthusiasts and builders to join us in Philadelphia, PA, from June 10–12 for an immersive two-and-a-half-day […]

KCD post by Saim Safdar, CNCF Ambassador In August 2020, I embarked on a journey to establish Cloud Native Islamabad with a vision to cultivate local communities, foster knowledge sharing…

Not all technology assets are created equal. Identifying business-critical assets is essential for effective cybersecurity governance.

Application Security Posture Management | CSA

- cloudsecurityalliance.org - May 28, 2024

Application Security Posture Management (ASPM) enhances visibility and security across the software development lifecycle, ensuring robust compliance and streamlined DevSecOps.

CatDDoS botnet exploits 80+ vulnerabilities, targeting 300+ devices daily for DDoS attacks. DNSBomb, a new attack technique, achieves a 20,000x amplif

Unknown threat actors target WordPress sites using lesser-known code snippet plugins

A critical vulnerability (CVE-2024-5035) has been disclosed in the TP-Link Archer C5400X gaming router, allowing remote code execution.

Last week, Dr. Matt Wood, VP for AI Products at Amazon Web Services (AWS), delivered the keynote at the AWS Summit Los Angeles. Matt and guest speakers shared the latest advancements in generative artificial intelligence (generative AI), developer tooling, and foundational infrastructure, showcasing how they come together to change what's possible for builders. You can […]

With EMPs, enterprises could finally start realizing significant efficiency gains in virtualized data center operations.

DevOps.com is now providing a weekly DevOps jobs report through which opportunities for DevOps professionals will be highlighted.

Storm-0539 steals up to $100K/day from companies through sophisticated gift card fraud. Learn how to protect your organization from this growing thre

Report: The Dark Side of Phishing Protection

- thehackernews.com - May 27, 2024

Deep session inspection offers unparalleled protection against phishing attacks. Learn how it works.

Cybercriminals are exploiting Cloudflare Workers to host phishing sites targeting major email providers.

Indian government, defense, and aerospace sectors targeted by Pakistan-nexus actor Transparent Tribe.

This post proposes a way to manage a fleet of EC2 instances using AWS Systems Manager (SSM) and with Ansible inventory.

The problem with a root cause is that it explains too much

- surfingcomplexity.blog - May 26, 2024

The recent performance of the stock market brings to mind the comment of a noted economist who was once asked whether the market is a good leading indicator of general economic activity. Wonderful,…

DEVOPS WEEKLY ISSUE #699 - 26th May 2024

- devopsweeklyarchive.com - May 26, 2024

Platform engineering, establishing a center of production excellence, measuring the DORA metrics and tools for generating tests and writing bash. Oh, and a job opportunity that I'm hiring for in my team at the moment.

You can't judge risk in hindsight

- surfingcomplexity.blog - May 26, 2024

A while back, the good folks at Google SRE posted an article titled Lessons Learned from Twenty Years of Site Reliability Engineering. There's some great stuff in here, but I wanted to pick o…

SRE Weekly Issue #426 – SRE WEEKLY

- sreweekly.com - May 26, 2024

If your overall request volume is low, single errors can have a big impact on your metrics — a phenomenon I've experienced at work recently.

The error term isn't Pareto distributed

- surfingcomplexity.blog - May 25, 2024

You're probably familiar with the 80-20 rule: when 80% of the X stems from only 20% of the Y. For example, 80% of your revenue comes from only 20% of your customer, or 80% of the logs that yo…

Researchers found a vulnerability in AI-as-a-service provider "Replicate" that could allow unauthorized access to proprietary AI models and sensitive

Logz.io's IQ Assistant, which purports to make the most of your software stack's records, actually makes sense.

Korifi at KubeCon + CloudNativeCon EU 2024: Key Takeaways

- thenewstack.io operations - May 24, 2024

The Cloud Foundry Korifi team heard many user requests for an app marketplace and more information about Buildpacks.

Mistral Small, an efficient large language model, joins Amazon Bedrock's lineup, excelling in low-latency tasks, multilingual support, and coding prowess while maintaining cost-effectiveness.

MITRE Corporation hit by a sophisticated cyber attack! Discover how the adversary created rogue VMs to maintain persistent access.

Our commitment to empower federal agencies with advanced technology reaches a significant milestone today with the addition of more than 100 new FedRAMP High authorized cloud services.

Changes to Cloud Monitoring service discovery

- GCP devops/sre blogs - May 24, 2024

Learn how to explicitly define services for use in Cloud Monitoring's Services Overview dashboard.

Happy 7th Birthday, Istio!

- cncf.io - May 24, 2024

Project post originally published on the Istio blog by Lin Sun, Solo.io, for the Istio Steering Committee On this day in 2017, Google and IBM announced the launch of the Istio service mesh.

KCD post originally published on Linkedin by Angel Ramirez, CEO at Cuemby | CNCF & OSPO Ambassador | Public Speaker | Cloud Computing and Kubestronaut As an ambassador for the Cloud Native Computing…

Mastering Secure DevOps with Six Key Strategies | CSA

- cloudsecurityalliance.org - May 24, 2024

Explore the Six Pillars of DevSecOps by CSA, addressing security challenges through collaboration, automation, and compliance in the software development lifecycle.

Nutanix Gives an AI Push to End Kubernetes-Adoption Issues

- thenewstack.io kubernetes - May 24, 2024

Nutanix is expanding its cloud native support with AI by providing AI-driven solutions for operations built on Kubernetes.

Details of Google Cloud GCVE incident

- GCP infra blogs - May 24, 2024

Google Cloud shares details of an incident impacting one Australian customer's use of Google Cloud VMware Engine. Learn what happened and how we're preventing it from happening again.

Fake antivirus websites are stealing your data. Cybercriminals are using sites that mimic Avast, Bitdefender, and Malwarebytes to spread malware.

Why Do Most Cybersecurity Attacks Occur in Q4? | CSA

- cloudsecurityalliance.org - May 24, 2024

Cybersecurity attacks tend to increase in the fourth quarter (Q4) of the year, due to several reasons and notable trends.

Curious about ransomware tactics post-Qakbot? Join us to learn how new groups are taking over the cyber landscape

In the age of DevOps, CISOs must ensure security is integrated from the start. Discover strategies for effective collaboration with DevOps teams to pr

The Power of Continuous Threat Exposure Management | CSA

- cloudsecurityalliance.org - May 24, 2024

Growing cyber risks are forcing companies to be more proactive with information security. Continuous Threat Exposure Management (CTEM) can help.

Courtroom software compromised! Tampered installer for JAVS Viewer v8.3.7 has been caught distributing RustDoor backdoor.

Attention Chrome users! Google has released fixes for a high-severity security flaw (CVE-2024-5274) that has been actively exploited in the wild.

BLOODALCHEMY malware, an updated version of Deed RAT and successor to ShadowPad, targets government organizations in Southern and Southeastern Asia.

Container based Telco workloads use Multus CNI primarily for traffic or network segmentation. Amazon Elastic Kubernetes Service (Amazon EKS) supports Multus CNI enabling users to attach multiple network interfaces, apply advanced network configuration and segmentation to Kubernetes-based applications running on AWS. One of the many benefits of running applications on AWS is resource elasticity (scaling out and scaling […]

Microsoft's .NET Aspire: The Spring Boot of .NET Development

- thenewstack.io cloud-native - May 23, 2024

.NET Aspire is generally available as a free, open source, and cloud-agnostic platform for building cloud native applications with proven tooling.

Ransomware attacks on VMware ESXi follow a similar pattern, exploiting misconfigurations and vulnerabilities.

CISA has added a critical security flaw in Apache Flink to its Known Exploited Vulnerabilities catalog.

Misconfigurations in the AI tech stack lead to mismanaged data ingestion, inefficient model training, and inadequate security gaps. Addressing these challenges requires not repeating the mistakes from our cloud and Kubernetes experiences.

AlmaLinux is keeping its Linux community in the technology loop.

Two new agreements add solar energy to multiple electricity grid regions in Japan, as we make progress on our 24/7 carbon-free energy goal.

Kubestronaut in Orbit: Yongkang He

- cncf.io - May 23, 2024

Yongkang is one of our first Kubestronauts and is based in Singapore and supports a company in the Asia Pacific. He's shifted his focus to cloud native technologies and is now fully certified on…

Project post originally published on the Istio blog by Lin Sun, Solo.io, for the Istio Steering and Technical Oversight Committees Today, Istio's revolutionary new ambient data plane mode has reached…

China-linked threat actor Sharp Panda, now known as Sharp Dragon, is expanding its cyber espionage operations to governmental organizations in Africa

Secure AI-Native Application Workloads with Zero Trust | CSA

- cloudsecurityalliance.org - May 23, 2024

AI-native application workloads bring new security challenges, such as LLM attacks and poisoning. Adopting Zero Trust security is crucial.

Chinese APT group targets government entities in the Middle East, Africa, and Asia in a large-scale cyber espionage campaign dubbed Operation Diplomat

4% of business-critical data lives inside SaaS apps. Are you protecting it? Learn the essentials of secure SaaS data backups.

2024 Pentesting Survey Insights: Cybersecurity Trends | CSA

- cloudsecurityalliance.org - May 23, 2024

Pentera's 2024 survey reveals critical gaps in cybersecurity practices, emphasizing the need for improved pentesting, risk management, and executive involvement.

Ivanti releases fixes for 10 critical security flaws in Endpoint Manager that could allow remote code execution.

Investing in connectivity and growth for Africa

- GCP infra blogs - May 23, 2024

Google is investing in the new Umoja fiber optic route between Africa and Australia, as well as training and collaboration programs.

Microsoft to deprecate VBScript in favor of JavaScript and PowerShell. The tech giant plans to phase out the scripting language.

Two weeks before Russia invaded Ukraine in February 2022, a large, mysterious new Internet hosting firm called Stark Industries Solutions materialized and quickly became the epicenter of massive distributed denial-of-service (DDoS) attacks on government and commercial targets in Ukraine and…

WebAssembly and Kubernetes Go Better Together: Matt Butcher

- thenewstack.io operations - May 22, 2024

We sat down to have a chat with Fermyon co-founder and CEO Matt Butcher to have a chat about SpinKube, a new framework for integrating WebAssembly with Kubernetes.

Nutanix offers a way to significantly simplify and lower the threshold of Kubernetes adoption both from the user and management aspects.

Decoupled distribution delivers. That's the message emanating from the cloud-native community as enterprise technology vendors now seek to enable application mobility across clouds.

Web application security is an ongoing process. AWS WAF enables real-time monitoring and blocking of potentially harmful web requests. Bot Control and Fraud Control use machine learning (ML) to detect and prevent sophisticated threats. Bot traffic can make up anywhere from 30% to 50% or even more of total web traffic. After enabling AWS WAF, […]

Member blog post originally published on the Logz.io blog by Jake O'Donnell Observability isn't new. But organizations are struggling to adopt mature observability practices, and the impact on…

Open Source Founders Need Community

- thenewstack.io devops - May 22, 2024

If you agree that leaders of open source businesses need to work together, share their experiences and support each other, you should join us at the inaugural Open Source Founders Summit.

In this blog post, we explore a scenario in which Goldman Sachs, wanted to transfer ownership of several of its key network components between teams in a controlled and seamless manner. Specifically, we take a deep dive on migrating traffic between Direct Connect gateways while maintaining end-to-end connectivity. As a multinational investment bank and financial […]

Five Considerations to Keep Your Cloud Secure | CSA

- cloudsecurityalliance.org - May 22, 2024

Review the 5 critical areas that enterprises often miss when it comes to cloud security – and how to properly address each one.

OpenTelemetry Is No 'Magic Button' for Observability

- thenewstack.io observability - May 22, 2024

OpenTelemetry offers a standardized process for observability. It can be seen as three main components: standards, SDKs, and the collector.

Member post originally published on the Devtron blog by Prakarsh TL;DR: Learn the key difference between AWS Karpenter and Kubernetes Cluster Autoscaler and choose the right auto-scaling tool for your…

Unfading Sea Haze targets high-level organizations in South China Sea countries since 2018.

Torrance, United States / California, 22nd May 2024, CyberNewsWire

We continue to expand the scope of our assurance programs at Amazon Web Services (AWS) and are pleased to announce that the Spring 2024 System and Organization Controls (SOC) 1, 2, and 3 reports are now available. The reports cover the 12-month period from April 1, 2023 to March 31, 2024, so that customers have […]

The EU AI Act: Compliance and Governance Insights | CSA

- cloudsecurityalliance.org - May 22, 2024

The EU AI Act sets crucial standards for AI governance, transparency, and privacy, impacting organizations globally and requiring comprehensive compliance strategies.

The new C4 provides top-tier performance for demanding applications, while N4's flexible configurations help improve price-performance.

Rockwell Automation urges customers to disconnect industrial control systems from the public internet due to heightened cyber threats

Is Climate Change an Issue for Your ISO Certification? | CSA

- cloudsecurityalliance.org - May 22, 2024

Understand the relevance of climate change in ISO 27001, 22301, and 42001. Determine how applicable these concerns are to your certification.

Words and Meaning - DevOps.com

- devops.com - May 22, 2024

When words lose their meaning in order to attract popular attention, all that's left are slogans intended to shape the beliefs of others.

Discover how SaaS Security Posture Management (SSPM) can safeguard your organization against evolving threats.

Microsoft this week added a bevy of tools to its portfolio that infuses generative artificial intelligence (AI) into DevOps workflows.

New cryptojacking campaign REF4578 discovered. Hackers use vulnerable drivers to disable security solutions and install XMRig miner.

An unknown threat actor is exploiting Microsoft Exchange Server flaws to deploy keylogger malware.

Zoom has rolled out post-quantum end-to-end encryption (E2EE) for Zoom Meetings.

QNAP releases fixes for medium-severity flaws in QTS and QuTS hero NAS appliances.

Veeam has disclosed four vulnerabilities in its Backup Enterprise Manager, including a critical security flaw (CVE-2024-29849).

You might have security or compliance standards that prevent a database user from changing their own credentials and from having multiple users with identical permissions. AWS Secrets Manager offers two rotation strategies for secrets that contain Amazon Relational Database Service (Amazon RDS) credentials: single-user and alternating-user. In the preceding scenario, neither single-user rotation nor alternating-user rotation would […]

The AWS World IPv6 Day Celebration is a free in-person event. Join us for technical presentations from AWS experts plus a workshop and whiteboarding session. You will learn how to get started with IPv6 and hear from customers who have started on the journey of IPv6 adoption. Be ready to ask AWS experts questions on […]

Independent Service Vendor (ISV) users often offer their end-user solutions hosted on a multi-tenant architecture to reduce cost and operational management. However, this approach can lead Kubernetes clusters to resource exhaustion or network starvation issues that impact neighboring workloads. By default, Kubernetes provides capabilities to enforce resource availability such as CPU and memory to prevent […]

Why Your Wi-Fi Router Doubles as an Apple AirTag

- krebsonsecurity.com - May 21, 2024

Apple and the satellite-based broadband service Starlink each recently took steps to address new research into the potential security and privacy implications of how their services geo-locate devices. Researchers from the University of Maryland say they relied on publicly available…

Connection tracking (conntrack) is a networking concept where a networking device, like a firewall, router, or NAT device, needs to track and maintain information about the state of IP traffic going through it. The AWS Nitro System that underlies AWS networking does connection tracking for some types of network traffic to implement the stateful nature […]

Continuous monitoring aims to help companies identify problems early enough for a DevOps team to address them before bad things happen.

Guide to Kubernetes Security Posture Management (KSPM)

- thenewstack.io kubernetes - May 21, 2024

How do you harden your Kubernetes clusters, enhance incident response capabilities, and implement defense-in-depth measures? Find out here.

Hungry for a More Flexible Golang Array? Try a Slice

- thenewstack.io operations - May 21, 2024

Not sure how bug your array should be? Try slices for dynamic sizing of arrays. Here is how to create the dynamically-sized arrays you need.

A critical vulnerability (CVE-2024-4985) has been discovered in GitHub Enterprise Server, allowing attackers to bypass authentication.

IT admins get a generative AI service to help them manage Azure cloud and edge. Will this AI companion make you an instant Azure expert?

Read Azure AI infrastructure announcements from Build, including a preview of Azure VMs built to run on Cobalt 100 processors and Copilot in Azure.

Many AWS customers modernizing their applications into modular services to speed up the development process and improve their ability to scale out individual services as part of the architecture. This includes services developed by the customer and SaaS applications developed by partners. Communication between services requires network connectivity across the Amazon Web Services (AWS) environment. […]

Community post by Gabriel L. Manor, Director of DevRel at Permit.io Domain-specific declarative languages have been a huge part of software development since its early days. Created to tackle the…

CLOUD#REVERSER campaign is using Google Drive and Dropbox to stage malicious payloads.

AWS Network Firewall is a managed, stateful network firewall and intrusion protection service that allows you to implement firewalls rules for fine grained control over your network traffic. If you're new to AWS Network Firewall, and want to understand its features and use cases, we recommend you review the blog post AWS Network Firewall – […]

SolarMarker malware evolves with a multi-tiered infrastructure, making it harder for law enforcement to take down.

Discover the critical tasks that occupy SOC analysts' schedules beyond mere inbox management, and discover insights into optimizing efficiency in cybersecurity operations.

New York, NY, May 21st, 2024, CyberNewsWireMemcyco Inc., provider of digital trust technology designed to protect companies and their customers from

Guiding Principles For The People, Processes, and Tools Needed To Build More Secure Modern Applications At High Speed

Discover how Wazuh's FIM capability ensures real-time monitoring and unauthorized change detection to protect your organization's data integrity.

Ransomware Attack on Change Healthcare: Lessons and Risks | CSA

- cloudsecurityalliance.org - May 21, 2024

Explore the impact of the BlackCat/ALPHV ransomware attack on Change Healthcare and learn essential cybersecurity strategies for the medical sector.

Researchers uncover critical security flaws in two widely used software packages, llama_cpp_python for AI models and PDF.js used by the Firefox.

Microsoft has announced several new security features to strengthen Windows 11, including deprecating the NT LAN Manager (NTLM).

CISA has flagged a critical security flaw in NextGen Healthcare Mirth Connect, linked to remote code execution.

Critical security flaw discovered in Fluent Bit could lead to DoS, information disclosure, or even remote code execution.

The OpenSSF Siren is a fresh, new take on ye old security mailing list.

Amazon Q, is a new generative artificial intelligence- (AI)-powered assistant designed for work that can be tailored to your business. You can use Amazon Q to have conversations, solve problems, generate content, gain insights, and take action by connecting to your company's information repositories, code, data, and enterprise systems. Amazon Q provides immediate, relevant information […]

Introduction In this post, we explore the approach of integrating mainframe IBM MQ with Amazon Managed Streaming for Apache Kafka (Amazon MSK), to migrate your applications into a cloud-based consumer model. Amazon MSK is a fully managed Apache Kafka service from AWS that makes it simpler to set up and operate Kafka in the cloud. […]

Amazon Web Services (AWS) successfully completed a special onboarding audit with no findings for ISO 9001:2015, 27001:2022, 27017:2015, 27018:2019, 27701:2019, 20000-1:2018, and 22301:2019, and Cloud Security Alliance (CSA) STAR Cloud Controls Matrix (CCM) v4.0. Ernst and Young CertifyPoint auditors conducted the audit and reissued the certificates on May 16, 2024. The objective of the audit […]

DevOps is about breaking down silos, fostering collaboration, and promoting a culture of shared ownership and accountability.

Iranian threat actor Void Manticore (Storm-0842) has been identified as the culprit behind destructive wiping attacks targeting Albania and Israel.

Artifact registry across your cloud

- GCP devops/sre blogs - May 20, 2024

Explore different methods of automation and effortlessly copying Artifact Registry images across projects and organizations.

This architecture lets you reuse an address space by using Private Service Connect to hide GKE Cluster ranges and connecting them with a multi-nic VM.

AWS Summit season is in full swing around the world, with last week's events in Bengaluru, Berlin, and Seoul, where my blog colleague Channy delivered one of the keynotes. Last week's launches Here are some launches that got my attention: Amazon S3 will no longer charge for several HTTP error codes – A customer reported […]

Continuous Controls Monitoring for Compliance | CSA

- cloudsecurityalliance.org - May 20, 2024

Manual compliance data gathering can hinder an organization's operational efficiency and compliance posture. Automated compliance solutions can help.

In this post, we discuss how to architect Zero Trust based remote connectivity to your applications hosted within Amazon Web Services (AWS). Specifically, we show you how to integrate AWS Verified Access with Jamf as a device trust provider. This post is an extension of our previous post explaining how to integrate AWS Verified Access […]

Community post by Kirill Kononovich, Dmitry Shurupov, Timur Tukaev The Cloud Native Glossary is a project led by the CNCF Business Value Subcommittee. Its goal is to explain cloud native concepts in…

Exploring Syscall Evasion – Linux Shell Built-ins | CSA

- cloudsecurityalliance.org - May 20, 2024

Learn how syscall evasion with bash shell builtins is used to work around security tool detection and how to combat such efforts.

Looking for a new job? DevOps.com provides a weekly DevOps jobs report through which opportunities for DevOps professionals are highlighted

Multiple threat actors are exploiting a design flaw inFoxit PDF software to deliver various malware.

Modern vulnerabilities often stem from open-source. GitGuardian's SCA scans for CVEs before code commits, ensuring secure, dependable software.

Two Strategies to Reduce Critical App Vulnerabilities | CSA

- cloudsecurityalliance.org - May 20, 2024

Securing custom applications in a sea of vulnerabilities is daunting. Here are two effective strategies for identifying vulnerabilities.

Composable Enterprise: The Evolution of MACH and Jamstack

- thenewstack.io microservices - May 20, 2024

Is the MACH architecture for web development simply "Jamstack for the enterprise", or is there more to it? We survey several MACH experts.

A multi-faceted campaign is targeting Android, macOS, and Windows users with various stealer malware and banking trojans.

Researchers have observed a surge in email phishing campaigns delivering Latrodectus, a new malware loader believed to be the successor to IcedID.

Amazon Q, is a new generative artificial intelligence- (AI)-powered assistant designed for work that can be tailored to your business. You can use Amazon Q to have conversations, solve problems, generate content, gain insights, and take action by connecting to your company's information repositories, code, data, and enterprise systems. Amazon Q provides immediate, relevant information […]

Defining DevSecOps for IoT - DevOps.com

- devops.com - May 20, 2024

By embedding security practices at every stage of the IoT development lifecycle, organizations can significantly enhance the security and integrity of their IoT ecosystems.

The recent rise of generative artificial intelligence (generative AI) solutions presents challenges to migrations that are in flight and to migrations that are just beginning. The business problem is that generative AI complicates cloud migrations by introducing additional risks related to data isolation, data sharing, and service costs. For example, the US Space Force has […]

Install a Full LAMP Stack on a Debian Server

- thenewstack.io operations - May 19, 2024

The Debian Linux distro makes for a great LAMP server, the software stack that has powered internet websites for decades.

Two Chinese nationals arrested in the U.S. for allegedly orchestrating a massive pig butchering scam that laundered $73 million from victims.

DEVOPS WEEKLY ISSUE #698 - 19th May 2024

- devopsweeklyarchive.com - May 19, 2024

This week we have posts on APIs, behind the scenes of a large production infrastructure, speeding up monorepo builds and tools for managing feature flags and a new programming language for large scale data processing.

Grandoreiro banking trojan is back, targeting 1,500+ banks in 60+ countries. It now uses infected Outlook to spread phishing emails.

SRE Weekly Issue #425 – SRE WEEKLY

- sreweekly.com - May 19, 2024

Great practical advice for how to present reliability problems (and your proposed solutions) to e-staff.

Learn about some common approaches for collecting data from multiple AWS services across your organization, including common patterns with code samples that you can reuse to consume the data.

Amazon Web Services (AWS) offers a streamlined solution for you to monitor internet traffic to your CloudFront distribution with simple integration for Amazon CloudWatch Internet Monitor in the Amazon CloudFront console. Ensuring optimal performance and availability is paramount for internet applications. With this integration, you can easily gain more insights into internet health and your users' experience for an application that you've set up with a CloudFront distribution.

If you want to know what's changing in DevOps – as opposed to which conversations are most hype-worthy – these are the places to look.

Rafay's PaaS Now Supports GPU Workloads for AI/ML in the Cloud

- thenewstack.io kubernetes - May 17, 2024

Rafay's newly added support for GPU workloads helps enterprises and managed service providers power a new GPU-as-a-service experience for internal developers and customers.

Kinsing cryptojacking group evolves again, targeting new vulnerabilities to expand its botnet.

Introducing FizzBee: Simplifying Formal Methods for All

- thenewstack.io devops - May 17, 2024

You might have heard of TLA+, but how do you use it for debugging? FizzBee is a new formal methods system that you can grasp in just a weekend.

This post is co-authored with Andy Suarez and Kevin Breton (from KnowBe4). For any successful growing organization, there comes a point when the technical architecture struggles to meet the demands of an expanding and interconnected business environment. The increasing complexity and technical debt in legacy systems create pain points that constrain innovation. To overcome these […]

To provide built-in and centralized visibility into your applications, we are introducing software supply chain security insights for GKE workloads in the GKE Security Posture dashboard.

GitLab this week revealed that, in the coming months, it will add an enterprise edition of its AI add-on for its namesake CI/CD platform.

Almost half of 500 software engineering leaders and practitioners report they can't release code to production without risking failures,

Customers often look for options to capture and centralized storage of application logs from Amazon Elastic Kubernetes Service on Fargate (Amazon EKS on Fargate) Pods to investigate root causes or analyze security incidents. Customers also like the capability to easily query the logs to assist with security investigations. In this blog post, we show you […]

Apple's New iMessage, Signal, & Post-Quantum Crypto | CSA

- cloudsecurityalliance.org - May 17, 2024

iMessage has been updated with cryptography to secure against quantum computers. Understand what this means for privacy and confidentiality.

Some organizations have requirements to manage their own data encryption keys, both in general and during data transfer processes. In addition, when considering data transfer solutions (not just for encrypted data), organizations must think about factors such as preventing unauthorized access during transfer and storage, transfer efficiency, data integrity, and monitoring mechanisms to make sure […]

Announcing Flux 2.3 GA

- cncf.io - May 17, 2024

Project post originally published on Flux' blog by Stefan Prodan We are thrilled to announce the release of Flux v2.3.0! In this post, we will highlight some of the new features and improvements…

Community post originally published on TAG App Delivery's blog by Atulpriya Sharma Exactly a month ago, Kubernetes users and experts gathered in the City of Lights, Paris, for KubeCon's Europe edition.

Unauthorized Access to Enterprise Environments | CSA

- cloudsecurityalliance.org - May 17, 2024

Unauthorized access compromises sensitive information and disrupts operations. Here are some strategies to prevent it.

Identity misconfigurations account for 80% of security exposures! Learn how to prioritize and protect your critical assets.

China-linked BlackTech hacking group targets Asia-Pacific with advanced Deuterbear RAT in 2023. Learn about the malware's unique capabilities and how

Many vendors tout automated cloud remediation as the silver bullet for security challenges. This article separates the hype from reality.

North Korean APT group Kimsuky deploys Linux version of GoBear backdoor, targeting South Korean organizations.

CISA has added two actively exploited vulnerabilities to its catalog. Make sure to apply vendor-provided mitigations by June 6, 2024, to stay safe.

Containers have become the dominant method for deploying and managing applications in recent years. Their widespread adoption is attributed to numerous advantages, such as isolation, efficient hardware use, scalability, and portability. In situations where resource isolation is critical for system security, many users are forced to rely on virtual machines (VMs) to mitigate the impact […]

Mobileye (Nasdaq: MBLY), a global leader in advanced driver-assistance systems (ADAS), is at the forefront of the autonomous driving revolution. Founded in 1999, they have pioneered groundbreaking technologies such as REM crowdsourced mapping, True-Redundancy sensing, and Responsibility-Sensitive Safety (RSS). These innovations are paving the way for a future filled with self-driving vehicles and advanced mobility […]

Applications produce log files that should be reliably stored for ad-hoc reporting, compliance, or auditing purposes. Over time, these collections of relatively small log files grow in volume and cost-effective storage and data management becomes crucial. Accessing the data in these files and querying them can also be useful for getting insight from the data. […]

Join us in Philadelphia, Pennsylvania on June 10–12, 2024 for AWS re:Inforce, a security learning conference where you can gain skills and confidence in cloud security, compliance, identity, and privacy. As an attendee, you have access to hundreds of technical and non-technical sessions, an Expo featuring Amazon Web Services (AWS) experts and AWS Security Competency […]

Observability, AI and automation can help organizations achieve proactive IT management and eschew traditional monitoring.

Platform Engineering Rules the Day: Eight Key Themes

- thenewstack.io platform-engineering - May 16, 2024

With platform engineering at the helm, the future of cloud native development is poised for unprecedented growth and transformation.

In today's digital ecosystem, maintaining an uninterrupted online presence and resilience is essential for businesses. WordPress platforms, whether e-commerce sites or news portals, must not only meet but exceed stringent Service Level Agreements (SLA's) to maintain user trust, ensure continuity, and protect revenue. These SLAs, defining Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO), […]

Cloud Computing at the Edge: From Evolution to Disruption

- thenewstack.io cloud-native - May 16, 2024

As cloud computing continues to evolve, businesses must adapt to harness the full potential of these developments.

From AI hype to why CISOs matter to the value of nation-state threat intel, CISO Phil Venables revisits his fireside chat with Mandiant CEO Kevin Mandia.

Users in industries such as financial services and healthcare regularly exchange files with their external business partners containing sensitive and regulated datasets, such as Personal Identifiable Information (PII) and financial records. These file transfers often happen over the Secure File Transfer Protocol (SFTP) and encrypting files using Pretty Good Privacy (PGP) before transfer is often […]

When an identity provider (IdP) serves multiple service providers (SPs), IdP-initiated single sign-on provides a consistent sign-in experience that allows users to start the authentication process from one centralized portal or dashboard. It helps administrators have more control over the authentication process and simplifies the management. However, when you support IdP-initiated authentication, the SP (Amazon […]

The circuit breaker pattern is a powerful tool for helping to ensure the resiliency and stability of serverless applications. Lambda extensions are a good fit for its implementation, as demonstrated in this example.

New Wi-Fi vulnerability discovered! CVE-2023-52424, dubbed "SSID Confusion attack," affects all operating systems and Wi-Fi clients.

Today is Global Accessibility Awareness Day (GAAD); a day of awareness intended to draw attention to accessibility and inclusion for people with disabilities around the world. It is a perfect time to reflect on the importance of accessibility in the cloud. At Amazon Web Services (AWS), our guiding principle of customer obsession extends to our […]

Kimsuky hackers launch new social engineering attack using fake Facebook accounts. Learn how they target activists via Messenger and deliver malware.

Securing GenAI with Non-Human Identity Management | CSA

- cloudsecurityalliance.org - May 16, 2024

Understand the need for proper non-human identity governance to ensure the privacy and integrity of data used in RAG AI applications.

2024 State of SaaS Security Report Shows A Gap | CSA

- cloudsecurityalliance.org - May 16, 2024

Valence Security's 2024 SaaS Report shows a gap between security leaders' confidence in their processes and the complexity of SaaS security risks.

Nearly a dozen security flaws have been discovered in the GE HealthCare Vivid Ultrasound product family.

Google fixes critical zero-day vulnerability in Chrome. CVE-2024-4947, a type confusion bug in the V8 JavaScript engine, has been actively exploited b

Beware of Storm-1811! This financially motivated group is abusing Microsoft's Quick Assist tool in social engineering attacks.

In today's digital ecosystem, maintaining an uninterrupted online presence and resilience is essential for businesses. WordPress platforms, whether e-commerce sites or news portals, must not only meet but exceed stringent Service Level Agreements (SLA's) to maintain user trust, ensure continuity, and protect revenue. These SLAs, defining Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO), […]

We are delighted to announce the release of the Mergers and Acquisitions (M&A) Lens. The M&A Lens consists of a Mergers and Acquisitions Lens whitepaper and an AWS-created lens available in the new Lens Catalog of the AWS Well-Architected Tool (AWS WA Tool). The AWS Well-Architected Framework provides a consistent approach to evaluate architectures and […]

Starting June 16, exposed service account keys that have been detected in services including public repos will be automatically disabled by default for new and existing customers.

Learn about three different ways you can complete ACE mappings using AWS Partner CRM Connector Version 2.0.

We are excited to announce support for Grafana version 10.4 in Amazon Managed Grafana. You can now run Grafana version 10.4 on a secure, scalable, highly available, and fully managed service. This update gives you access to key features introduced in the open-source Grafana versions 9.5 to 10.4, including Correlations, Subfolders, Transformations redesign, and new visualization panels. It […]

BreachForums, a notorious online bazaar for stolen data, has been seized by law enforcement agencies for the second time in a year.

Android 15 introduces new features to prevent malicious apps from capturing your sensitive data. Find out more about these crucial updates:

Google just unveiled new "private space" feature lets you keep your sensitive apps hidden and locked with a separate PIN.

From Cards to Clouds: A Family Tree of Developer Tools

- thenewstack.io devops - May 15, 2024

David Eastman looks back on the "cloud native" family tree — including his experience of container management, orchestration and scaling.

We're excited to share that Gartner has recognized Google as a Visionary in the 2024 Gartner® Magic Quadrant™ for SIEM, our first time participating.

Effective Cloud Security Strategies for Data Protection | CSA

- cloudsecurityalliance.org - May 15, 2024

Learn key strategies to secure cloud environments effectively using CSA's Security Guidance, with a focus on compliance, IR, and IAM.

Grafana capabilities will be extended to accommodate applications such as storage, multiple API management and extending its observability capabilities to offer event-driven functionalities, Kubernetes management and other capabilities.

Red Hat Podman 'Lab' Gets Developers Started on GenAI

- thenewstack.io containers - May 15, 2024

Unlike many tools for building generative AI apps, the Podman AI Lab was built specifically for developers, rather than data scientists.

Two new backdoors, LunarWeb and LunarMail, have targeted a European ministry of foreign affairs and its diplomatic missions in the Middle East

Design an IT Service Model for Customer Satisfaction | CSA

- cloudsecurityalliance.org - May 15, 2024

In this podcast transcript, explore end user happiness and automation in IT. Learn how to design an IT service model that prioritizes the end user.

(Cyber) Risk = Probability of Occurrence x Damage

- thehackernews.com - May 15, 2024

CVSS v4.0 evaluates vulnerabilities using a revised scoring system, emphasizing environmental and threat metrics.

When one person's code is another person's nightmare.

Moving to the cloud just got easier. Discover how Zerto simplifies your VMware vSphere to Microsoft Azure migration.

Ebury malware botnet has compromised an estimated 400,000 servers since 2009. Learn how to protect your systems from this advanced threat.

Build Trust with Vendor Risk Management | CSA

- cloudsecurityalliance.org - May 15, 2024

Establishing trust with vendors facilitates smooth operations and strengthens the entire business ecosystem. Here's how to establish an effective vendor risk management strategy.

The new version of Rocky Linux includes security improvements, better cloud images, and the latest developer tools.

Alexey Pertsev, co-founder of Tornado Cash, sentenced to 5+ years in prison by Dutch court. The crypto mixer service was sanctioned by the U.S.

Microsoft has patched 61 new security flaws, including two zero-days actively exploited in the wild.

According to the MITRE ATT&CK framework, lateral movement consists of techniques that threat actors use to enter and control remote systems on a network. In Amazon Web Services (AWS) environments, threat actors equipped with illegitimately obtained credentials could potentially use APIs to interact with infrastructures and services directly, and they might even be able to use […]

Patch Tuesday, May 2024 Edition

- krebsonsecurity.com - May 14, 2024

Microsoft today released updates to fix more than 60 security holes in Windows computers and supported software, including two "zero-day" vulnerabilities in Windows that are already being exploited in active attacks. There are also important security patches available for macOS…

The environmental impact of data centers is becoming increasingly critical. These facilities, essential to our digital infrastructure, consume vast

In highly regulated industries, securely exchanging files business-to-business is a crucial business practice. When building out a Managed File Transfer (MFT) environment, it is common to consider using a third-party identity solution for authenticating users. This approach offers simplicity for businesses that already use an identity service, allowing them to maintain identities for a variety […]

Join us in Philadelphia, Pennsylvania on June 10-12, 2024 for AWS re:Inforce, a cloud governance, compliance, and security conference. Attendees can expand their cloud security knowledge through hundreds of technical and non-technical sessions, engage with AWS experts and certified partners in the expo hall, and hear from AWS security leaders during keynotes. Whether you are […]

Developers owning security? Testing in production? Are you mad!? A DevSecOps expert makes the case for why a shift is inevitably coming.

Introducing Trillium, sixth-generation TPUs

- GCP compute blogs - May 14, 2024

The new sixth-generation Trillium Tensor Processing Unit (TPU) makes it possible to train and serve the next generation of AI foundation models.

By considering this advice, IT leaders can move AI initiatives forward despite the obstacles and pressures they're up against.

The vast majority of applications don't run run the CPU flat-out at 100% utilization continuously. Take a web application, for instance. It typically fluctuates between periods of high and low demand, but hardly ever uses a server's compute at full capacity. CPU utilization for many common workloads that customers run in the AWS Cloud today. […]

Researchers have uncovered a critical vulnerability in VMware's Bluetooth device, allowing code execution by malicious actors.

No-code/low-code platforms empower employees with no application security knowledge to develop programs that security teams don't know exist.

Introduction Amazon Virtual Private Cloud (VPC) is the foundational networking construct used by customers to deploy workloads on AWS. To examine VPC traffic and gain insights into communication patterns, customers collect and analyze VPC Flow Logs, leveraging the capabilities and features AWS has continuously added since 2015. You can get started with Flow Logs by […]

Introduction Keeping a watchful eye on your Kubernetes infrastructure is crucial for ensuring optimal performance, identifying bottlenecks, and troubleshooting issues promptly. In the ever-evolving world of cloud-native applications, Amazon Elastic Kubernetes Service (EKS) has emerged as a popular choice for deploying and managing containerized workloads. However, monitoring Kubernetes clusters can be challenging due to their […]

Google has released emergency fixes for a new zero-day vulnerability (CVE-2024-4761) that has been actively exploited in the wild.

Amazon Web Services (AWS) customers have been adopting the approach of using AWS PrivateLink to have secure communication to AWS services, their own internal services, and third-party services in the AWS Cloud. As these environments scale, the number of PrivateLink connections outbound to external services and inbound to internal services increase and are spread out […]

Unveiling the Dark Arts of Exploiting Trust | CSA

- cloudsecurityalliance.org - May 14, 2024

Widely-used web services are being increasingly weaponized. Threat actors are using admin functions and trusted productivity sites to carry out attacks.

A new social engineering campaign is targeting enterprises with spam emails to gain initial access. The threat actor overwhelms users' email and calls

12 security flaws addressed, including two critical issues leading to remote code execution. Update to version 1.2.27 now to stay protected

Advanced authentication: The key to addressing the weakest link in cybersecurity - human users. Learn how to fortify your organization's defenses.

Securing Against Insider and Offboarding Risks | CSA

- cloudsecurityalliance.org - May 14, 2024

Delve into why offboarding is such a critical security issue and explore real-world examples of companies that learned this lesson the hard way.

pple and Google just rolled out a cross-platform feature called "Detecting Unwanted Location Trackers" (DULT) on iOS and Android to protect users.

English | German Amazon Web Services (AWS) continues to believe it's essential that our customers have control over their data and choices for how they secure and manage that data in the cloud. AWS gives customers the flexibility to choose how and where they want to run their workloads, including a proven track record of […]

🚀Discover how Platform.sh is revolutionizing data centers with sustainable practices. 🎍Learn about their use of renewable energy and advanced cooling systems. 🎤EcoTech Insights host Bonnie Schneider interviews Platform.sh's Environmental Impact Officer, Leah Goldfarb.

AWS IAM Identity Center is the preferred way to provide workforce access to Amazon Web Services (AWS) accounts, and enables you to provide workforce access to many AWS managed applications, such as Amazon Q Developer (Formerly known as Code Whisperer). As we continue to release more AWS managed applications, customers have told us they want […]

It sounds simple: If you pay developers more money they'll improve the quality and security of their code. The evidence isn't so clear.

Taking a 'Machine-First' Approach to Identity Management

- thenewstack.io devops - May 13, 2024

Uncovering what each identity is accessing and why, startup Token Security provides essential data to understand microservices vulnerabilities.

We launched AWS Fargate support for Windows Server containers on Amazon Elastic Container Service (ECS) in October 2021 to remove the undifferentiated heavy lifting of managing the underlying host operating system (OS). This has enabled customers to run Windows containers without having to patch, scale, and harden the Windows OS, using the serverless, pay-as-you-go compute […]

AWS Summit is in full swing around the world, with the most recent one being AWS Summit Singapore! Here is a sneak peek of the AWS staff and ASEAN community members at the Developer Lounge booth. It featured AWS Community speakers giving lightning talks on serverless, Amazon Elastic Kubernetes Service (Amazon EKS), security, generative AI, […]

How Did Authorities Identify the Alleged Lockbit Boss?

- krebsonsecurity.com - May 13, 2024

Last week, the United States joined the U.K. and Australia in sanctioning and charging a Russian man named Dmitry Yuryevich Khoroshev as the leader of the infamous LockBit ransomware group. LockBit's leader "LockBitSupp" claims the feds named the wrong guy,…

Firestore-Eventarc integration now GA with Auth Context

- GCP containers blogs - May 13, 2024

The integration of Eventarc into Firestore includes a new Auth Context extension that embeds metadata about who triggered a document change.

Amazon Elastic Container Service (ECS) is a fully managed container orchestration service that helps you deploy, manage, and scale containerized applications. Within Amazon ECS there is a concept known as Capacity, which is the infrastructure where your containers run. Amazon ECS provides multiple options: Amazon Elastic Compute Cloud (EC2) instances in the AWS Cloud, AWS […]

Users often need to host their Kubernetes workloads in specific locations, geographies, or on-premises to meet data locality or low-latency requirements. Amazon Elastic Kubernetes Service (EKS) has a broad range of deployments options from in the cloud to on-premises on customer-managed hardware with Amazon EKS Anywhere. To extend AWS infrastructure and APIs to users on-premises, […]

MITREcorp has launched EMB3D, a new threat-modeling framework for embedded devices used in critical infrastructure.

What is Management Plane (Metastructure) Security | CSA

- cloudsecurityalliance.org - May 13, 2024

In cloud computing, metastructure refers to the protocols and mechanisms that provide the interface between the infrastructure layer and the other layers.

London, United Kingdom, May 13th, 2024, CyberNewsWireLogicalis, the global technology service provider delivering next-generation digital managed

While traditional channels like email and SMS remain important, businesses are increasingly exploring alternative messaging services to reach their customers more effectively. In recent years, WhatsApp has emerged as a simple and effective way to engage with users. According to statista, as of 2024, WhatsApp is the most popular mobile messenger app worldwide and has […]

Torrance, California, May 13th, 2024, CyberNewsWireCriminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by AI SPERA, has

SEC Cybersecurity Disclosure Requirements 2023 | CSA

- cloudsecurityalliance.org - May 13, 2024

Explore the new 2023 SEC regulations on cybersecurity risk management and incident reporting for compliance.

vFunction, the AI-driven architectural observability platform today added real-time observability and GenAI assistant.

Are your browser extensions safe? 33% in most orgs aren't! Learn to protect your data with insights from the 2024 Browser Security Report.

Looking for a new DevOps job? Consider these roles, including at Paramount+, Western Union and Michaels Stores.

5 Best Practices to Secure Your Azure Resources | CSA

- cloudsecurityalliance.org - May 13, 2024

Learn best practices for securing Azure resources to ensure that your cloud infrastructure is fortified against increasingly sophisticated cyber threats.

Kaspersky researchers have uncovered multiple security flaws in Cinterion cellular modems that could put your communication networks and IoT devices a

Overcoming cybersecurity challenges means smarter collaboration. Explore how SecurityHQ's Risk Register can bridge the gap between tech and strategy.

Black Basta ransomware-as-a-service (RaaS) operation has targeted over 500 private industry and critical infrastructure entities in North America, Eur

Red Hat is previewing a policy-as-code capability for the Ansible Automation Platform that promises to make it simpler to apply and enforce governance and compliance policies.

Researchers found a malicious Python package called requests-darwin-lite hiding a sneaky malware.

Traditionally, Java web applications are packaged into Web Application Resource (WAR) files, which can be deployed on any Servlet/JSP container like Tomcat server. These applications often operate within distributed environments, involving multiple interconnected components such as databases, external APIs, and caching layers. Monitoring the performance and health of Java web applications can be challenging due […]

How to Install Ubuntu Pro on Your Servers

- thenewstack.io operations - May 12, 2024

Want to extend the support cycle of your Ubuntu servers and desktops? Why not give Ubuntu Pro a spin?

DEVOPS WEEKLY ISSUE #697 - 12th May 2024

- devopsweeklyarchive.com - May 12, 2024

This week we have a range of posts covering API specification languages, log formats and CI/CD pipelines as well as tools for building development environments and working with Terraform.

SRE Weekly Issue #424 – SRE WEEKLY

- sreweekly.com - May 12, 2024

Here's an ultra-practical guide to pushing for reliability investments at your company, formatted as a runbook with a set of specific steps.

The notorious FIN7 hacking group is at it again! This time, they're using malicious Google ads to trick users into downloading malware disguised as le

Introduction In this blog post, we will illustrate how to automate the configuration necessary to manage migrated servers with improved security and reduced costs. To administer servers in an on-premises environment, administrators often use secure shell (SSH) or Remote Desktop Protocol (RDP) to connect. After migrating to Amazon Web Services (AWS), this may not be […]

Introduction Amazon Elastic File System (EFS) is a managed storage service that can be used to provide shared access to data for Kubernetes Pods running across compute nodes in different Availability Zones (AZ) managed by Amazon Elastic Kubernetes Service (EKS). Amazon EFS supports native replication of data across AWS Regions. This feature helps in designing a multi-Region disaster […]

Introduction In the realm of data integration and ETL (Extract, Transform, Load) processes, organizations often face challenges in ensuring efficiency and performance of the ETL jobs. Monitoring the efficiency of ETL jobs becomes crucial in maintaining seamless data workflows. This is where Amazon CloudWatch Logs Insights comes into play, offering powerful log analytics to unearth […]

Introduction Amazon CloudWatch Synthetics canaries are scripts that monitor your endpoints and APIs by simulating the actions of a user. These canaries run on a schedule, check the availability and latency of your applications, and alert you when there are issues. Canary scripts are written in Node.js and Python, and they run inside an AWS […]

IaC changes the way IT operations and development teams collaborate to create, provision and manage infrastructure and applications.

AWS Elemental MediaPackage provides customers the ability to deliver live and video on demand (VOD) securely and reliably at scale. Integrating with other Media Services on AWS and content delivery networks (CDNs) like Amazon CloudFront, MediaPackage offers resilient video origination while reducing media workflow complexity for customers. In 2023, we announced the support for low-latency […]

Scaling fintech capabilities globally with Google Cloud

- GCP containers blogs - May 10, 2024

Learn how Airwallex overcomes international money challenges, leveraging Google Cloud's global network for seamless CI/CD on Gitlab.

North Korean hackers have unleashed a new Golang malware called "Durian" in targeted attacks against South Korean crypto firms.

Zero Trust & Identity and Access Management (IAM) | CSA

- cloudsecurityalliance.org - May 10, 2024

Safeguard organizational assets and mitigate Shadow Access with Zero Trust and Identity and Access Management principles.

Testcontainers offer developers a way past their otherwise often isolated developer environment.

Join us as we unveil CensysGPT and learn how it's changing the game in threat hunting.

How Continuous Controls Monitoring Brings IT Agility | CSA

- cloudsecurityalliance.org - May 10, 2024

Continuous Controls Monitoring holds the potential to significantly enhance organizational agility and reduce friction.

A CloudZero survey credits engineering teams with keeping cloud costs under control, but there's still some room for improvement.

Composability to Jamstack: Drilling Down on Frontend Terms

- thenewstack.io microservices - May 10, 2024

Is composability just a marketing term? What the heck is MACH? A beginners guide to frontend development terms.

Despite the hype, AI can benefit actual DevOps workflows. These four machine-learning algorithms can make a real difference.

What's the Right EDR for You?

- thehackernews.com - May 10, 2024

EDR solutions can detect threats that traditional defenses like antivirus often miss. Find out how EDR provides a deeper level of security.

A Risk-Based Approach to Vulnerability Management | CSA

- cloudsecurityalliance.org - May 10, 2024

Explore cybersecurity risk management, including activities to align security with a risk-based approach and DevSecOps best practices.

Google has just released an update to patch a new zero-day flaw, CVE-2024-4671, which hackers are actively exploiting in the wild.

Fake Android apps mimicking popular platforms like Google & WhatsApp are stealing user data.

Researchers have uncovered a new attack called "LLMjacking" that targets large language models (LLMs) hosted on cloud services.

Researchers have uncovered a vulnerability (CVE-2024-3661) that allows threat actors to snoop on your VPN traffic.

Maintaining ownership of IP addresses while deploying resources in multiple accounts can lead to underutilized IP address ranges. AWS Global Accelerator supports cross-account sharing for bring your own IP addresses (BYOIP), which enables you to share IP address ranges with multiple AWS accounts. After you provision an IP address range with Global Accelerator using BYOIP, […]

Optimize AI at Scale With Platform Engineering for MLOps

- thenewstack.io platform-engineering - May 09, 2024

Enterprises that adopt an MLOps platform engineering approach will provide a much-needed immediate boost to their operational efficiency.

Tuning the Kubernetes HPA in GKE

- GCP containers blogs - May 09, 2024

Achieving the best price-performance with the Kubernetes Horizontal Pod Autoscaler (HPA) requires a nuanced understanding of CPU utilization targets.

AWS CloudTrail tracks user and API activities across your AWS environments for governance and auditing purposes. Large enterprises typically use multiple AWS accounts, and many of those accounts might need access to a data lake managed by a single AWS account. By using Lake Formation integration with CloudTrail Lake, you can securely aggregate the data […]

Quiz #26 is in our series of quiz questions where we are investigating how to troubleshoot AWS CloudWatch Alarms. If this is of interest, also look at our

Russia-Linked APT28 Strikes Poland with Malware Campaign Polish government bodies were hit by a sophisticated malware attack orchestrated by the infam

Most organizations prioritize protecting their web applications that are exposed to the internet. Using the AWS WAF service, you can create rules to control bot traffic, help prevent account takeover fraud, and block common threat patterns such as SQL injection or cross-site scripting (XSS). Further, for those customers managing multi-account environments, it is possible to […]

Utah's AI Policy Act: Innovation and Regulation | CSA

- cloudsecurityalliance.org - May 09, 2024

Examine Utah's Artificial Intelligence Policy Act, focusing on legal frameworks, privacy, and compliance in AI usage.

How Do You Measure Developer Experience?

- thenewstack.io platform-engineering - May 09, 2024

A DevEx startup, Quotient, uses AI to discern which productivity metrics matter as organizations scale, and how to turn data into priorities.

Ivanti Connect Secure (ICS) devices are under attack! Two critical vulnerabilities are being exploited to deploy the notorious Mirai botnet.

Looking to grow your MSP business? Consider offering vCISO services to meet the critical needs of SMEs. It's a game changer for recurring revenue and

Cloud Security: Strategic Prevention Methods | CSA

- cloudsecurityalliance.org - May 09, 2024

Explore strategic prevention methods for enhancing cloud security, focusing on automation, AWS policies, and DevSecOps integration.

Two critical vulnerabilities have been discovered in F5 Next Central Manager that could grant attackers full admin control.

AWS users need to continuously enhance their infrastructure and security processes. This typically involves a two-phase approach: discovery and design, followed by implementation. In the discovery phase, an assessment of the current infrastructure is conducted, leading to the creation of architecture documents and patterns for the subsequent implementation phase. This process delves into Account Structure, […]

Sumo Logic previewed a copilot that leverages GenAI to make it simpler for IT and cybersecurity professionals to derive benefits from its observability platform.

Software development teams are constantly looking for ways to accelerate their software development lifecycle (SDLC) to release quality software faster. Amazon Q, a generative AI–powered assistant, can help software development teams work more efficiently throughout the SDLC—from research to maintenance. Software development teams spend significant time on undifferentiated tasks while analyzing requirements, building, testing, and […]

Tips for Controlling the Costs of Security Tools

- thenewstack.io observability - May 08, 2024

Instead of assuming that the more you spend on security tools, the more secure your business is, take time to determine which tools to use and what they cost.

StarTree broadly enhances its real-time database platform by adding query support for metrics, logs and traces.

Philadelphia, Pennsylvania, May 8th, 2024, CyberNewsWireSecurity Risk Advisors (SRA) announces the launch of their OT/XIoT Detection Selection Workshop, a

Researchers have uncovered a new class of attacks called Pathfinder that can extract encryption keys and sensitive data from Intel CPUs.

Achieve regulatory compliance with ease. A permissions inventory enables access recertification, SOD checks, and controlled access to sensitive data.

Educating the Security Industry with CISO Rick Doten | CSA

- cloudsecurityalliance.org - May 08, 2024

In this CSA Community Spotlight interview, hear from CISO Rick Doten about speaking at cybersecurity events.

A lead contributor to OpenTofu answers the (truly) frequently asked questions about the open source project.

By implementing DevSecOps practices, organizations can proactively address security concerns early in development, reducing vulnerabilities.

A newer version of the Hijack Loader malware has been observed with updated anti-analysis techniques to evade detection.

The Fundamentals of Cloud Security Stress Testing

- thehackernews.com - May 08, 2024

The cloud promises agility, but opens a Pandora's box of cyber risks if not secured properly. Understand your responsibility under the shared responsi

Navigating Legacy Infrastructure: Strategy for Success | CSA

- cloudsecurityalliance.org - May 08, 2024

Here are three ways you can communicate risk to your leadership team as you work to replace legacy infrastructure.

A critical flaw in the hugely popular LiteSpeed Cache plugin for WordPress is being exploited in the wild to create rogue admin accounts, granting att

Today, we are announcing the general availability of the generative engine of Amazon Polly with three voices: Ruth and Matthew in American English and Amy in British English. The new generative engine was trained with publicly available and proprietary data, a variety of voices, languages, and styles. It performs with the highest precision to render […]

Today, we're happy to welcome a new member of the Amazon Titan family of models: Amazon Titan Text Premier, now available in Amazon Bedrock. Following Amazon Titan Text Lite and Titan Text Express, Titan Text Premier is the latest large language model (LLM) in the Amazon Titan family of models, further increasing your model choice […]

The United States joined the United Kingdom and Australia today in sanctioning 31-year-old Russian national Dmitry Yuryevich Khoroshev as the alleged leader of the infamous ransomware group LockBit. The U.S. Department of Justice also indicted Khoroshev as the gang's leader…

This blog shows four ways of combining synchronous and asynchronous tasks in a Lambda function, allowing you to run tasks that continue running after the function returns a response to the client.

Open Source Is at a Crossroads

- thenewstack.io cloud-native - May 07, 2024

The cracks are beginning to show in this global ecosystem, as many projects lack the basic funding to sustain the software that literally runs the world.

In this post, we explore how Amazon Web Services (AWS) customers can use Amazon Security Lake to efficiently collect, query, and centralize logs on AWS. We also discuss new use cases for Security Lake, such as applying generative AI to Security Lake data for threat hunting and incident response, and we share the latest service […]

UK's National Crime Agency has unmasked the admin behind the prolific LockBit ransomware as 31-year-old Russian national Dmitry Khoroshev.

Red Hat Rethinks the Linux Distro for the Container Age

- thenewstack.io operations - May 07, 2024

Red Hat wants to bring cloud native-based build and deployment practices to the Linux operating system itself.

Today, users working with SAP ASE databases are navigating the path of rehosting and refactoring to AWS. The catalyst for considering this transition is heightened due to several factors, such as the end of mainstream support announcements by SAP. Although the advantages and benefits of refactoring to open-source databases are compelling, it may require a […]

Today, we're introducing Amazon Bedrock Studio, a new web-based generative artificial intelligence (generative AI) development experience, in public preview. Amazon Bedrock Studio accelerates the development of generative AI applications by providing a rapid prototyping environment with key Amazon Bedrock features, including Knowledge Bases, Agents, and Guardrails. As a developer, you can now use your company's single sign-on credentials to […]

San Francisco, United States, May 7th, 2024, CyberNewsWireHunters, the pioneer in modern SOC platforms, today announced its full adoption of the Open

APT42, an Iranian state-backed hacking group, is leveling up its social engineering tactics. They're posing as journalists and event organizers to bui

MITRE, a renowned research firm, has revealed alarming details about a recent cyber attack that dates back to late 2023.

Defenses Against Software Supply Chain Vulnerabilities | CSA

- cloudsecurityalliance.org - May 07, 2024

Explore the significance of the CVE-2024-3094 incident as a crucial wake-up call to fortify defenses and ensure robust cybersecurity measures against software supply chain vulnerabilities.

Oracle today revealed it is developing a generative artificial intelligence (AI) assistant that leverages multiple large language models to create Java and SQL code

New Case Study: The Malicious Comment

- thehackernews.com - May 07, 2024

Learn how Reflectiz detected a sophisticated malware hidden in an innocent-looking image on a retail site.

Kubernetes Security: Managed or Self-Hosted? | CSA

- cloudsecurityalliance.org - May 07, 2024

Delve into why organizations are adopting Kubernetes for container security, and why you should choose a managed service rather than self-hosted.

Russian operator of BTC-e crypto exchange pleads guilty to money laundering charges spanning 2011-2017.

Google has made enabling two-factor authentication (2FA) easier for personal and Workspace accounts.

With built-in end-to-end encryption, OpenTofu is a natural DevSecOps fit.

Looking for a DevOps job? Look at these openings at Capital One, Sherwin Williams, Marriott International and more

Depending on where your platform lives, it'll be important to continuously monitor the needs it's serving and the business goals it's meant to serve. Highlights from the 2024 Puppet State of DevOps Report.

Why Your VPN May Not Be As Secure As It Claims

- krebsonsecurity.com - May 06, 2024

Virtual private networking (VPN) companies market their services as a way to prevent anyone from snooping on your Internet usage. But new research suggests this is a dangerous assumption when connecting to a VPN via an untrusted network, because attackers…

Kubernetes 1.30 Gets Better at Naming Things

- thenewstack.io kubernetes - May 06, 2024

After a few critical vulnerabilities were uncovered, Kubernetes got serious about securing pods with user namespaces. Also in the box: More granular container scaling.

Learn more about how Azure can help your enterprise modernize with scalable intelligent applications.

The Anatomy of an ALPHA SPIDER Attack | CSA

- cloudsecurityalliance.org - May 06, 2024

CrowdStrike has run several incident response engagements in which ALPHA SPIDER affiliates demonstrated novel offensive techniques.

April has been packed with new releases! Last week continued that trend with many new releases supporting a variety of domains such as security, analytics, devops, and many more, as well as more exciting new capabilities within generative AI. If you missed the AWS Summit London 2024, you can now watch the sessions on demand, […]

New findings suggest the ArcaneDoor cyber espionage campaign targeting network devices from Cisco (CVE-2024-20353, CVE-2024-20359).

Critical unpatched flaw (CVE-2023-49606) in Tinyproxy could lead to remote code execution. Over 50% of 90K+ exposed hosts are vulnerable.

Amazon Web Services (AWS) has recently renewed the Esquema Nacional de Seguridad (ENS) High certification, upgrading to the latest version regulated under Royal Decree 311/2022. The ENS establishes security standards that apply to government agencies and public organizations in Spain and service providers on which Spanish public services depend. This security framework has gone through […]

Resource Constraints in Kubernetes and Security | CSA

- cloudsecurityalliance.org - May 06, 2024

Less than half of Kubernetes environments have alerts for CPU/memory usage. This trend reflects the prioritization of development agility over security.

AI has the power to revolutionize cybersecurity. Read our latest advancements and announcements from the RSA Conference here.

Ransom demands, data theft, operational halt... The nightmare of cyberattacks on SMBs. Can you afford to risk it? Read how Managed EDR can help

Guide to Becoming a CISO: Skills, Steps & Strategies | CSA

- cloudsecurityalliance.org - May 06, 2024

Unlock the steps to becoming a CISO with our guide, offering strategies for all career stages, essential skills, and mentorship insights.

Xiaomi devices running Android have been found to contain multiple security vulnerabilities in various apps and system components.

A new malware called "Cuckoo" is on the loose, targeting both Intel and ARM-based Macs.

Prompt Engineering - DevOps.com

- devops.com - May 06, 2024

Opinions are like noses, everybody has one. And in the case of AI, having a nose is not a requirement.

In this blog post, we will explore how to simplify Amazon EKS deployments with GitHub Actions and AWS CodeBuild. In today's fast-paced digital landscape, organizations are turning to DevOps practices to drive innovation and streamline their software development and infrastructure management processes. One key practice within DevOps is Continuous Integration and Continuous Delivery (CI/CD), which […]

DEVOPS WEEKLY ISSUE #696 - 5th May 2024

- devopsweeklyarchive.com - May 05, 2024

The DORA survey is back this week, along with posts on Jevons paradox, monitoring and testing ML models, reliability and service architecture and more.

Green is the color of complacency

- surfingcomplexity.blog - May 05, 2024

Here are a few anecdotes about safety from the past few years. In 2020, the world was struck by the COVID-19 pandemic. The U.S. response was… not great. Earlier in 2019, before the pandemic s…

SRE Weekly Issue #423 – SRE WEEKLY

- sreweekly.com - May 05, 2024

This one's full of great advice about making sure alerts are actionable, including alerting on flows that actually matter to customers.

The perils of outcome-based analysis

- surfingcomplexity.blog - May 04, 2024

Imagine you wanted to understand how to get better at playing the lottery. You strike upon a research approach: study previous lottery winners! You collect a list of winners, look them up, intervie…

In this step by step guide, we are going to learn the Terraform remote state management using S3

Czechia and Germany reveal they were targets of a massive cyber espionage campaign by Russia-linked APT28 hacker group.

Platform Engineering for a Mainframe: Design Thinking Drives Change

- thenewstack.io platform-engineering - May 03, 2024

Engineers from Legal & General take us inside Project Impala, an effort to transform the mainframe developer experience to deliver higher quality faster.

We're pleased to announce that Amazon Web Services (AWS) demonstrated continuous compliance with the Baseline Informatiebeveiliging Overheid (BIO) Thema-uitwerking Clouddiensten while increasing the AWS services and AWS Regions in scope. This alignment with the BIO Thema-uitwerking Clouddiensten requirements demonstrates our commitment to adhere to the heightened expectations for cloud service providers. AWS customers across the Dutch public sector can […]

How to use Config Sync team scopes

- GCP containers blogs - May 03, 2024

Config Sync team scopes lets platform admins define fleet-wide and team-specific cluster configurations such as resource quotas and network policies.

Storing multiple copies of data is often an enterprise data protection best practice and a critical part of backup and recovery solutions. The ability to quickly recover or restore data – often from backup copies in cost-effective archive storage – is critical to minimizing potential downtime or operational disruptions in disaster recovery (DR) scenarios such […]

Bedrock – Slack's internal Kubernetes platform Slack is the AI-powered platform for work that connects people, conversations, apps, and systems together in one place. Slack adopted Amazon Elastic Kubernetes Service (Amazon ) to build "Bedrock," the codename for an internal compute orchestration platform that simplifies container deployment and management. Bedrock handles build, deploy, and runtime […]

Navigating AI in OT Security: Insights & Strategies | CSA

- cloudsecurityalliance.org - May 03, 2024

Explore the critical interplay between AI and OT security, highlighting unique challenges and strategic insights for CISOs.

Nation-state hackers have a new trick - turning Microsoft's own cloud services into secret command centers to launch attacks undetected.

Our webinar unveils the latest DDoS attack strategies like IoT botnets & amplification tactics. Get real-world examples & proactive defense tips.

Post-Quantum Preparedness | What You Can Do Today | CSA

- cloudsecurityalliance.org - May 03, 2024

Quantum computers are rapidly becoming a reality. This guide will show you how to secure your business as the digital landscape continues to shift.

Cilium's Past Points to Its Future

- thenewstack.io kubernetes - May 03, 2024

Cilium's future involves not just Kubernetes and containers, but also VMs, edge use cases and other environments.

Beware of "Shadow SaaS" - a hidden threat to organizations. Learn more: click the link for a must-read guide.

Business Risks Explored: Practical Insights | CSA

- cloudsecurityalliance.org - May 03, 2024

Companies must be equipped to identify, assess, and respond to risks effectively. Risks can fall into one of these three categories.

U.S. government warns of North Korean hackers sending spoofed emails to gather intelligence.

Google announces over 400 million accounts now use passkeys - the passwordless authentication solution.

Aruba Networking has released critical security patches for ArubaOS. Four flaws could allow remote code execution, giving attackers full control.

Here is the latest from Microsoft Azure in data, AI, and digital apps to help you with your modernization. Learn more.

Atlassian acquired Optic, which uses OpenAPI to track API changes across a continuous integration pipeline. It also announced a new AI tool.

Amazon Web Services (AWS) this week make generally available an instance of a generative artificial intelligence (AI) assistant capable of executing

AWS announced Amazon CloudWatch Application Signals during re:Invent 2023. It is a new feature to monitor and understand the health of Java applications. Today we are excited to announce that Application Signals now supports Python applications. Enabling Application Signals allows you to use AWS Distro for OpenTelemetry (ADOT) to instrument Python applications without code changes. […]

The TestState API helps developers to iterate faster, resolve issues efficiently, and deliver high-quality applications with greater confidence. By enabling developers to test individual states independently and integrating testing into their preferred development workflows, it simplifies the debugging process and reduces context switches.

Private connectivity to vertex workloads

- GCP networking blogs - May 02, 2024

Get started with connecting to your vertex AI workload using private networking options.

RAG quickstart with Ray, LangChain, and HuggingFace

- GCP containers blogs - May 02, 2024

Manage AI infrastructure on top of GKE while leveraging open-source frameworks and open models.

Popular apps like Xiaomi File Manager and WPS Office are vulnerable to a path traversal flaw that could let hackers overwrite files and execute malici

Foundational models (FMs) are trained on large volumes of data and use billions of parameters. However, in order to answer customers' questions related to domain-specific private data, they need to reference an authoritative knowledge base outside of the model's training data sources. This is commonly achieved using a technique known as Retrieval Augmented Generation (RAG). […]

Automation is Key: Lessons from Microsoft Exchange | CSA

- cloudsecurityalliance.org - May 02, 2024

The DHS Cyber Safety Review Board released a report exposing critical oversights by Microsoft that enabled a cyber attack on top-tier US officials.

Tel Aviv, Israel, May 2nd, 2024, CyberNewsWireEarly adoption by Fortune 100 companies worldwide, LayerX already secures more users than any other browser

A Ukrainian hacker part of the notorious REvil gang has been sentenced to over 13 years for orchestrating 2,500+ attacks demanding $700M in crypto ran

Microsoft Copilot for Security: What You Need to Know | CSA

- cloudsecurityalliance.org - May 02, 2024

‍Microsoft Copilot for Security employs strict access controls and manages data through advanced encryption for both at-rest and in-transit data.

When is One Vulnerability Scanner Not Enough?

- thehackernews.com - May 02, 2024

Are you confident your vulnerability scanner isn't leaving blind spots in your attack surface? Uncover the limitations of relying on a single scanner

A new botnet called Goldoon is targeting D-Link routers with a critical vulnerability from 2015 (CVE-2015-2051).

Dropbox Sign Breached! Unidentified hackers accessed user emails, usernames, and account settings for all Dropbox Sign users.

A critical flaw (CVE-2023-7028) is being actively exploited, allowing account takeover by sending password reset emails to unverified addresses.

Attention SOHO router users! A new malware called Cuttlefish is on the prowl, stealthily monitoring your traffic and stealing authentication data.

Amazon CodeCatalyst integrates continuous integration and deployment (CI/CD) by bringing key development tools together on one platform. With the entire application lifecycle managed in one tool, CodeCatalyst empowers rapid, dependable software delivery. CodeCatalyst offers a range of actions which is the main building block of a workflow, and defines a logical unit of work to […]

Domino Data Lab is an AWS partner that provides a central system of record for data science activity across an organization. The Domino solution delivers orchestration for all data science artifacts, including AWS infrastructure, data and services. As part of the solution, Domino's platform leverages the scale, security, reliability, and cost-effectiveness of AWS cloud computing […]

Postman today made available an AI tool for its platform for building and managing APIs that automatically creates tests and documentation.

Golang: How To Use the Go Install Command

- thenewstack.io operations - May 01, 2024

Want to run your Go program as a full executable binary? The Go install command compiles and installs the application in your workspace's bin directory. Here's how.

RAN slicing is one of the important new features of 5G networks and Microsoft has researched and produced results, making it easier for operators to use in Azure.

Soft delete for Cloud Storage helps protect against accidental and malicious data deletion.

Config Sync auto-upgrades in preview

- GCP containers blogs - May 01, 2024

Config Sync's new auto-upgrades feature lets you automatically upgrade Config Sync versions and oversee the lifecycle of Config Sync components.

Starting today, you can configure your DNS Firewall to automatically trust all domains in a resolution chain (such as aCNAME, DNAME, or Alias chain). Let's walk through this in nontechnical terms for those unfamiliar with DNS. Why use DNS Firewall? DNS Firewall provides protection for outbound DNS requests from your private network in the cloud […]

GitHub has made available a formal technical preview of an approach to building software that uses generative AI to complete tasks.

Golden templates make it easier to get started with IaC, but they don't effectively fit users' needs. Let's fix that.

Defining Cloud Key Management: 7 Essential Terms | CSA

- cloudsecurityalliance.org - May 01, 2024

Define 7 essential terms related to cloud key management and access additional resources to dive deeper into key management concepts.

Learn more on how Azure can help you best run your VMware workloads as well as respond with agility and meet the security and compliance requirements you need.

Elastic Load Balancing (ELB) offers four types of load balancers, all featuring high availability, automatic scaling, and robust security support for your applications: Application Load Balancer (ALB), Network Load Balancer (NLB), Gateway Load Balancer (GWLB), and Classic Load Balancer (CLB). ELB automatically scales up and down, and scales in and out in response to traffic […]

How does blockchain pseudonymity enable financial crime detection? By combining it with knowledge of licit and illicit crypto services, machine learni

Researchers have uncovered a new Android malware called Wpeeper that uses compromised WordPress sites to hide its true command-and-control servers.

Livin' on the Edge: Linux's Impact on Computing | CSA

- cloudsecurityalliance.org - May 01, 2024

Automox CISO Jason Kikta shares his personal experience with Linux and highlights its advantages and innovations.

Today, Snyk made available an edition of its application security posture management (ASPM) tool for assessing application risks.

The Purpose of Life - DevOps.com

- devops.com - May 01, 2024

We all have our priorities.

Master the art of choosing a security awareness training (SAT) solution that can drive meaningful changes for you and your organization.

Efficient Cloud Migration Strategy Guide | CSA

- cloudsecurityalliance.org - May 01, 2024

Explore effective cloud migration strategies to optimize costs and streamline operations for businesses.

ZLoader modular malware trojan has resurfaced with anti-analysis feature that prevents execution on machines different from the original infection.

Former NSA employee sentenced to nearly 22 years in prison for attempting to sell classified documents to Russia.

Ruby developers can now use AWS CodeArtifact to securely store and retrieve their gems. CodeArtifact integrates with standard developer tools like gem and bundler. Applications often use numerous packages to speed up development by providing reusable code for common tasks like network access, cryptography, or data manipulation. Developers also embed SDKs–such as the AWS SDKs–to […]

Apache Flink Gets Some Observability With Datorios

- thenewstack.io observability - April 30, 2024

Apache Flink is rapidly gaining traction as a platform for real-time Generative AI apps, though remains a bit of a black box as far as observability and debugging goes. Datorios wants to change that.

The Amazon Titan family of models, available exclusively in Amazon Bedrock, is built on top of 25 years of Amazon expertise in artificial intelligence (AI) and machine learning (ML) advancements. Amazon Titan foundation models (FMs) offer a comprehensive suite of pre-trained image, multimodal, and text models accessible through a fully managed API. Trained on extensive […]

New Spotify Portal for Backstage Eases Platform Engineering

- thenewstack.io platform-engineering - April 30, 2024

The path to creating Backstage involved respecting Spotify's culture of collaboration and developer autonomy. Its new portal aims to bring that ethos to all Backstage users.

Amazon Web Services (AWS) customers implement multi-account strategies so that multiple teams can deploy workloads in separate organizational units (OUs) and AWS accounts. Cloud administrators are using this practice through offerings such as AWS Control Tower and AWS Organizations. These services help them get things done using individual accounts while maintaining centralized control for governance […]

In 2022, we launched Lambda function URLs as a simple way to configure an HTTPS endpoint for your AWS Lambda function without having to learn, configure, and operate additional services. Customers who want to improve the performance and security of their applications running with Lambda function URLs can deploy Amazon CloudFront in front of Lambda function URLs […]

If we shift our observability focus to the left, we can address issues in CI/CD before they escalate, as described by two Grafana engineers.

By using Cloud Storage and Cloud Storage FUSE file cache, Woven by Toyota saw a 14% reduction in training time and a 97% savings in storage costs.

Service Extensions callouts for Application Load Balancing

- GCP networking blogs - April 30, 2024

Service Extensions callouts are GA for Application Load balancers, helping to improve performance, security, and operational efficiency.

Our updated guide helps organizations mitigate the risk of ransomware events, and contain them.

Get ready for RSA as guest columnist Sunil Potti, VP and GM of Google Cloud Security, takes you on a tour of Security Command Center Enterprise.

A 26-year-old Finnish man was sentenced to more than six years in prison today after being convicted of hacking into an online psychotherapy clinic, leaking tens of thousands of patient therapy records, and attempting to extort the clinic and patients.

WebAssembly, Large Language Models, and Kubernetes Matter

- thenewstack.io kubernetes - April 30, 2024

WebAssembly makes it quick and easy to download and run a complete LLM on a machine without any major setup.

Backstage helps large teams document their infrastructure and services. This extends the open source version.

Millions of malicious "imageless" containers have been planted on Docker Hub over the past 5 years in multiple cybercriminal campaigns.

Securing Healthcare Data: The Role of DSPM | CSA

- cloudsecurityalliance.org - April 30, 2024

Discover how DSPM solutions safeguard sensitive healthcare data, enhance cybersecurity, and ensure compliance with regulations.

When Amazon Web Services (AWS) launched Amazon Q Developer as a preview last year, it changed my experience of interacting with AWS services and, at the same time, maximizing the potential of AWS services on a daily basis. Trained on 17 years of AWS knowledge and experience, this generative artificial intelligence (generative AI)–powered assistant helps […]

At AWS re:Invent 2023, we previewed Amazon Q Business, a generative artificial intelligence (generative AI)–powered assistant that can answer questions, provide summaries, generate content, and securely complete tasks based on data and information in your enterprise systems. With Amazon Q Business, you can deploy a secure, private, generative AI assistant that empowers your organization's users […]

The U.S. government has unveiled new security guidelines to fortify critical infrastructure against AI-related risks.

AI-Specific Penetration Testing Guide | CSA

- cloudsecurityalliance.org - April 30, 2024

Delve into AI-specific penetration testing, ensuring your AI systems are robust against cybersecurity threats.

The U.K. is the first country to ban default passwords on smart devices starting April 29, 2024. Manufacturers must provide unique passwords and secur

The U.S. Federal Communications Commission (FCC) today levied fines totaling nearly $200 million against the four major carriers -- including AT&T, Sprint, T-Mobile and Verizon -- for illegally sharing access to customers' location information without consent.

This is a guest post by Pranav Kapoor, Head of DevOps at Upstox co-authored with Jayesh Vartak, Solutions Architect at AWS and Jitendra Shihani, Technical Account Manager (TAM) at AWS. Upstox is India's largest investech, a multi-unicorn valued at $3.5 billion. It allows you to buy and sell stocks, mutual funds, and derivatives, and is […]

In November 2023, we made two new Cohere models available in Amazon Bedrock (Cohere Command Light and Cohere Embed English). Today, we're announcing the addition of two more Cohere models in Amazon Bedrock; Cohere Command R and Command R+. Organizations need generative artificial intelligence (generative AI) models to securely interact with information stored in their […]

Introduction In this blog post, we will walk you through the step-by-step process of completing VMware virtual machine (VM) migrations to Amazon Elastic Compute Cloud (Amazon EC2) using the (Application Migration Service). Moreover, we will show how to apply a custom post-launch action script to remove proprietary VMware tools from the migrated VMs. Migrating on-premises […]

Google reveals a staggering 200,000 app submissions were rejected or remediated from the Play Store last year due to issues with sensitive data access

First introduced in the mid-20th century, mainframe systems continue to be the backbone of many enterprises relying on these systems for mission-critical applications. In fact, it is estimated that at least 71% of Fortune 500 companies use mainframe systems. Globally, 90% of credit card transactions happen on mainframe systems. According to IBM, USD 7.7 trillion […]

Best practices for Kubernetes Pod IP allocation in GKE

- GCP containers blogs - April 29, 2024

Yes, you can enjoy Kubernetes' flat address space without using a lot of IP addresses.

Telecom applications on Kubernetes with multi-networking

- GCP containers blogs - April 29, 2024

Google Cloud's multi-networking meets the security, performance, and compliance demands of telecom workloads while leveraging native k8s services.

This was a busy week for Amazon Bedrock with many new features! Using GitHub Actions with AWS CodeBuild is much easier. Also, Amazon Q in Amazon CodeCatalyst can now manage more complex issues. I was amazed to meet so many new and old friends at the AWS Summit London. To give you a quick glimpse, […]

Your Ultimate Guide to Security Frameworks | CSA

- cloudsecurityalliance.org - April 29, 2024

A security framework is a set of security controls, policies, and procedures designed to protect your data. Here's an overview of the different types.

Gemini 1.5 Pro helps analysts manage the asymmetric volume of threats more effectively and efficiently.

The "Muddling Meerkat" threat actor is abusing DNS open resolvers to evade detection and conduct reconnaissance across the globe.

A critical vulnerability (CVE-2024-27322) has been discovered in the R programming language. It could allow attackers to execute arbitrary code.

Strategies to Combat Rising Ransomware Threats | CSA

- cloudsecurityalliance.org - April 29, 2024

Explore effective strategies to defend against ransomware, focusing on overcoming challenges to enhance organizational cybersecurity.

It's an established practice for development teams to build deployment pipelines, with services such as AWS CodePipeline, to increase the quality of application and infrastructure releases through reliable, repeatable and consistent automation. Automating the deployment process helps build quality into our products by introducing continuous integration to build and test code as early as possible, […]

Red Teaming or Exposure Management? Find out how combining these powerful approaches can fortify your cybersecurity defenses.

The Future of Cloud Cybersecurity | CSA

- cloudsecurityalliance.org - April 29, 2024

Cloud providers are continually evolving, employing advanced tech like AI. Here are some key trends shaping the future of cloud security.

Looking for a DevOps job? Look at these openings at Scientific American, HRL Laboratories, VetsEZ and more.

Multiple vulnerabilities have been discovered in the popular Judge0 online code execution system, putting users at risk of complete system compromise.

Okta is sounding the alarm on an unprecedented spike in credential stuffing attacks targeting online services.

DEVOPS WEEKLY ISSUE #695 - 28th April 2024

- devopsweeklyarchive.com - April 28, 2024

A short issue this week, with some interesting posts on observability and incident response, devops community and naming.

SRE Weekly Issue #422 – SRE WEEKLY

- sreweekly.com - April 28, 2024

The PIOSEE model is taught to pilots as a rubric for coming to a decision in a difficult aviation situation. As this article explains, we can also use it during IT incidents.

Cybersecurity researchers have uncovered a targeted cyber attack against Ukraine that leveraged a 7-year-old Microsoft Office flaw to deploy Cobalt St

Linux: Deploy the Netdata Server Performance Monitor

- thenewstack.io operations - April 27, 2024

Netdata is easy to install, offers a very well-designed web-based interface, and monitors things like CPU, load, disks, RAM, swap, network, processes, idle-jitter, interrupts and more..

Hackers are disguising Python backdoors as legitimate npm packages to target developers during fake job interviews.

If you want to reduce docker image size, you need to use the standard best practices in building

This blog post was co-written by Brent Eager, Senior Software Engineer, StormForge StormForge is the creator of Optimize Live, a Kubernetes vertical rightsizing solution that is compatible with the Kubernetes HorizontalPodAutoscaler (HPA). Using cluster-based agents, machine learning, and Amazon Managed Service for Prometheus, Optimize Live is able to continuously calculate and apply optimal resource requests, […]

AWS customers realize more than a 5:1 ratio of benefits to investment costs over five years with breakeven on their investment occurring in an average of 10 months (source: "The Business Value of Amazon Web Services", an IDC whitepaper). This blog aims to help Information Technology (IT) teams calculate this value using the tools needed […]

At Google Cloud, we know you have diverse regulatory, compliance, and sovereignty needs, so at Next '24 we announced new ways to expand your power of choice.

Today, applications are more distributed than ever before and they no longer run in isolation. This is especially the case when utilizing Amazon Elastic Container Service (Amazon ECS) or Amazon Elastic Kubernetes Service (Amazon EKS). A distributed workload or system is one that encompasses multiple small independent components, all working together to complete a task or job. […]

A Zero Trust Opportunity for Security Professionals | CSA

- cloudsecurityalliance.org - April 26, 2024

CSA's CCZT is a comprehensive training and certificate program for Zero Trust. CCZT is your on-ramp to becoming an accredited Zero Trust professional.

Multiple critical vulnerabilities discovered in Brocade SANnav SAN management application, impacting all versions up to 2.3.0.

Introduction APIs are the key to implementing microservices that are the building blocks of modern distributed applications. Launching a new API involves defining the behavior, implementing the business logic, and configuring the infrastructure to enforce the behavior and expose the business logic. Using OpenAPI, the AWS Cloud Development Kit (AWS CDK), and AWS Solutions Constructs […]

Exploring DevSecOps Tools and Best Practices | CSA

- cloudsecurityalliance.org - April 26, 2024

Uncover the essentials of DevSecOps, ensuring secure code throughout the development lifecycle with cutting-edge tools and practices.

10 Critical Endpoint Security Tips You Should Know

- thehackernews.com - April 26, 2024

Unlock Endpoint Security with our top 10 must-know tips! From MFA to EDR, discover how to protect your digital kingdom.

A new Android malware called Brokewell is disguising itself as updates for popular apps like Google Chrome and Klarna

CPPA AI Rules for Automated Decisionmaking | CSA

- cloudsecurityalliance.org - April 26, 2024

The California Privacy Protection Agency's draft regulations aim to bolster consumer protections for automated decision-making technology, including AI.

This comprehensive guide on Kubernetes architecture aims to explain each Kubernetes component in detail with illustrations. So if

A critical vulnerability (CVE-2024-3400) in PAN-OS could expose your systems to remote code execution attacks.

A critical vulnerability (CVE-2024-27956) in the WP-Automatic plugin is being actively exploited. This flaw could allow attackers to take complete con

Introduction The adoption and large-scale growth of Kubernetes in recent years has resulted in businesses deploying multiple Amazon Elastic Kubernetes Service (Amazon EKS) clusters to support their growing number of microservice based applications. The Amazon EKS clusters are usually deployed in separate Amazon Virtual Private Clouds (Amazon VPCs) and often in separate AWS accounts. A […]

Common Securitization Solutions (CSS), a joint Fannie Mae and Freddie Mac venture launched in 2019, supports a cornerstone of the American economy – home ownership. CSS built and now operates the largest and most advanced mortgage securitization platform in the US, supporting Freddie Mac and Fannie Mae's 70% market share of the industry with flexibility, […]

North Korean hackers used fake job offers to deliver a new Trojan called Kaolin RAT. It can change file timestamps and load malware.

Copado's genAI tool automates testing in Salesforce software-as-a-service (SaaS) application environments.

From the show floor to keynotes to remote attendance, here's your must-read guide to where Google Cloud Security will be at RSA Conference this year.

2024 DORA survey now open

- GCP devops/sre blogs - April 25, 2024

Participating in the 2024 DORA Survey helps us understand how AI, platform engineering and developer experience impact organizational performance.

Kubernetes Gets Back to Scaling with Virtual Clusters

- thenewstack.io operations - April 25, 2024

Virtual clusters in containers are lighter, faster to spin up and more portable than the real kind, said Lukas Gentele, of Loft Labs, in this episode of The New Stack Makers.

Cybersecurity: Adapting to a New Threat Landscape | CSA

- cloudsecurityalliance.org - April 25, 2024

Discover why organizations must pivot to exposure-based cyber defense to address the expanding attack surface and evolving threats effectively.

Network Threats: A Step-by-Step Attack Demonstration

- thehackernews.com - April 25, 2024

This article takes you through a real-life network attack simulation, covering 6 steps from Initial Access to Data Exfiltration.

Navigating the XZ Utils Vulnerability (CVE-2024-3094) | CSA

- cloudsecurityalliance.org - April 25, 2024

CVE-2024-3094, a newly disclosed vulnerability in XZ Utils, has sent ripples across tech. Understand CVE-2024-3094 and how to mitigate it.

The U.S. DOJ has made a significant move by arresting the founders of Samourai, a crypto mixer, for laundering over $100M

Poll Vaulting: Cyber Threats to Global Elections

- GCP security blogs - April 25, 2024

The election cybersecurity landscape globally is characterized by a diversity of targets, tactics, and threats.

Google hits the brakes on phasing out third-party cookies in Chrome until 2024.

A new stealthy malware campaign leveraging two zero-day flaws in Cisco networking gear has been uncovered, allowing covert data collection and reconna

This blog was updated by Irene Garcia Lopez, Solutions Architect, and Mehdi Yosofie, Solutions Architect, in April 2024 to reflect Karpenter beta changes. Overview Karpenter is a dynamic, high performance, open-source cluster autoscaling solution for the Kubernetes platform introduced at re:Invent 2021. Customers choose an autoscaling solution for a number of reasons, including improving the […]

IBM Purchases HashiCorp for Multicloud IT Automation

- thenewstack.io operations - April 24, 2024

HashiCorp's software for infrastructure and security life cycle management, along with Red Hat's portfolio, could help IBM make multicloud computing an actual possibility.

Pulumi Launches New Infrastructure Lifecycle Features

- thenewstack.io operations - April 24, 2024

Pulumi adds new drift detection and remediation, time-to-live (TTL) stacks and more to its Infrastructure as Code (IaC) platform. Meanwhile, Pulumi CEO Joe Duffy pledges to keep innovating amid the potential HashiCorp-IBM deal.

Externalizing authorization logic for application APIs can yield multiple benefits for Amazon Web Services (AWS) customers. These benefits can include freeing up development teams to focus on application logic, simplifying application and resource access audits, and improving application security by using continual authorization. Amazon Verified Permissions is a scalable permissions management and fine-grained authorization service […]

Embrace revealed today is it is adding support for open source OpenTelemetry agent software to its software development kits (SDKs).

Striking a Balance Between Reliability and Agility in Cloud Operations The IT operation team of an enterprise serves as the first line of defense against potential business disruptions. They operate 24/7, acts as a hub, continuously monitor and manage the IT environment. The operation team handles and prioritizes critical IT incidents to minimize downtime and […]

Embracing AI and the power of community: inside the mind of Champion Innovator Juan Guillermo Gómez.

Secure Your Cloud Infrastructure with Zero Trust | CSA

- cloudsecurityalliance.org - April 24, 2024

CSA has developed the Certificate of Competence in Zero Trust (CCZT) to prepare professionals for the Zero Trust transition.

IBM Purchases HashiCorp for Multicloud IT Automation

- thenewstack.io operations - April 24, 2024

HashiCorp's software for infrastructure and security life cycle management, along with Red Hat's portfolio, could help IBM make multicloud computing an actual possibility.

A sophisticated attack campaign dubbed "FROZEN#SHADOW" is underway, using phishing emails to infect systems with the stealthy malware SSLoad.

U.S. Treasury Department has sanctioned two Iranian firms and four individuals for their involvement in malicious cyber activities targeting U.S.

Learn how to use AWS CloudFormation StackSets to automate and simplify data protection without duplicating existing backups on Amazon EBS, a high-performance block-storage service designed for Amazon EC2.

Cybersecurity: SSO & Vendor Accountability in SaaS | CSA

- cloudsecurityalliance.org - April 24, 2024

Explore how cybersecurity accountability shifts to SaaS vendors, emphasizing the importance of single sign-on for user access management.

Paying Your Dues - DevOps.com

- devops.com - April 24, 2024

TANSTAAFL, ya know?

Kubernetes Security with Least Privilege | CSA

- cloudsecurityalliance.org - April 24, 2024

The complexity of Kubernetes security and least-privilege access can be mitigated with automation, policy-as-code, and continuous security practices.

eBPF: Reliable Policy Setting and Enforcement

- thenewstack.io kubernetes - April 24, 2024

The power of eBPF largely lies in its computing efficiency since it is directly tied to the Linux kernel.

Major security flaws uncovered in popular Chinese keyboard apps! Researchers found vulnerabilities that could expose users' private keystrokes.

A sophisticated malware called GuptiMiner has been leveraging a flaw in eScan antivirus updates to spread backdoors and crypto miners across corporate

A suspected Vietnamese hacking group is leveraging CDN cache to distribute malware undetected.

Everyone knew HashiCorp was attempting to find a buyer. Few suspected it would be IBM.

Google security innovation at the OCP Regional Summit

- GCP security blogs - April 23, 2024

At the OCP Regional Summit, Google discussed security advancements including Caliptra for integrated root-of-trust, OCP S.A.F.E, and OCP L.O.C.K.

This blog post introduces how manufacturers and smart appliance consumers can use Amazon Verified Permissions to centrally manage permissions and fine-grained authorizations. Developers can offer more intuitive, user-friendly experiences by designing interfaces that align with user personas and multi-tenancy authorization strategies, which can lead to higher user satisfaction and adoption. Traditionally, implementing authorization logic using […]

Regional PD's cross-zone synchronous replication delivers resilience, management simplicity, and continuous protection for demanding applications.

Google Verified Peering Provider makes it easy for businesses to connect to Google's network with the simplicity and reliability of an enterprise-grade managed service.

Direct VPC egress for Cloud Run is now GA

- GCP networking blogs - April 23, 2024

Direct VPC egress for Cloud Run, now GA, lets Cloud Run resources send traffic directly to a VPC network without proxying it through Serverless VPC Access connectors.

AI Hallucinations: Generative AI's Costly Blunders | CSA

- cloudsecurityalliance.org - April 23, 2024

Explore the technical underpinnings of GenAI hallucinations and how to foster responsible development of AI.

Researchers discovered a "dependency confusion" vulnerability in an archived Apache project, Cordova App Harness.

'Leaky Vessels' Docker Vulnerabilities in the Cloud | CSA

- cloudsecurityalliance.org - April 23, 2024

Four vulnerabilities have been discovered that target Docker container environments: CVE-2024-21626, CVE-2024-23651, CVE-2024-23652, and CVE-2024-23653.

M-Trends 2024: Our View from the Frontlines

- GCP security blogs - April 23, 2024

M-Trends 2024 continues our tradition of providing relevant security metrics, analysis, and guidance.

Join industry experts Rhys Arkins and Jeffrey Martin for an exclusive webinar on combating supply chain threats.

Today, I am happy to announce the general availability of Guardrails for Amazon Bedrock, first released in preview at re:Invent 2023. With Guardrails for Amazon Bedrock, you can implement safeguards in your generative artificial intelligence (generative AI) applications that are customized to your use cases and responsible AI policies. You can create multiple guardrails tailored to […]

Today, we are announcing the general availability of Meta's Llama 3 models in Amazon Bedrock. Meta Llama 3 is designed for you to build, experiment, and responsibly scale your generative artificial intelligence (AI) applications. New Llama 3 models are the most capable to support a broad range of use cases with improvements in reasoning, code […]

During AWS re:Invent 2023, we announced the preview of Amazon Titan Image Generator, a generative artificial intelligence (generative AI) foundation model (FM) that you can use to quickly create and refine realistic, studio-quality images using English natural language prompts. I'm happy to share that Amazon Titan Image Generator is now generally available in Amazon Bedrock, […]

With Amazon Bedrock, you have access to a choice of high-performing foundation models (FMs) from leading artificial intelligence (AI) companies that make it easier to build and scale generative AI applications. Some of these models provide publicly available weights that can be fine-tuned and customized for specific use cases. However, deploying customized FMs in a […]

The Amazon Bedrock model evaluation capability that we previewed at AWS re:Invent 2023 is now generally available. This new capability helps you to incorporate Generative AI into your application by giving you the power to select the foundation model that gives you the best results for your particular use case. As my colleague Antje explained […]

With Agents for Amazon Bedrock, applications can use generative artificial intelligence (generative AI) to run tasks across multiple systems and data sources. Starting today, these new capabilities streamline the creation and management of agents: Quick agent creation – You can now quickly create an agent and optionally add instructions and action groups later, providing flexibility […]

Neutralizing the Threat with Cloud Remediation | CSA

- cloudsecurityalliance.org - April 23, 2024

Smooth remediation requires meticulous coordination. The complexity and scale of the process means that both manual and automated methods should be used.

European police warn that default E2EE could severely hamper efforts to tackle online crimes like child abuse and terrorism.

German authorities issued arrest warrants against three citizens on suspicion of spying for China.

Businesses face massive disruptions from cyberattacks. From revenue losses to strained customer relations. Discover the hidden costs of cyber breaches

The U.S. is cracking down on individuals involved in the development and sale of commercial spyware.

Hackers linked to Russia have been exploiting a Windows bug for YEARS to deploy GooseEgg malware for escalating attack access.

The head of counterintelligence for a division of the Russian Federal Security Service (FSB) was sentenced last week to nine years in a penal colony for accepting a USD $1.7 million bribe to ignore the activities of a prolific Russian…

If you are managing lots of accounts and Amazon Virtual Private Cloud (Amazon VPC) resources, sharing and then associating many DNS resources to each VPC can present a significant burden. You often hit limits around sharing and association, and you may have gone as far as building your own orchestration layers to propagate DNS configuration […]

The data used to train AI models needs to reflect the production environments where applications are deployed.

AWS Summits continue to rock the world, with events taking place in various locations around the globe. AWS Summit London (April 24) is the last one in April, and there are nine more in May, including AWS Summit Berlin (May 15–16), AWS Summit Los Angeles (May 22), and AWS Summit Dubai (May 29). Join us […]

Ninja Van uses GKE to deliver a flexible, stable and scalable platform for its core applications.

Kaspersky has uncovered a concerning threat actor, ToddyCat, targeting government and military entities.

Securing Slack: Best Practices and Offboarding | CSA

- cloudsecurityalliance.org - April 22, 2024

Explore effective security practices for Slack, highlighting the importance of robust offboarding procedures to prevent unauthorized access.

How Giant Swarm Is Helping to Support the Future of Flux

- thenewstack.io operations - April 22, 2024

When its creator, Weaveworks, shut down, Flux got pledges of support. That should inspire confidence in the open source platform, said Puja Abbassi in this episode of The New Stack Makers.

SOC 2 Privacy vs. Confidentiality: Key Differences | CSA

- cloudsecurityalliance.org - April 22, 2024

Understand the crucial differences between privacy and confidentiality within the SOC 2 framework to enhance your business's data security strategies.

With enterprises using 53 different security solutions, why are breaches still a frequent reality? Unpack the paradox in our latest report.

Looking for a DevOps job? Look at these openings at NBC Universal, BAE, UBS and more.

MITRE, a top cybersecurity firm, breached by a nation-state. Zero-days and session hijacking were the weapons.

Zero Trust: A Clear Explanation for Leaders | CSA

- cloudsecurityalliance.org - April 22, 2024

Clarify the zero trust security model for your leadership team with insights on its principles, ensuring robust and informed cybersecurity strategies.

Major cybercrime groups are under attack by police. But are these takedowns effective? Some groups vanish, others bounce back in DAYS.

Researchers detail a flaw in the Windows DOS-to-NT path conversion process which can be exploited by threat actors to gain rootkit like powers.

North Korea's state-linked hackers are enhancing their operations with advanced artificial intelligence tools.

Ambient AI? Humane's 'Ai Pin' Embarks on a Dream's Long Road

- thenewstack.io edge-computing - April 21, 2024

Although reviews of the Ai Pin were pretty uniformly terrible, its promise of a life beyond smartphones remains compelling.

DEVOPS WEEKLY ISSUE #694 - 21st April 2024

- devopsweeklyarchive.com - April 21, 2024

A theme of architecture this week, with posts on the development of large systems, infrastructure evolution at scale, internal developer toolchains and more.

A new variant of the RedLine Stealer malware has been discovered, utilizing Lua bytecode for stealth and effectiveness.

SRE Weekly Issue #421 – SRE WEEKLY

- sreweekly.com - April 21, 2024

Easily the majority of incidents I've been in.

Tricentis is adding multiple artificial intelligence (AI) assistants to make it simpler for DevOps teams to create tests for applications,

Install OpenProject with Linux and Docker

- thenewstack.io operations - April 20, 2024

OpenProject can do classical as well as agile project management for the entire project life cycle. Here's how to set it up securely on your Linux server.

A critical vulnerability (CVE-2024-3400) in Palo Alto Networks PAN-OS is being actively exploited by threat actors.

If you use CrushFTP for file transfers, update to the latest version immediately.

Redis is taking it in the chops, as both maintainers and customers move to the Valkey Redis fork.

Amazon Q feature development enables teams using Amazon CodeCatalyst to scale with AI to assist developers in completing everyday software development tasks. Developers can now go from an idea in an issue to a fully tested, merge-ready, running application code in a Pull Request (PR) with natural language inputs in a few clicks. Developers can […]

Linux: Glider Daemon Automates Performance Monitoring

- thenewstack.io observability - April 19, 2024

Hyundai's Peace Lee spent nine years writing Glider, which comes with over 150 performance-tracking and visualization command-line tools.

This blog post is written by Brianna Rosentrater, Hybrid Edge Specialist SA. AWS Elastic Disaster Recovery Service (AWS DRS) now supports disaster recovery (DR) architectures that include on-premises Windows and Linux workloads running on AWS Outposts. AWS DRS minimizes downtime and data loss with fast, reliable recovery of on-premises and cloud-based applications using affordable storage, […]

In this newsletter, Google Cloud CISO Phil Venables recaps 20 major security announcements from Next '24.

GitLab Duo Chat is a natural language interface which helps generate code, create tests and access code summarizations.

Cloud technologies are a rapidly evolving landscape. Securing cloud applications is everyone's responsibility, meaning application development teams are needed to follow strict security guidelines from the earliest development stages, and to make sure of continuous security scans throughout the whole application lifecycle. The rise of generative AI enables new innovative approaches for addressing longstanding challenges with […]

7 Terms About Cyber Threats and Vulnerabilities | CSA

- cloudsecurityalliance.org - April 19, 2024

Define 7 fundamental terms about cyber threats and vulnerabilities, including threat modeling, vulnerability scanning, and vulnerability management.

How to Use Low-CVE Chainguard Container Images on Docker Hub

- thenewstack.io containers - April 19, 2024

For overall security, the attributes of a vetted CVE-free or reasonably CVE-free container, which Chainguard offers, provide an effective level of protection.

China-linked hacking group Earth Hundun is targeting Asia-Pacific tech, research, and government sectors with advanced malware, including "Waterbear"

Microsoft Copilot Security Risks & SSPM Solutions | CSA

- cloudsecurityalliance.org - April 19, 2024

Uncover the security vulnerabilities of Microsoft Copilot and how SSPM solutions can safeguard critical data within SaaS environments.

Expect more attacks on the open source software supply chain, with attackers automating attacks in common projects and package managers.

How attackers are hacking organizations without touching the endpoint by targeting cloud identities.

Akira Ransomware group has already extorted roughly $42 million from over 250 victims globally. They are now targeting both Windows and Linux systems.

Data-Centric Security for Modern Data Teams | CSA

- cloudsecurityalliance.org - April 19, 2024

Explore how to secure modern data teams and manage enterprise data with innovative data-centric security approaches.

A new threat, 'DuneQuixote', targets Middle East governments with sophisticated evasion tactics.

This post was coauthored by Venkatesh Nannan, Sr. Engineering Manager at Rippling Introduction Rippling is a workforce management system that eliminates the friction of running a business, combining HR, IT, and Finance apps on a unified data platform. Rippling's mission is to free up intelligent people to work on hard problems. Existing Stack Rippling uses […]

Note: This is a more in-depth follow-on post from our high-level, introductory blog on IAM Access Analyzer for S3. Organizations generate, use, and store more data today than ever before. With securing data a top priority, many enterprises focus on implementing the principle of least privilege access, or limiting users to the minimum necessary access […]

French » Spanish » Amazon Web Services (AWS) is pleased to announce that a translated version of our 2023 ISO 27001 and 2023 ISO 22301 certifications are now available: The 2023 ISO 27001 certificate is available in Spanish and French. The 2023 ISO 22301 certificate is available in Spanish. Translated certificates are available to customers […]

IPRally built a custom ML platform using Google Kubernetes Engine (GKE) and Ray that provides streamlined machine learning operations (MLOps).

With better code suggestions and automated testing, low/no-code platforms deliver solutions that meet the demands of today's users.

Immersive Stream for XR now supports Unreal Engine 5.3

- GCP networking blogs - April 18, 2024

Support for Unreal Engine 5.3 and a new template make it easier for developers to use the Immersive Stream for XR rendering platform.

Using Kubernetes policy-as-code (PaC) solutions, administrators and security professionals can enforce organization policies to Kubernetes resources. There are several publicly available PAC solutions that are available for Kubernetes, such as Gatekeeper, Polaris, and Kyverno. PaC solutions usually implement two features: Use Kubernetes admission controllers to validate or modify objects before they're created to help enforce configuration best […]

Ukrainian government networks have been compromised by the OfflRouter malware since 2015. This malware is causing sensitive documents to be exposed.

FIN7, a notorious cybercrime group, is targeting the U.S. automotive industry with spear-phishing attacks.

What's Next for Companies Built on Open Source?

- thenewstack.io cloud-native - April 18, 2024

At KubeCon Europe, tech company leaders and representatives said they expected to see more open source project creators tighten up their licensing.

Kernel Introspection from Linux to Windows | CSA

- cloudsecurityalliance.org - April 18, 2024

Cybersecurity is moving toward monitoring system activity directly within the kernel. This is evident in the adoption of projects like Tetragon in Linux.

Keep your organization out of the ransomware news headlines and your applications protected with this simple, effective solution from Zerto.

Ever worried about malware in PDFs? ANY.RUN's sandbox can expose hidden threats just by analyzing the file's structure.

New Android malware "SoumniBot" targets users in South Korea by exploiting unique evasion tactics. Find out how it slips through security cracks.

An international law enforcement operation has busted LabHost, a notorious cybercrime service used for phishing attacks.

Effective Strategies to Mitigate Data Breaches | CSA

- cloudsecurityalliance.org - April 18, 2024

Explore essential measures to guard against data breaches, including multi-factor authentication, UEBA, and Zero Trust architectures.

Vulnerabilities in OpenMetadata are being exploited. These critical security flaws enable hackers to get into Kubernetes environments.

Hackers are using fake domains of popular IP scanners like Advanced IP Scanner & ManageEngine in a Google Ads malvertising scheme to spread malware.

It is important for cloud security operations teams to maintain a high level of cloud security and detect and respond to malicious web activity in near real-time. AWS WAF helps protect web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources. However, as your cloud environment scales with […]

Modern software development teams understand the importance of observability as a critical aspect of building reliable and resilient applications. By implementing observability practices, software teams can proactively identify issues, uncover performance bottlenecks, and enhance system reliability. However, it is a fairly recent trend and still lacks industry-wide adoption. As organizations standardize on containers, they often […]

Datadog today published a State of DevSecOps report that finds 90% of Java services running in a production environment are vulnerable.

Our customers depend on Amazon Web Services (AWS) for their mission-critical applications and most sensitive data. Every day, the world's fastest-growing startups, largest enterprises, and most trusted governmental organizations are choosing AWS as the place to run their technology infrastructure. They choose us because security has been our top priority from day one. We designed […]

Amazon Elastic Container Registry (Amazon ECR) provides a fully managed container registry service, offering high-performance hosting for reliably deploying application images anywhere. Amazon ECR service requires repositories to pre-exist before pushing container images. In this post, we explore a dynamic solution that leverages AWS CloudTrail, Amazon EventBridge, and AWS Lambda functions to automatically create Amazon […]

What are the trust best practices? We honestly don't know yet. But, if we're to trust our open source projects, we must figure it out.

With 6M 100% random-read and 6M write IOPS, Z3 VMs provide consistent performance and predictable maintenance experience for storage-dense workloads.

Hyperdisk Storage Pools is now generally available

- GCP compute blogs - April 17, 2024

Hyperdisk Storage Pools allows you to share thin-provisioned and data-reduced capacity across up to 1,000 disks in a single project.

Optimizing Small Privacy Teams: Strategies & Compliance | CSA

- cloudsecurityalliance.org - April 17, 2024

Learn effective strategies for small privacy teams to manage data protection and stay compliant amidst evolving legislation.

A new stealthy backdoor malware called Kapeka, likely created by Russia's APT group Sandworm, has been targeting Eastern Europe.

10 Tips to Guide Your Cloud Email Security Strategy | CSA

- cloudsecurityalliance.org - April 17, 2024

Cloud office platforms like Microsoft 365 need strong cybersecurity solutions. Shape your cloud email security strategy with these tips.

Auto Reply - DevOps.com

- devops.com - April 17, 2024

We're going to send email messages that say, "Hope this finds you in a well" and see if anybody notices.

Hackers are exploiting a critical vulnerability in Atlassian servers to gain admin access and deploy a Linux variant of Cerber ransomware.

GenAI: A New Headache for SaaS Security Teams

- thehackernews.com - April 17, 2024

GenAI isn't just hype—it's a toolbox revolutionizing how we develop software, manage emails, and create content.

The Overlap Between Cloud Workloads and Cybersecurity | CSA

- cloudsecurityalliance.org - April 17, 2024

Cloud workloads can end up in a malefactor's spotlight because they serve as conduits to accessing the wider applications they belong to.

Grafana 11: No Need to Create PromQL Queries for Prometheus

- thenewstack.io kubernetes - April 17, 2024

Grafana 11 provides a more accessible and user-friendly way of authoring Prometheus rules for event monitoring and alerting within Grafana.

If you use Fortinet FortiClient EMS, patch NOW. Hackers are actively using a new exploit

Researchers alert of a global rise in brute-force attacks from TOR nodes targeting VPNs, web interfaces, and SSH services

Many customers migrating their workloads to AWS using AWS Application Migration Service want to use different AWS accounts to support their company's governance and security needs. Customers may also choose to use Infrastructure As Code (IaC) templates using AWS CloudFormation or Terraform with Application Migration Service to deploy source servers to different AWS Accounts. To […]

The AWS Well-Architected Framework is a collection of best practices that helps customers build and operate secure, high-performing, resilient, and cost-effective workloads on the AWS Cloud. With the AWS Well-Architected Tool (AWS WA Tool), you can review the state of your applications and workloads against architectural best practices, identify opportunities for improvement, and track progress […]

Hyperdisk Balanced for GKE now available

- GCP compute blogs - April 16, 2024

New Hyperdisk Balanced storage volumes on GKE are a good fit for workloads that typically rely on persistent SSDs.

Golang: How to Write a For Loop

- thenewstack.io operations - April 16, 2024

The for loop is the most basic type of loop in the Go programming language, but it's one you'll use quite often. Here's how it works.

Security researchers uncover a "credible" takeover attempt on the OpenJS Foundation, mirroring a recent incident with XZ Utils.

We are living in the generative artificial intelligence (AI) era; a time of rapid innovation. When Anthropic announced its Claude 3 foundation models (FMs) on March 4, we made Claude 3 Sonnet, a model balanced between skills and speed, available on Amazon Bedrock the same day. On March 13, we launched the Claude 3 Haiku […]

Two thirds of developers are using AI in product development, primarily for coding, documentation, and conducting research.

Most developers are using some form of DevOps practices, reports the CDF survey. Adopting STANDARD DevOps practices? Not so much.

Popular cloud CLI tools (AWS, Google Cloud, Azure) have a vulnerability ("LeakyCLI") exposing sensitive data in build logs.

TA558 hackers are using steganography to hide and distribute malware like Agent Tesla, FormBook, Remcos RAT, LokiBot.

Who Stole 3.6M Tax Records from South Carolina?

- krebsonsecurity.com - April 16, 2024

For nearly a dozen years, residents of South Carolina have been kept in the dark by state and federal investigators over who was responsible for hacking into the state's revenue department in 2012 and stealing tax and bank account information…

Microsoft 365 Copilot: AI Ecosystems & Data Security | CSA

- cloudsecurityalliance.org - April 16, 2024

Explore how Microsoft 365's Copilot enhances workflow productivity while addressing data security and compliance risks.

Managed observability platforms offer insights into system health, necessitating a significant volume of high-quality telemetry data.

A critical vulnerability in PuTTY, affecting versions 0.68 through 0.80, compromises the security of NIST P-521 private keys.

Ever heard of shadow admins? A single slip in settings can create 109 of them, risking your entire network's security! Learn how to prevent this.

How to Audit Your Outdated Security Processes | CSA

- cloudsecurityalliance.org - April 16, 2024

Use the template described in this article to audit your outdated security processes and determine which processes to update first.

The FTC fined mental telehealth service Cerebral over $7 million for deceptive data sharing practices and failing to honor its cancellation policies.

Two arrested for developing and distributing Hive RAT malware & a Nebraska man indicted for a massive $3.5 million cloud cryptojacking scheme.

The Internet has a plethora of moving parts: routers, switches, hubs, terrestrial and submarine cables, and connectors on the hardware side, and complex protocol stacks and configurations on the software side. When something goes wrong that slows or disrupts the Internet in a way that affects your customers, you want to be able to localize […]

Introduction With the rising popularity of applications hosted on Amazon Elastic Kubernetes Service (Amazon EKS), a key challenge is handling increases in traffic and load efficiently. Traditionally, you would have to manually scale out your applications by adding more instances – an approach that's time-consuming, inefficient, and prone to over or under provisioning. A better […]

A Matter of Measurement - DevOps.com

- devops.com - April 15, 2024

We're all asked to assess our skills, sometimes. Surely this answer is as good as any?

Commonhaus is taking a laissez-faire approach to open source group management.

An effective incident management is foremost for maintaining system reliability and ensuring quick responses to unexpected incidents. Incident Manager, a capability of AWS Systems Manager, helps to mitigate and recover from these incidents by enabling automated responses. In a previous blog with Incident Manager, we talked about setting up escalation mechanisms, creating response plans and […]

Is Platform Engineering Really Just API Governance?

- thenewstack.io platform-engineering - April 15, 2024

Does it matter if you call it platform engineering or API governance? Map out and standardize your APIs so they can be easily accessed internally and reused.

Crickets from Chirp Systems in Smart Lock Key Leak

- krebsonsecurity.com - April 15, 2024

The U.S. government is warning that smart locks securing entry to an estimated 50,000 dwellings nationwide contain hard-coded credentials that can be used to remotely open any of the locks. The lock's maker Chirp Systems remains unresponsive, even though it…

The PartyRock Generative AI Hackathon wrapped up earlier this month. Entrants were asked to use PartyRock to build a functional app based on one of four challenge categories, with the option to remix an existing app as well. The hackathon attracted 7,650 registrants who submitted over 1,200 projects, and published over 250 project blog posts […]

A security vulnerability in the Lighttpd web server, often used in BMCs, has not been addressed by certain vendors, including Intel and Lenovo.

Japanese | Korean | Spanish We continue to listen to our customers, regulators, and stakeholders to understand their needs regarding audit, assurance, certification, and attestation programs at Amazon Web Services (AWS). We are pleased to announce that for the first time an AWS System and Organization Controls (SOC) 1 report is now available in Japanese […]

AWS Community Days conferences are in full swing with AWS communities around the globe. The AWS Community Day Poland was hosted last week with more than 600 cloud enthusiasts in attendance. Community speakers Agnieszka Biernacka, Krzysztof Kąkol, and more, presented talks which captivated the audience and resulted in vibrant discussions throughout the day. My teammate, […]

Project post by Yufei Chen, Miao Hao, and Min Huang, Dragonfly project This document will help you experience how to use dragonfly with TritonServe. During the downloading of models, the file size is…

Cloud Relationships: The 'Vendor of My Vendor' | CSA

- cloudsecurityalliance.org - April 15, 2024

Organizations need to get a complete picture from cloud vendors of where their cloud infrastructure is hosted and if data is transferring over borders.

Google Cloud launches new generative AI training, and certificates in data analytics and cybersecurity to prepare learners for entry-level cloud jobs.

Muddled Libra threat group weaponizes SaaS & cloud environments for data exfiltration.

Discover the implications for software developed with tools like GitHub Copilot. Learn more about securing your code against AI vulnerabilities.

Attack (or Penetrate Test) Cloud Native the Easy Way

- thenewstack.io kubernetes - April 15, 2024

Security tools are needed to relativize and prioritize vulnerabilities that should be acted on immediately.

In an ever-changing security landscape, teams must be able to quickly remediate security risks. Many organizations look for ways to automate the remediation of security findings that are currently handled manually. Amazon CodeWhisperer is an artificial intelligence (AI) coding companion that generates real-time, single-line or full-function code suggestions in your integrated development environment (IDE) to […]

CISOs: From Lone Wolves to Business Superheroes | CSA

- cloudsecurityalliance.org - April 15, 2024

Explore how CISOs transform into business-savvy leaders, mastering risk management, strategic learning, and inspirational leadership.

Looking for a new DevOps role? Check out these available opportunities at Northrup Grumman, GovCIO, Northwestern Mutual, and more.

U.S. Gears Up for Groundbreaking AI Legislation | CSA

- cloudsecurityalliance.org - April 15, 2024

Discover the imminent wave of AI legislation in the U.S., aiming to set standards for innovation, privacy, and ethical AI use.

Did you know? Implementing JIT privileged access can drastically cut down the risk of privilege misuse! Learn how to secure your systems with JIT stra

A sophisticated cyber-espionage campaign has re-emerged, targeting South Asia with an iOS spyware implant called LightSpy.

Palo Alto Networks has issued critical hotfixes for a severe security vulnerability in PAN-OS, which is being actively exploited.

SRE Weekly Issue #420 – SRE WEEKLY

- sreweekly.com - April 15, 2024

The game Last Epoch launched in February, and they had a rocky start. This huge retrospective post tells the story of what happened and how they fixed it.

DEVOPS WEEKLY ISSUE #693 - 14th April 2024

- devopsweeklyarchive.com - April 14, 2024

I've been crazy busy this week and travelling today, and with it being the start of a new quarter I thought a highlights issue, with some of the top posts from January, February and March was in order.

Former security engineer sentenced to 3 years for stealing $12.3M from crypto exchanges using insider skills.

US Treasury sanctions Hamas official, Hudhayfa Samir Abdallah al-Kahlut, for cyber influence operations and threats against civilians.

Cloud Service Provider Evaluation & The STAR Registry | CSA

- cloudsecurityalliance.org - April 13, 2024

Evaluate the security posture of cloud service providers with the CSA STAR Registry. As a cloud customer, confirm your standards are being met.

Hackers have been exploiting a severe flaw (CVE-2024-3400) in Palo Alto Networks' software that began nearly three weeks before discovery.

As organizations adopt containerization technologies, such as Kubernetes, the challenge of making sure of security and compliance becomes increasingly complex. With Kubernetes environments that span Infrastructure-as-Code (IaC) and Kubernetes clusters, maintaining a secure posture can be a daunting task. To tackle this complexity and reduce risk, many teams are turning to standardized tooling. Organizations that […]

Today, AWS Key Management Service (AWS KMS) is introducing faster options for automatic symmetric key rotation. We're also introducing rotate on-demand, rotation visibility improvements, and a new limit on the price of all symmetric keys that have had two or more rotations (including existing keys). In this post, I discuss all those capabilities and changes. […]

Want the environmental benefits of moving to the cloud? These tools help you get there faster by measuring applications' carbon emissions.

Ethical Governance in the Era of Generative AI | CSA

- cloudsecurityalliance.org - April 12, 2024

Addressing the urgent need for ethical governance in Generative AI to mitigate risks and secure a responsible technological future.

Chipmakers Putting a Laser Focus on Edge AI

- thenewstack.io edge-computing - April 12, 2024

Arm, Intel, and NVIDIA in recent weeks have rolled out new CPUs, GPUs, and NPUs to fuel compute and app development at the edge.

Malicious "test files" linked to the XZ Utils backdoor found in popular Rust crate liblzma-sys, downloaded over 21,000 times.

Protocols vs. APIs for Zero Trust Implementation | CSA

- cloudsecurityalliance.org - April 12, 2024

As Zero Trust security continues to gain traction, evaluate using APIs versus protocols and their various issues.

Community post by Anup Ghatage Log messages are essential for debugging and monitoring applications, but they can often be overly verbose and cluttered, making it difficult to quickly identify and…

Navigating RCE Vulnerabilities in AWS Environments | CSA

- cloudsecurityalliance.org - April 12, 2024

Explore the critical landscape of RCE vulnerabilities within AWS, detailing prevention and mitigation strategies to protect your cloud assets

Code Keepers: Mastering Non-Human Identity Management

- thehackernews.com - April 12, 2024

Worried about the security of non-human identities in your digital systems? Learn how Entro's comprehensive solution can protect your critical data an

Cloud Gaming & Data Security: Balancing Fun & Privacy | CSA

- cloudsecurityalliance.org - April 12, 2024

Explore how cloud game streaming affects data security and what steps can be taken to mitigate risks.

MuddyWater, linked to Iran's MOIS, strikes again with DarkBeatC2. Our latest blog unpacks the latest tactics in cyber warfare.

Critical security flaw found in Palo Alto Networks firewalls. Hackers are already taking advantage.

CISA ordered federal agencies to analyze compromised emails and ramp up cybersecurity measures following the recent compromise of Microsoft's systems.

E-commerce website owners and admins – BEWARE! Reseachers uncover a credit card skimmer hidden within a bogus Meta Pixel tracker script.

Small and Medium Businesses (SMBs) need to operate with high availability and mitigate security risks while keeping costs low. An AWS multi-account environment with workload isolation, robust access control, cost visualization, and integrated security mechanisms can help SMBs build a platform to support growth. SMBs want to deploy a multi-account environment on AWS quickly and […]

Small and Medium Businesses (SMBs) need to operate with high availability and mitigate security risks while keeping costs low. An AWS multi-account environment with workload isolation, robust access control, cost visualization, and integrated security mechanisms can help SMBs build a platform to support growth. SMBs want to deploy a multi-account environment on AWS quickly and […]

Why CISA is Warning CISOs About a Breach at Sisense

- krebsonsecurity.com - April 11, 2024

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) said today it is investigating a breach at business intelligence company Sisense, whose products are designed to allow companies to view the status of multiple third-party online services in a single dashboard.…

Today, we are announcing new capabilities that enable customers to off-board their stacks, layers, and instances from AWS OpsWorks Stacks before it reaches End of Life on May 26, 2024. Previously, we released this blog post that provides customers a way to migrate workloads in a blue/green manner from OpsWorks Stacks to a new architecture […]

As discussed in this blog post, AWS sees organizations with well-defined, tracked and aligned business key performance indicators (KPIs) thrive in their cloud transformation journey. However, it is a challenge to define and track these KPIs. Even when organizations align to track outcomes and there is value in doing so, some encounter difficulties focusing on […]

During this special KubeCon + CloudNativeCon Europe 2023 edition of DevOps Unbound , Alan Shimel and Mitch Ashley are joined by Martin Klaus, Tricentis VP

The legal battle between the faux-open-source HashiCorp and the open source OpenTofu heats up.

Private Service Connect for Cloud SQL databases

- GCP networking blogs - April 11, 2024

Customers can use Private Service Connect for private connectivity from applications to Cloud SQL databases.

Introducing Cloud NGFW Enterprise, which can deliver comprehensive Zero Trust network protection for your Google Cloud workloads.

Today at Next we're announcing Isolator, which adds a vital layer of protection to healthcare data used in collaborations between parties.

Optimizing AWS Backup costs | Amazon Web Services

- AWS storage blogs - April 11, 2024

The threat of ransomware has placed data protection front and center as a top priority for all businesses. The Sophos State of Ransomware Report 2023 reported that 66% of organizations were impacted in 2022 with a median ransomware payout of $400,000 (average pay out of $1.54 million). With the median recovery cost of using backups […]

Financial services customers that are regulated by the U.S. Securities and Exchange Commission (SEC) are required by regulations (17 CFR § 240.17a-4 and 17 CFR § 240.18a-6, or, briefly, "17a-4" and "18a-6") to store their electronic books and records under certain protective measures. Both 17a-4 and 18a-6 require the ability to retrieve the original, unmodified […]

An update was made on April 11th, 2024, outlining deployment procedure. This post guides you through setting up the networking layer for a multi-Region active-active application architecture on AWS using latency-based routing in Amazon Route 53 with Amazon CloudFront to deliver a low-latency, reliable experience for your users. Building active-active architectures using AWS networking services improves […]

Ambassador post originally published on Logz.io's blog by Dotan Horovits The topic of continuous profiling has been an ongoing discussion in the observability world for some time. I said back in 2021…

Python's PyPI Reveals Its Secrets

- thehackernews.com - April 11, 2024

Exposed secrets on GitHub and PyPI are more prevalent than you think. GitGuardian's latest report reveals shocking numbers. Dive into the details here

Building a SOC for Compliance | CSA

- cloudsecurityalliance.org - April 11, 2024

Compliance is living in the old world. Keeping up-to-date in the age of digital transformation is a losing battle. It's time for a SOC for compliance.

TA547 hacker group adopts new tactics, possibly harnessing the power of generative AI, to deploy the Rhadamanthys info stealer in attacks on German or

Python's PyPI Reveals Its Secrets

- thehackernews.com - April 11, 2024

Exposed secrets on GitHub and PyPI are more prevalent than you think. GitGuardian's latest report reveals shocking numbers. Dive into the details here

The Importance of Accredited Auditors for ISO 27001 | CSA

- cloudsecurityalliance.org - April 11, 2024

Achieving an ISO 27001 certification requires the expertise of accredited auditors, serving as a seal of trust and competency.

Apple's updated spyware alert system now warns individual users of potential targeting by mercenary spyware attacks.

- thehackernews.com - April 11, 2024

If you use FortiClientLinux, update immediately. Critical vulnerability could let attackers run code on your system. Patch now, get the details here.

Google has added a GenAI tool dubbed Gemini Cloud Assist to automate a wider range of tasks across the software development lifecycle.

Pacific Connect initiative to expand

- GCP infra blogs - April 10, 2024

Google to invest $1 billion in digital connectivity to Japan with Proa and Taihei subsea cables, plus extensions of Tabua and TPU systems.

Introduction Snapchat is an app that hundreds of millions of people around the world use to communicate with their close friends. The app is powered by microservice architectures deployed in Amazon Elastic Kubernetes Service (Amazon EKS) and datastores such as Amazon CloudFront, Amazon Simple Storage Service (Amazon S3), Amazon DynamoDB, and Amazon ElastiCache. This post […]

Goodput metric as measure of ML productivity

- GCP compute blogs - April 10, 2024

The new ML Productivity Goodput metric measures the efficiency of the overall ML system, and can be monitored and integrated via API.

Overview Amazon EKS Anywhere (EKS Anywhere) is an opinionated and automated deployment of the Amazon EKS Distro that enables users to create and operate Kubernetes clusters on user-managed infrastructure. EKS Anywhere does not include a Container Storage Interface (CSI) driver for persistence. In this post, we setup OpenEBS to provide persistence using the disks available in […]

Twitter's Clumsy Pivot to X.com Is a Gift to Phishers

- krebsonsecurity.com - April 10, 2024

On April 9, Twitter/X began automatically modifying links that mention "twitter.com" to redirect to "x.com" instead. But over the past 48 hours, dozens of new domain names have been registered that demonstrate how this change could be used to craft…

Tetrate Enterprise Gateway for Envoy Graduates

- thenewstack.io kubernetes - April 10, 2024

With this release, Envoy is ready to replace Kubernetes Ingress controllers.

Storage announcements at Next '24

- GCP storage blogs - April 10, 2024

Storage announcements at Google Cloud Next '24 addressed how to enable demanding AI and ML workloads.

Introducing Cloud Service Mesh

- GCP networking blogs - April 10, 2024

Cloud Service Mesh combines Traffic Director's control plane with Google's Istio-based Anthos Service Mesh into a single managed offering.

Track down shadow APIs with Apigee

- GCP security blogs - April 10, 2024

As part of Advanced API Security in Apigee API Management, there is now the capability in public preview to track down shadow APIs.

At Next '24, we're announcing advancements in our Confidential Computing solutions that expand hardware options, add additional support for AI workloads, and further expand our partnerships.

App Hub: Organize & manage cloud applications at scale

- GCP devops/sre blogs - April 10, 2024

Simplify operations and governance at scale by empowering customers to centrally define and manage their applications in Google Cloud.

Gemma on Google Kubernetes Engine deep dive

- GCP containers blogs - April 10, 2024

We've enhanced GKE to help you serve and deploy Gemma, a family of lightweight, state-of-the art open models, on GKE Standard as well as Autopilot.

The latest advances for Google Cloud AI inference: JetStream and MaxDiffusion for high-performance LLM and diffusion model inference on Cloud TPUs.

What is infrastructure from code?

- cncf.io - April 10, 2024

Member post originally published on AppCD's blog by Lauren Rother Maybe you've heard of Infrastructure as Code (IaC), which is the process of managing and provisioning computer data center resources…

Active Android spyware campaign 'eXotic Visit' targeting users in India and Pakistan.

The Secret to Supercharging LLMs: It's Not Answers | CSA

- cloudsecurityalliance.org - April 10, 2024

Prompt engineering unlocks the full potential of LLMs. Want more efficient AI interactions? Customize ChatGTP to transform your LLM into a collaborator.

Rocket Software this week extended its DevOps platform for iSeries platforms from IBM to make it simpler to test applications.

Researchers uncover a fresh wave of the Raspberry Robin campaign spreading malware through malicious Windows Script Files (WSFs) since March 2024.

Hackers are exploiting GitHub's search feature to spread malware. Popular repositories are being cloned and infected.

Securing Non-Human Identities: Lessons from Cloudflare | CSA

- cloudsecurityalliance.org - April 10, 2024

Cloudflare disclosed on February 2nd that it had been breached by a suspected nation-state attacker. This breach exploited multiple exposed secrets.

The Eclipse Foundation is spearheading an effort to create a unified framework for secure software development.

Hands-on Review: Cynomi AI-powered vCISO Platform

- thehackernews.com - April 10, 2024

Need to scale vCISO services without draining your resources? Cynomi's AI-driven platform automates security assessments, compliance readiness, policy

Why Cyber Defenders Should Embrace a Hacker Mindset | CSA

- cloudsecurityalliance.org - April 10, 2024

As a defender, taking the mindset of a threat actor allows you to better understand exploitable pathways and effectively prioritize remediation efforts.

Cybersecurity researchers reveal the 'first native Spectre v2 exploit' targeting Linux kernel on Intel systems.

Discover the secret tunnels hackers use to infiltrate your security defenses! Learn about Shadow Admins, Service Accounts, and more in our webinar.

Microsoft releases a massive patch for April 2024, fixing a record 149 flaws. Two vulnerabilities are ALREADY under attack.

A severe vulnerability (CVE-2024-24576) in the Rust standard library could lead to command injection attacks on Windows systems.

Monitoring containerized applications requires precision and efficiency. As your applications scale, collecting and summarizing application and infrastructure metrics from your applications can be challenging. One way to handle this challenge is using Amazon CloudWatch Container Insights which is a single-click native monitoring tool provided by AWS. Amazon CloudWatch Container Insights helps customers collect, aggregate, and summarize […]

This post was co-authored with Alex Kirpichny and Evgenia Chernyak (from Ispirer Systems) Introduction Many monolith applications have business logic in the database layer in the form of stored procedures and functions. Businesses have built and maintained their applications using PL/SQL, a reliable and robust programming language. As the technology landscape advances, harnessing the capabilities […]

April's Patch Tuesday Brings Record Number of Fixes

- krebsonsecurity.com - April 09, 2024

If only Patch Tuesdays came around infrequently -- like total solar eclipse rare -- instead of just creeping up on us each month like The Man in the Moon. Although to be fair, it would be tough for Microsoft to…

Hashicorp is accusing the open source OpenTofu Project of swiping some of its BSL-licensed Terraform code. Enter the lawyers.

Member post originally published on Fairwinds's blog by Joe Pelletier The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) continue to update their…

For businesses, particularly those in highly regulated industries, managing user accounts isn't just a matter of security but also a compliance necessity. In sectors such as finance, healthcare, and government, where regulations often mandate strict control over user access, disabling stale user accounts is a key compliance activity. In this post, we show you a […]

The updates promise to make it easier to invoke the capabilities of a Grafana Cloud platform based on open source software.

Highlight.io: Open Source Application Monitoring for Developers

- thenewstack.io operations - April 09, 2024

Highlight pairs session replay, a tool to play back user interactions and client-side logs, with more traditional error monitoring and logging tooling.

SEO Optimized - DevOps.com

- devops.com - April 09, 2024

Perhaps the desire for SEO-optimized everything has gone too far.

In today's workplace, your users need secure, authenticated remote connectivity to your applications. Until recently, many organizations took this requirement to mean "VPN connection." AWS Client VPN, introduced in 2018, has provided AWS customers with a managed, OpenVPN-based VPN client solution for securing remote access to on-premises and AWS-hosted applications. AWS Verified Access, launched in […]

Researchers uncovers Starry Addax, a sophisticated threat actor targeting Sahrawi Arab Democratic Republic activists.

RUBYCARP threat group, suspected to be of Romanian origin, has been discovered operating a botnet for crypto mining, DDoS, and phishing attacks

Multiple vulnerabilities found in LG webOS on smart TVs could grant unauthorized access. Researchers' findings revealed critical flaws impacting thous

Cloud Permissions & MITRE ATT&CK | CSA

- cloudsecurityalliance.org - April 09, 2024

Uncover the critical role of cloud permissions in the MITRE ATT&CK Framework's Persistence stage and how to safeguard against threats.

CL0P's Ransomware Rampage - Security Measures for 2024

- thehackernews.com - April 09, 2024

CL0P ransomware emerges as a major player in the cybercrime world! From "bed bug" beginnings to a global threat, this group's aggressive tactics are r

Platform Engineering and GenAI: 'Get Your House in Order'

- thenewstack.io devops - April 09, 2024

Generative AI's impact will affect workflows all throughout the software development life cycle, warned a panel at the DevOps Modernization Summit.

At Next, Google is announcing Chrome Enterprise Premium, a new offering that can help simplify and strengthen endpoint security.

What's new for networking at Next '24

- GCP security blogs - April 09, 2024

Enhancements to Cross-Cloud Network help modernize, simplify, and secure your network, while leveraging AI for productivity and efficiency.

At Next, we are announcing cybersecurity innovations that can deliver stronger security outcomes and enable you to make Google a part of your security team.

Gemini for Google Cloud is here

- GCP security blogs - April 09, 2024

Gemini for Google Cloud is a new generation of AI assistants for developers, services, and applications that help you work more effectively.

Google Cloud customers have access to a managed container platform designed to support AI and enterprise workload needs today and into the future.

Compute and infrastructure enhancements at Next '24

- GCP compute blogs - April 09, 2024

At Next '24, Google Cloud announced numerous compute and storage product releases for both general-purpose and specialized workloads.

AI Hypercomputer boosts efficiency and productivity for AI training, tuning, and serving workloads with new innovations and product launches.

Introducing Google's new Arm-based CPU

- GCP compute blogs - April 09, 2024

The custom Axion Arm-based processor is designed for general-purpose workloads like web and app servers, databases, analytics, CPU-based AI, and more.

Mapping the Impact of Cloud Remediation | CSA

- cloudsecurityalliance.org - April 09, 2024

Impact analysis is a critical step in the cloud remediation process that asks: “What might go wrong if we implement this fix? What if we don't?”

Cybersecurity experts uncover a sophisticated multi-stage attack! 🛡️ Malware including Venom RAT, Remcos RAT, and more deployed via invoice-themed ph

Hackers are exploiting vulnerabilities (CVE-2024-3272 and CVE-2024-3273) in D-Link NAS devices. Up to 92,000 devices affected.

Whether you're building a business case or planning your cloud migration, understanding your actual compute needs and software licensing entitlements is crucial early in your migration journey. These insights help you formulate a robust and well-informed cloud migration plan. They also help you achieve significant savings on your Windows, VMware, and Oracle workloads compared to […]

Your AI Might be Lying to You - DevOps.com

- devops.com - April 08, 2024

Simple tests can demonstrate whether a code generator is actually doing what you ask. That can be important for developers and DevOps who want to use these tools for activities like code or script generation.

A top global e-commerce retailer employs the concept of on-demand manufacturing to deliver a wide variety of affordable fashion apparel products to customers around the world. It serves end users globally with a mobile app and website for ordering, payment, and delivery. To improve the performance, resilience, flexibility, and scalability of its systems, the retailer […]

The Open Source Market's in Flux. How Can IT Managers Cope?

- thenewstack.io cloud-native - April 08, 2024

Unexpected license changes, rotating sponsors for projects and shrinking numbers of maintainers roil the open source world. Balance risks in choosing tools.

APN Partner Snowflake enables organizations to transform, integrate, and analyze their data. Running on AWS has helped them to keep up with a rapidly scaling customer base since 2012 (22% YoY total customer growth as of January 2024). With more customers comes more data, and efficient data management to manage operational overhead and cost is […]

We're just two days away from AWS Summit Sydney (April 10–11) and a month away from the AWS Summit season in Southeast Asia, starting with the AWS Summit Singapore (May 7) and the AWS Summit Bangkok (May 30). If you happen to be in Sydney, Singapore, or Bangkok around those dates, please join us. Last […]

Dynatrace's Carbon Impact App Dynatrace, in collaboration with Lloyds Banking Group, has taken a bold step forward with the Carbon Impact app. This

Explore these DevOps job opportunities at Maxar, General Motors, Ascendion and more.

Member post by Rakesh Girija Ramesan Nair, Senior Technology Architect, and Sherni Liz Samuel, Technology Architect, Infosys Limited This blog brings forth the key focus areas &

Cyberattacks on the water industry raise the prospect of more frequent, widespread incidents that threaten disruption to lives and livelihoods.

Google tackles Chrome security with new V8 Sandbox. This aims to stop memory issues from spreading, protecting your browser experience.

SOC 2 Compliance: CPA Role & Cloud Security | CSA

- cloudsecurityalliance.org - April 08, 2024

Navigate SOC 2 compliance intricacies, the crucial role of CPA firms, and standards ensuring robust cloud security.

'Latrodectus' strikes via phishing emails. This powerful downloader can execute commands, evade detection, and pave the way for further attacks.

Why Flux Isn't Dying after Weaveworks

- thenewstack.io devops - April 08, 2024

While Flux lost Weaveworks-employed Flux contributors, most of them continue their work on the project and it continues to have a significant and active contributor and user base.

Q1 2024 had 22% less ransomware attacks than Q4 2023. Why is that and is it a trend that will continue?

Insider Data Breach: HR Platform Risk Management | CSA

- cloudsecurityalliance.org - April 08, 2024

Learn how the recent insider data breach in a major US telecom highlights the need for improved HR platform security and risk management.

Latin America targeted in new phishing attack. Emails contain malicious HTML files disguised as invoices.

Google sues app developers for massive crypto scam. Scammers tricked 100,000+ users into downloading fake investment apps.

DEVOPS WEEKLY ISSUE #692 - 7th April 2024

- devopsweeklyarchive.com - April 07, 2024

Lots of KubeCon EU wrapup posts this week, along with new developer and operator tooling for incidents, developer productivity and API documentation.

SRE Weekly Issue #419 – SRE WEEKLY

- sreweekly.com - April 07, 2024

Retrofitting sharding is a huge undertaking.

Use Podman to Create and Work with Virtual Machines

- thenewstack.io cloud-native - April 06, 2024

Red Hat's Podman can not only be used to manage containers, but it is handy for building and maintaining virtual machines as well.

Exploit alert for Magento users! A critical flaw, CVE-2024-20720, allows threat actors to sneak a persistent backdoor into e-commerce sites.

KubeCon EU Q&A: Red Hat Engineer Bethany Griggs on Backstage

- thenewstack.io devops - April 05, 2024

As a dev, Bethany Griggs experienced the cognitive overload of building apps for an enterprise, and attests to the value of the developer portal.

If Dev and Ops Had a Baby — It Would Be Called Winglang

- thenewstack.io devops - April 05, 2024

The cloud is an organic system that evolves, and possibilities are endless — you can essentially build what you want. At the same time, it's a hostile and intimidating place.

Modular created Mojo to provide Python developers with a programming language to build high-performance applications, using a familiar syntax .

Lack of Data Mobility Is a Root Cause of Cloud Native Ills

- thenewstack.io kubernetes - April 05, 2024

A big question mark is how to protect our data, especially how to move it and access it as we want, not just being stuck on one cloud provider.

Next '24 sessions about managed container runtimes

- GCP containers blogs - April 05, 2024

A summary of the sessions about managed container runtimes (GKE, Cloud Run) not to miss at Next '24.

Disaster Recovery (DR) is a critical process for any organization wanting to maintain business continuity in the event of a disaster such as flood, power failure, or ransomware attack. The DR strategy adopted by organizations is commonly driven by a trade-off between cost and the business impact of the time it takes for the workloads […]

Cloud Security in 2024: AI, Compliance, & Advancement | CSA

- cloudsecurityalliance.org - April 05, 2024

Explore the pivotal cloud security and AI resources to be aware of in 2024. Focus on harnessing AI, mastering compliance, and elevating cloud security education for a safer digital future.

New research reveals critical security risks for AI-as-a-service providers like Hugging Face. Attackers could gain access to hijack models, escalate

Evolving Data Security in the Cloud Era | CSA

- cloudsecurityalliance.org - April 05, 2024

Explore the shift from Hadoop to modern data stacks and the critical need for data-centric security in cloud infrastructure.

The need to converge the management of NetOps and DevOps workflows has never been more critical.

Navigating cybersecurity compliance just got easier. Our latest blog taps into the wisdom of CISOs to share strategies for managing data security requ

How the Sys:All Loophole Penetrates GKE Clusters | CSA

- cloudsecurityalliance.org - April 05, 2024

Sys:All, a loophole in Google Kubernetes Engine, can allow any Google account holder to access vulnerable clusters. Learn more about these exposures.

Watch out for FAKE Adobe Acrobat Reader installers. They carry a nasty malware called Byakugan that steals your data.

Financial organizations in APAC & MENA are under attack. A sophisticated threat dubbed JSOutProx combines JavaScript & .NET to infiltrate systems.

Multiple China-linked threat actors exploit zero-day flaws in Ivanti appliances (CVE-2023-46805, CVE-2024-21887, CVE-2024-21893).

The Next 85 Years of Cloud Security Excellence | CSA

- cloudsecurityalliance.org - April 04, 2024

Over the last 15 years, the Cloud Security Alliance has gone from ambitious upstarts to a critical global stakeholder for cybersecurity.

Users modernizing their applications using Amazon Elastic Kubernetes Service (Amazon EKS) on AWS often run into critical IPv4 address space exhaustion driven by scale. They want to maximize usage of the VPC CIDRs and subnets provisioned for the EKS pods without introducing additional operational complexity. We believe that use of IPv6 address space is the […]

Golang Variables and Data Types: An Introduction

- thenewstack.io cloud-native - April 04, 2024

If you want to program in the Go programming language, you need to learn how variables and data types work. Easy-peasy: Start here.

Golang 1.22 Redefines the For Loop for Easier Concurrency

- thenewstack.io cloud-native - April 04, 2024

Golang 1.22 fixes a quirk in the for loop that has long-thwarted closure users. There's also a simpler way to iterate and even a promise of Go generators.

Fake Lawsuit Threat Exposes Privnote Phishing Sites

- krebsonsecurity.com - April 04, 2024

A cybercrook who has been setting up websites that mimic the self-destructing message service Privnote.com accidentally exposed the breadth of their operations recently when they threatened to sue a software company. The disclosure revealed a profitable network of phishing sites…

Introduction Quora is a leading Q&A platform with a mission to share and grow the world's knowledge, serving hundreds of millions of users worldwide every month. Quora uses machine learning (ML) to generate a custom feed of questions, answers, and content recommendations based on each user's activity, interests, and preferences. ML drives targeted advertising on […]

CoralRaider, a suspected Vietnamese threat actor, has been on the prowl since May 2023, targeting Asia and Southeast Asia with malware aimed at steali

Oil & gas companies beware! Hackers are using the updated Rhadamanthys info-stealer in phishing attacks.

Introducing Cloud Storage object retention lock

- GCP security blogs - April 04, 2024

The new object retention lock for Cloud Storage makes it easier to meet regulatory standards, strengthen security, and improve data protection.

Quiz #23 was: As a seasoned Site Reliability Engineer, you've encountered an alert indicating that the "worker-prod queue message age" has exceeded its

Member post originally published on Medium by DatenLord In distributed system application scenarios, it is inevitable to add or delete nodes or replace nodes, the simplest solution is to temporarily…

Platform Engineering: More Teams Now Running 3 or More IDPs

- thenewstack.io platform-engineering - April 04, 2024

Seventy-eight percent of people surveyed in a new report by Puppet by Perforce said their organization has had a dedicated platform team for at least three years.

Runtime is the Way | The Best ROI of Any Cloud Tool | CSA

- cloudsecurityalliance.org - April 04, 2024

Learn what objections people have to prioritizing runtime protection and why runtime security is actually the best return on investment.

How Kubernetes Faces a New Reality with the AI Engineer

- thenewstack.io kubernetes - April 04, 2024

Kubernetes now has an important role to play in helping data scientists, according to Sanjeev Mohan, an independent analyst, in this episode of The New Stack Makers.

Portland, Oregon, April 4th, 2024, CyberNewsWireCenter Identity, a pioneering cybersecurity company, is excited to unveil its patented secret location

Operational Technology (OT) Cybersecurity: A Balancing Act! OT systems' unique traits demand tailored security measures. Learn why safeguarding OT req

New research exposes vulnerability in HTTP/2 protocol! The CONTINUATION frame can be exploited for DoS attacks, warns security expert Bartek Nowotarsk

Podman 5 Arrives with Multiplatform Images, VM Support

- thenewstack.io containers - April 04, 2024

All of the changes made to Podman culminate in a much more flexible and responsive container runtime engine.

Unlike REST, GraphQL reduces the need for versioning by allowing new fields and types to be added without impacting existing queries.

Enhancing Cybersecurity with CASUAL in Microsoft 365 | CSA

- cloudsecurityalliance.org - April 04, 2024

Discover how CASUAL aids in preempting cyber threats in Microsoft 365, offering insights into attack tactics and enhancing digital defenses.

Ivanti has released updates addressing 4 critical flaws in Connect Secure and Policy Secure Gateways. Vulnerabilities could lead to code execution.

'The Manipulaters' Improve Phishing, Still Fail at Opsec

- krebsonsecurity.com - April 03, 2024

Roughly nine years ago, KrebsOnSecurity profiled a Pakistan-based cybercrime group called "The Manipulaters," a sprawling web hosting network of phishing and spam delivery platforms. In January 2024, The Manipulaters pleaded with this author to unpublish previous stories about their work,…

Introducing GKE Autopilot burstable workloads

- GCP containers blogs - April 03, 2024

New burstable workload support to in GKE Autopilot model allows your Pod to temporarily utilize resources outside of its resources.

Introduction Amazon Elastic Container Service (Amazon ECS) has now enhanced its functionalities by integrating support for Amazon Elastic Block Store (Amazon EBS) volume attachment to Amazon ECS tasks. This feature simplifies using Amazon ECS and AWS Fargate with Amazon EBS. Amazon ECS facilitates seamless provisioning and attachment of EBS volumes to ECS tasks on both […]

U.S. Cyber Safety Review Board slams Microsoft for security failures that enabled a major data breach by China-backed hackers.

Google's Pixel smartphones under attack. Two new Android security flaws - CVE-2024-29745 & CVE-2024-29748 - uncovered, exploited in the wild.

Understanding DNS options for GKE

- GCP containers blogs - April 03, 2024

Understand which supported DNS option to choose when creating or migrating to a new Google Kubernetes Engine cluster.

Introduction In this post, we review advanced global routing scenarios with AWS Cloud WAN and AWS Direct Connect and dive into how you can control routing to build connectivity between AWS and on-premises locations. We also share best practices for optimizing routing in multi-Region hybrid networks and review common high-availability settings and failover scenarios. Customers […]

Member post originally published on Fairwinds' blog by Joe Pelletier According to Gartner, cloud computing will become an essential component of maintaining business competitiveness by 2028. Indeed…

CSA Community Spotlight: Dr. Ricci Ieong | CSA

- cloudsecurityalliance.org - April 03, 2024

Dr. Ricci Ieong has over 20 years of industry experience in information technology. Get Ricci's perspective on Cloud Security Alliance assurance standards.

Silver Spring, United States / Maryland, April 3rd, 2024, CyberNewsWireThe Leading Company for Securing Access Between Workloads Recognized for the Aembit

Chrome's new feature, DBSC (Device Bound Session Credentials), aims to safeguard users against cookie theft by malware.

Defending Against Look-alike Domain Threat | CSA

- cloudsecurityalliance.org - April 03, 2024

Learn to navigate and defend against look-alike domain threats with essential tips on spotting and reporting deceptive tactics.

A critical step toward adopting automation for legacy applications is to change your organization's mindset about legacy systems.

Attack Surface Management vs. Vulnerability Management

- thehackernews.com - April 03, 2024

Vulnerability Management vs. Attack Surface Management: Understand the key differences in scope.

The State of Application Security in 2024 | CSA

- cloudsecurityalliance.org - April 03, 2024

CrowdStrike surveyed application security professionals to learn how effective they are at securing applications. Here are some key findings.

Banking trojan Mispadu expands from Latin America, now targets users in Italy, Poland & Sweden. Finance, automotive, legal & commercial entities at ri

WordPress sites using LayerSlider versions 7.9.11 - 7.10.0 are vulnerable to attack. Hackers could steal sensitive data like passwords.

Introduction Amazon Elastic Container Service (Amazon ECS) has now enhanced its functionalities by integrating support for Amazon Elastic Block Store (Amazon EBS) volume attachment to Amazon ECS tasks. This feature simplifies using Amazon ECS and AWS Fargate with Amazon EBS. Amazon ECS facilitates seamless provisioning and attachment of EBS volumes to ECS tasks on both […]

The goal is to make it easier for IT teams to declaratively create APIs and then manage them at scale.

Customers in industries such as architecture, engineering, & construction (AEC) and media & entertainment (M&E) generate the final frames for film, TV, games, industrial design visualizations, and other digital media with a process called rendering, which takes 2D/3D digital content data and computes an output, such as an image or video file. Rendering also requires […]

Git is optimized to work with large numbers of small files, like text files. This alone makes Git impractical for managing such datasets.

Best breakout sessions for cloud architects at Next '24

- GCP devops/sre blogs - April 02, 2024

If you're a cloud architect, don't miss these sessions networks, storage, distributed cloud and of course, AI at Google Cloud Next '24.

As more customers advance in their cloud adoption journey, they recognize that simply migrating applications to the cloud does not automatically ensure resilience. To ensure resilience, applications need to be designed to withstand disruptions from infrastructure, dependent services, misconfiguration and intermittent network connectivity issues. While many organizations understand the importance of building resilient applications, some […]

A provider publishes an API with an Open API spec, and developers connect to it. Unfortunately, onboarding seldom works out that simply.

Member post by ByteDance Since its open-source release in 2014, Kubernetes has rapidly become the de facto standard for container orchestration. The infrastructure team at ByteDance adopted Kubernetes…

The Emotional Weight of Privacy Breaches | CSA

- cloudsecurityalliance.org - April 02, 2024

Explore the deep impact of privacy breaches beyond data loss, including identity theft, financial risks, and the emotional toll of shame.

Spotify Plans Release of Microservices Component Framework

- thenewstack.io devops - April 02, 2024

Spotify's head of Backstage on how to keep developers happy, and its plan to open source its framework for managing components as a "fleet."

DoorDash connects consumers with their favorite local businesses in more than 25 countries across the globe. A born-in-the-cloud company, DoorDash hosts the majority of its infrastructure, including its commerce platform, on AWS. This platform powers the ecosystem of customers placing orders, merchants fulfilling orders, and dashers performing deliveries. DoorDash's platform was built to achieve the […]

With Tabnine, DevOps teams can switch LLMs with its generative AI platform in order to conform with coding needs and resource requirements.

Popular Linux compression tool XZ Utils found with backdoor. Threat actors can remotely execute code on your machine, bypassing authentication.

How We Can Help Corporate Boards with Cybersecurity | CSA

- cloudsecurityalliance.org - April 02, 2024

Most executives lack deep security backgrounds. Although cybersecurity is a business issue, it's also highly technical and complicated.

Notorious threat group Earth Freybug uses new malware UNAPIMON to evade detection. This China-linked group is known for espionage and financial attack

Harnessing the Power of CTEM for Cloud Security

- thehackernews.com - April 02, 2024

Tired of chasing endless vulnerabilities? Enter Continuous Threat Exposure Management (CTEM). Prioritize critical exposures, streamline remediation, a

Evolving Cloud Security: Beyond Theoretical Threats | CSA

- cloudsecurityalliance.org - April 02, 2024

Exploring the shift from posture management to runtime threat detection in cloud security to counter real vulnerabilities and threats.

Kubecost 2.2 Covers Carbon Cost Monitoring (and More)

- thenewstack.io kubernetes - April 02, 2024

New features of Kubecost 2.2 can help IT teams reduce their carbon footprint and meet sustainability goals.

Google agrees to wipe billions of browsing records to settle class action lawsuit, alleging tracking without consent in Chrome's Incognito Mode.

The Ruby on Rails Resurgence - DevOps.com

- devops.com - April 02, 2024

Ruby on Rails created a framework for Ruby that provides foundational structures to enable faster development and speed to market.

TA558, the notorious threat actor, is back in action, hitting Spain, Mexico, U.S., and more with Venom RAT.

Last month, we announced the availability of two high-performing Mistral AI models, Mistral 7B and Mixtral 8x7B on Amazon Bedrock. Mistral 7B, as the first foundation model of Mistral, supports English text generation tasks with natural coding capabilities. Mixtral 8x7B is a popular, high-quality, sparse Mixture-of-Experts (MoE) model, that is ideal for text summarization, question […]

In this blog post, we will show you how to validate Terraform modules and how to automate the process using a Continuous Integration/Continuous Deployment (CI/CD) pipeline.

In the evolving landscape of network security, safeguarding data as it exits your virtual environment is as crucial as protecting incoming traffic. In a previous post, we highlighted the significance of ingress TLS inspection in enhancing security within Amazon Web Services (AWS) environments. Building on that foundation, I focus on egress TLS inspection in this […]

Serverless ICYMI Q1 2024 | Amazon Web Services

- AWS compute blogs - April 01, 2024

Welcome to the 25th edition of the AWS Serverless ICYMI (in case you missed it) quarterly recap. Every quarter, we share all the most recent product launches, feature enhancements, blog posts, webinars, live streams, and other interesting things that you might have missed! In case you missed our last ICYMI, check out what happened last […]

Introduction We are excited to announce general availability of Amazon Linux 2023 (AL2023) on Amazon Elastic Kubernetes Service (Amazon EKS). AL2023 is the next generation of Amazon Linux from Amazon Web Services (AWS) and is designed to provide a secure, stable, high-performance environment to develop and run your cloud applications. The standard AL2023-based EKS-optimized Amazon […]

Today is April Fool's Day. About 10 years ago, some tech companies would joke about an idea that was thought to be fun and unfeasible on April 1st, to the delight of readers. Jeff Barr has also posted seemingly far-fetched ideas on this blog in the past, and some of these have surprisingly come true! […]

Enhancing Business Security and Compliance with Service Mesh

- thenewstack.io service-mesh - April 01, 2024

Learn how the Service Mesh helps businesses to achieve compliance seamlessly while ensuring data security, better user access management and improved observability.

The ability of businesses to innovate is constantly reshaped by disruptive events and technological advancements. Recent global events, such as the pandemic and the rapid emergence of artificial intelligence (AI), have compelled companies across various industries to reevaluate and make crucial strategic pivots. One such move has been the embrace of cloud computing. It's a […]

With support for tags in the Backup and DR service, managing backups helps automate the protection of Compute Engine VMs.

15 must-attend security sessions at Next '24

- GCP security blogs - April 01, 2024

Google Cloud Next will feature a robust security track this year. Here's 15 security-focused sessions you don't want to miss.

Continually reviewing your organization's incident response capabilities can be challenging without a mechanism to create security findings with actual Amazon Web Services (AWS) resources within your AWS estate. As prescribed within the AWS Security Incident Response whitepaper, it's important to periodically review your incident response capabilities to make sure your security team is continually maturing […]

Project post by Namkyu Park, Maintainer of LitmusChaos (LinkedIn | GitHub) This blog post provides step-by-step instructions for injecting chaos using LitmusChaos and managing it with Backstage.

Looking for a great new DevOps job? Check out these available opportunities at Visa, AWS and more!

Indian govt rescues 250 citizens trapped in Cambodia cyber scam rings. Victims were lured with fake jobs, then forced into illegal activities.

Fifteen years ago, Amazon CloudFront launched with 14 edge locations scattered around the world. Since then, it's been exciting to see how quickly we've grown to now having over 600 CloudFront Points of Presence (POPs) in more than 100 cities and 50 countries worldwide. We have continued to build and innovate, finding new ways to […]

Draft White Paper on AI Organizational Responsibility | CSA

- cloudsecurityalliance.org - April 01, 2024

CSA's draft white paper on organizational security responsibilities for AI offers actionable guidance for AI data security and vulnerability management.

Tech has a skills issue – and it's one that's not going away in 2024. Live team coaching can be an important part of the solution.

Traditional defense tactics don't always apply to cyber warfare. With EventSentry, bolster your network's defense with prevention, detection, and ongo

Android VPN apps hijacking devices, covertly turning them into proxy nodes for threat actors and fueling botnet operations.

Vultur Android banking trojan is back, stronger than ever. It steals sensitive data and remotely controls your phone.

DEVOPS WEEKLY ISSUE #691 - 31st March 2024

- devopsweeklyarchive.com - March 31, 2024

eBPF, OIDC, A 20 year journey to fixing profiling, a platform maturity model and a range of other topics this week.

SRE Weekly Issue #418 – SRE WEEKLY

- sreweekly.com - March 31, 2024

The observability waters have been muddy for awhile, and this article does a great job of taking a step back and building a definition — and a roadmap.

Essential Identity and Access Management (IAM) Terms | CSA

- cloudsecurityalliance.org - March 30, 2024

Review the definitions of 10 IAM terms, including authentication, authorization, Privileged Access Management, and Role Based Access Control.

Linux: Migrate the Home Directory to Another Drive

- thenewstack.io operations - March 30, 2024

Home is where the heart is. Or, if you're running Linux, it's where you mount the home directory. Here's how.

Malicious ads and fake websites are spreading dangerous malware that can steal your passwords, cryptocurrency, and other sensitive data.

This post goes over some practices for PKI implementation for an organization, such as AWS Private CA, Step CA with ACME, and Cert Manager

Secret backdoor found in XZ Utils compression library used by major Linux distros, like Fedora, Kali Linux, and openSUSE.

AWS Config enables businesses to assess, audit, and evaluate the configurations of their AWS resources by leveraging AWS Config rules that represent your ideal configuration settings. For example a Security Group that allows ingress on port 22 should be marked as noncompliant. AWS Config provides predefined rules called managed rules to help you quickly get […]

Amazon GuardDuty is a machine learning (ML)-based security monitoring and intelligent threat detection service that analyzes and processes various AWS data sources, continuously monitors your AWS accounts and workloads for malicious activity, and delivers detailed security findings for visibility and remediation. I love the feature of GuardDuty Runtime Monitoring that analyzes operating system (OS)-level, network, […]

Infrastructure as Code Is Dead: Long Live Infrastructure from Code

- thenewstack.io operations - March 29, 2024

Managing, maintaining and deploying applications and infrastructure securely and consistently remains an incredibly complicated challenge.

KubeCon Europe: WebAssembly, eBPF Are Huge for Cloud Native

- thenewstack.io kubernetes - March 29, 2024

WebAssembly (Wasm) and eBPF are increasingly integrated in the under-the-hood workings of cloud native infrastructure.

Project post originally published on Kyverno's blog by Mariam Fahmy In the previous blog post, we discussed writing Common Expression Language (CEL) expressions in Kyverno policies for resource…

Security flaws found in Dormakaba's Saflok RFID locks used in hotels could turn your keycard into a master key.

Cloud Security: Beyond Traditional Pentesting | CSA

- cloudsecurityalliance.org - March 29, 2024

Discover why traditional pentesting falls short in the cloud, and the importance of ACE principles in cloud security management.

A Tricentis survey found organizations could see massive costs savings by fully automating mobile application testing.

DevOps has a strong attachment to the IT operations of building and deploying software rather than to the design and coding phases.

AI in Cybersecurity & Compliance | CSA

- cloudsecurityalliance.org - March 29, 2024

Explore how AI's rise affects cybersecurity and compliance, addressing challenges and regulatory developments for future readiness.

The rise of low-code/no-code platforms in DevOps is reshaping the way software is developed and deployed throughout the life cycle.

TheMoon botnet, previously thought to be inactive, is back. Over 40,000 routers & IoT devices hijacked to power Faceless - a criminal proxy service.

A new Linux vulnerability puts user passwords at risk. It exploits the "wall" command to potentially leak passwords on Ubuntu & Debian systems.

Traditional pen testing: costly & infrequent. But with automation and AI, businesses can now affordably assess network security regularly.

Security Compliance for Cloud Services | CSA

- cloudsecurityalliance.org - March 29, 2024

Organizations using cloud services can comply with information security requirements by implementing the following controls.

Chainguard: Outdated Containers Accumulate Vulnerabilities

- thenewstack.io containers - March 29, 2024

Bad news for those who don't upgrade: Hackers keep finding vulnerabilities in software even after the application is no longer supported, Chainguard has found.

PyPI temporarily shut down new user sign-ups and project creation to combat a malicious malware upload campaign.

Large Language Model Observability: The Breakdown

- thenewstack.io observability - March 28, 2024

The LLM stack brings a different set of metrics than your team usually tracks. In this Makers episode, co-host Janakiram MSV identifies the new "golden signals."

Kubernetes and AI: Are They a Fit?

- thenewstack.io kubernetes - March 28, 2024

At KubeCon Europe, we heard a lot about the current and future relationship of AI and Kubernetes, the orchestrator originally built to be stateless.

Deploying and managing infrastructure with all the dependencies is a challenging task. Complexity easily multiplies when you add multiple environments to the equation. Manual infrastructure management leads to valuable time spent deploying the infrastructure rather than adding business value. This is assuming that the deployment is successful without any errors in the first attempt. Infrastructure-as-Code […]

Developers have been using HTTP methods such as GET, POST, and DELETE for a significant period of time to interact with RESTful APIs. The widespread adoption of these methods is largely due to their user-friendliness. Users who are transitioning from on-premises NetApp storage to Amazon FSx for NetApp ONTAP can streamline their operations using its […]

In today's fast-paced digital landscape, the efficient management and accessibility of data stand as pivotal challenge for businesses. For a global team to efficiently collaborate on a project, they require a shared file storage that supports multiple protocols, robust data management features, and dependable data integrity. When deploying infrastructure repeatedly or in different environments, it […]

In the rapidly evolving digital era, effective data management and accessibility pose significant challenges for businesses. To foster seamless collaboration among global teams working on a project, there is a need for a shared file storage solution that accommodates various protocols, offers robust data management capabilities, and makes sure of reliable data integrity. When deploying […]

Linux users, beware. A nasty piece of malware named DinodasRAT is on the loose, targeting China, Taiwan, Turkey, and Uzbekistan.

Finland's Parliament was hacked! Police officially blame China's notorious APT31 cyber espionage group.

Platform Engineering Is Not Just about the Tools

- thenewstack.io devops - March 28, 2024

Platform engineering isn't solely about the tools and components but also about alignment within the organization and a special focus on understanding user needs.

Networking session preview at Next '24

- GCP networking blogs - March 28, 2024

If you're a network engineer or network security professional, check out these network and network security design sessions at Google Cloud Next '24.

In this newsletter, guest columnist Brian Roddy, vice president of security product management, gives you a preview of our Next conference.

Member post originally published on Netris's blog Public clouds have basically become identical. Most companies are paying way more for cloud infrastructure than they should. In a nutshell…

Beware of Darcula, a Phishing-as-a-Service platform targeting 100+ countries with over 20,000 fake domains.

How Explainable AI (XAI) is Building Confidence | CSA

- cloudsecurityalliance.org - March 28, 2024

Explainable AI (XAI) is dedicated to developing techniques that help us understand the reasoning behind an AI's output. Here are some examples.

KubeCon24: Mirantis Doubles Down on Open Source

- thenewstack.io kubernetes - March 28, 2024

Mirantis Container Cloud (MCC) will be retired as the company refocuses its support on large enterprise customers.

If you want to interact with Google Cloud through gcloud CLI or through code, you need to setup

Over 12,000 people joined us in Paris for KubeCon + CloudNativeCon Europe 2024 and while we talked about everything from artificial intelligence to sustainable computing, the biggest takeaway was the…

oin us for an exclusive webinar with experts from F5 DevCentral, OPSWAT, and THN. Dive deep into the current security landscape, compliance, threat de

How to Secure Business-Critical Applications | CSA

- cloudsecurityalliance.org - March 28, 2024

Learn the steps to protect your custom-developed business-critical applications. Prevent your sensitive data from getting into the wrong hands.

Fermyon Says WebAssembly on Kubernetes Is Now Doable

- thenewstack.io kubernetes - March 28, 2024

Fermyon offers Kubernetes support to its Spin tool with the release of open source SpinKube and Fermyon Platform for Kubernetes.

By investing in open source frameworks and LGTM tools, SRE teams can effectively monitor their apps and gain insights into system behavior.

Community post by Seven Cheng | View part one here In the previous article, I gave an overview of Wasm's features and advantages. I also explained how to run Wasm modules within container environments.

To Devin or Not to Devin? - DevOps.com

- devops.com - March 28, 2024

Cognition Labs' Devin is creating a lot of buzz in the industry, but John Willis urges organizations to proceed with caution.

Researchers at ETH Zurich have cracked AMD Zen 2 & Zen 3 defenses against RowHammer attacks, naming their technique "ZenHammer".

he rush to release features often leads to shortcuts in security, exposing vulnerabilities through practices like hard-coding secrets.

Explore the urgent need for enhanced security visibility across hybrid cloud operations to mitigate vulnerabilities and streamline remediation.

Telegram's new Peer-to-Peer Login (P2PL) feature offers free premium membership but in exchange for using your phone number as a relay to send OTPs.

Analyze the traffic patterns on any public-facing website or web app, and you'll notice connection requests from all over the world. Apart from the intended traffic, a typical web application responds to requests from bots, health checks, and various attempts to circumvent security and gain unauthorized access. In addition to impacting your customer's experience, these […]

Thread Hijacking: Phishes That Prey on Your Curiosity

- krebsonsecurity.com - March 28, 2024

Thread hijacking attacks. They happen when someone you know has their email account compromised, and you are suddenly dropped into an existing conversation between the sender and someone else. These missives draw on the recipient's natural curiosity about being copied…

As the Chief Information Security Officer (CISO) at AWS, I'm personally committed to helping security teams of all skill levels and sizes navigate security for generative artificial intelligence (AI). As a former AWS customer, I know the value of hands-on security learning and talking in-person to the people who build and run AWS security. That's […]

Protecting against accidental or malicious deletion is a key element of data protection. Immutability protects data in-place, preventing unintended changes or deletions. However, sometimes it isn't clear for how long data should be made immutable. Users in this situation are looking for a solution that maintains short-term immutability, indefinitely. They want to make sure their […]

Many organizations are at risk of losing important business data due to disasters like fires, floods or cyber-attacks. Without proper backup and disaster recovery strategies, critical data could be lost forever in these scenarios. This could lead to costly downtime for businesses and damage to their reputation. Restoring normal operations after data loss takes time […]

While most app developers work for organizations that have platform teams, there isn't much consistency regarding where that team reports.

Generative artificial intelligence (AI) has captured the imagination of organizations and individuals around the world, and many have already adopted it to help improve workforce productivity, transform customer experiences, and more. When you use a generative AI-based service, you should understand how the information that you enter into the application is stored, processed, shared, and […]

Day Two DevOps is a phase in the SDLC that focuses on enhancing, optimizing and continuously improving the software development and deployment processes

Implementing authentication and authorization mechanisms in modern applications can be challenging, especially when dealing with various client types and use cases. As developers, we often struggle to choose the right authentication flow to balance security, user experience, and application requirements. This is where understanding the OAuth 2.0 grant types comes into play. Whether you're building […]

In part five of this series, hosts Alan Shimel and Mitch Ashley are joined by Bryan Cole (Tricentis), Ixchel Ruiz (Karakun AG) and Jeff Keyes (Planview)

A global survey suggests organizations are not making a lot of progress in their ability to truly observe application environments.

Indian government & energy sectors under attack. Hackers used phishing emails, weaponized 'HackBrowserData' malware to steal sensitive data.

Member post originally published on Ozone's blog by Amina Reshma Crack the Code: Ever wondered about developer experience, a.k .a. DevEx? Well, it's the whole shebang – the vibe, the tools…

Cloud Workload Protection (CWP) & Risk Management | CSA

- cloudsecurityalliance.org - March 27, 2024

Prioritizing the potential impact of a workload vulnerability starts with robust cloud workload protection and risk analysis.

Introduction The integration of Generative AI into cloud governance transforms AWS account management into a more automated and efficient process. Leveraging the generative AI capabilities of Amazon Bedrock alongside tools such as AWS Control Tower and Account Factory for Terraform (AFT), organizations can now expedite the AWS account setup and management process, aligning with best […]

CISA flags critical Microsoft SharePoint Server vulnerability under active attack. Patch immediately to protect your systems.

A now-patched vulnerability in Microsoft Edge could have allowed attackers to covertly install browser extensions without user consent.

The 2023 State of SaaS Security Report | CSA

- cloudsecurityalliance.org - March 27, 2024

This year's Valence Security report shows how cybercriminals are responding to the 'saasification' of the digital office.

So after 16 years, Stack Overflow Q&A is trying something brand new — another way to solicit helpful information outside of the site's long-standing question-and-answer format.

Backstage is a tremendously successful project that promotes a vision of how internal developer portals can alleviate the pain of sprawl.

Infrastructure is expanding in almost every possible way, and this creates more of a burden on every aspect of IT, specifically DevOps.

Despite SASE's strengths, it falls short against threats like phishing and malicious extensions. Learn why secure browser extensions are crucial for c

Researchers uncover active exploitation of a critical flaw in Anyscale Ray, a popular AI platform.

Everything You Need to Know About the EU AI Act | CSA

- cloudsecurityalliance.org - March 27, 2024

Learn about the EU AI Act, the first comprehensive artificial intelligence legislation, its impact today, and what it means for the future.

New phishing campaign uncovered by Trustwave SpiderLabs uses novel malware to deploy Agent Tesla, a notorious information stealer and keylogger.

Latest Cybersecurity reports unveil two China-linked APT groups targeting ASEAN nations in cyberespionage campaign over the past 3 months.

Organizations often need to store and serve various types of static content, such as data sets, archives, and file repositories, on the web. This content is typically accessed by end-users for research and analysis purposes or general content distribution. However, presenting this content in a user-friendly and easily browsable manner can be a significant challenge, […]

As we've innovated and expanded the Amazon Web Services (AWS) Cloud, we continue to prioritize making sure customers are in control and able to meet regulatory requirements anywhere they operate. With the AWS Digital Sovereignty Pledge, which is our commitment to offering all AWS customers the most advanced set of sovereignty controls and features available […]

The latest release of Java should make it easier for DevOps teams that build and deploy applications to innovate faster.

Suspicious NuGet package 'SqzrFramework480' discovered, potentially targeting devs using Chinese industrial tech. Package may be linked to industrial

Recent 'MFA Bombing' Attacks Targeting Apple Users

- krebsonsecurity.com - March 26, 2024

Several Apple customers recently reported being targeted in elaborate phishing attacks that involve what appears to be a bug in Apple's password reset feature. In this scenario, a target's Apple devices are forced to display dozens of system-level prompts that…

'Observability' Is Not Observability When It Comes to Business KPIs

- thenewstack.io observability - March 26, 2024

Observability is about enabling every single engineer to proactively prioritize work efforts based on the analysis of data from all their systems and apps.

Implementing user authentication and authorization for custom applications requires significant effort. For authentication, customers often use an external identity provider (IdP) such as Amazon Cognito. Yet, authorization logic is typically implemented in code. This code can be prone to errors, especially as permissions models become complex, and presents significant challenges when auditing permissions and deciding […]

On January 24, we announced the availability of the AWS Well-Architected Migration Lens whitepaper. The Migration Lens extends the Well-Architected Framework to include best practices and implementation guidance you apply to your migration program across the three migration phases: Assess, Mobilize, and Migrate. The AWS Well-Architected Framework comprises design principles, and best practices across six […]

With an increasing focus on managing open-source software supply chain risk, both Citi and Google strive to apply more rigor across risk mitigation. Here's what we've learned.

Discover sensitive data and manage risks with Sensitive Data Protection for Cloud SQL. Here's what's new.

Breakout sessions for IT pros at Next '24

- GCP compute blogs - March 26, 2024

A selection of breakout sessions at Google Cloud Next '24 targeted at IT professionals.

AI in SaaS: Privacy & Security Challenges Unveiled | CSA

- cloudsecurityalliance.org - March 26, 2024

Uncover the impact of Shadow AI on data privacy and intellectual property in SaaS applications, and explore solutions for mitigating related security risks.

KCD post by the KCD Italy Team The Kubernetes Community Days (KCD) Italy, a vibrant event supported by the CNCF, is back with a fresh twist. In 2024, the CNCF and the Linux Foundation required an…

This post is written by Robert Northard – AWS Container Specialist Solutions Architect, and Carlos Manzanedo Rueda – AWS WW SA Leader for Efficient Compute Karpenter is an open source node lifecycle management project built for Kubernetes. In this post, you will learn how to use the new Spot-to-Spot consolidation functionality released in Karpenter v0.34.0, […]

Powerful Cloud Permissions You Should Know | CSA

- cloudsecurityalliance.org - March 26, 2024

Uncover the pivotal role of cloud permissions within the MITRE ATT&CK Framework's Initial Access stage and strategies for mitigating related security risks.

Minecraft faces a growing threat from DDoS attacks, impacting over 500 million registered users. Learn how these attacks disrupt gameplay and what you

U.S. Department of Justice has unveiled indictments against seven Chinese nationals linked to the hacking group APT31.

A properly designed replication architecture can significantly impact the accessibility of your data and prevent management complications.

While 95% of developers and business leaders are familiar with cloud development environments (CDEs), the reasons for adoption vary.

Salesforce Data Security Challenges from a Recent Breach | CSA

- cloudsecurityalliance.org - March 26, 2024

Explore actionable security measures for Salesforce in light of a recent data exposure incident, emphasizing the prevention of vulnerabilities and misconfigurations.

US Treasury cracks down on cryptocurrency exchanges aiding Russia's sanctions evasion. Bitpapa, Crypto Explorer, and others sanctioned for facilitatin

CISA adds 3 security flaws to its Known Exploited Vulnerabilities catalog, citing active exploitation evidence

The problem with invariants is that they change over time

- surfingcomplexity.blog - March 26, 2024

Cliff L. Biffle blogged a great write-up of a debugging odyssey at Oxide with the title Who killed the network switch? Here's the bit that jumped out at me: At the time that code was written…

Industries like automotive, robotics, and finance are increasingly implementing computational workloads like simulations, machine learning (ML) model training, and big data analytics to improve their products. For example, automakers rely on simulations to test autonomous driving features, robotics companies train ML algorithms to enhance robot perception capabilities, and financial firms run in-depth analyses to better […]

Cloud Data Migration or Cloud Data Tiering?

- thenewstack.io storage - March 25, 2024

With so many storage tiers now available, it's vital to understand the differences between unstructured data migration and data tiering.

Azure Virtual Network Manager ensures that some critical security policies are enforced across your organization. Learn more.

AWS Summit season is starting! I'm happy I will meet our customers, partners, and the press next week at the AWS Summit Paris and the week after at the AWS Summit Amsterdam. I'll show you how mobile application developers can use generative artificial intelligence (AI) to boost their productivity. Be sure to stop by and […]

Member post by Fredric Newberg, CTO and Co-Founder of Embrace If you have a business-critical mobile app, you might be surprised to learn that your observability solution is dropping a large…

Unveiling CTI's Role in Mitigating Dark Web Risks | CSA

- cloudsecurityalliance.org - March 25, 2024

The dark web acts as a breeding ground for cyber threats. Cyber Threat Intelligence (CTI) provides strategic defenses against these hidden dangers.

What's the Scope Period for My SOC 2 Type 2 Report? | CSA

- cloudsecurityalliance.org - March 25, 2024

There are no requirements for the length of SOC 2 period you select. It's based on your specific situation, but is typically three to twelve months.

Organizations need a scalable security orchestration framework that eliminates friction in DevSecOps workflows.

Russian state-backed hackers infiltrated Microsoft using a simple password spray attack. This breach highlights a major security lesson...

Sophisticated attack targets Discord bot site Top.gg + devs. Attackers stole browser cookies, pushed malicious code, and created fake Python packages.

Looking for a great new DevOps job? Check out these available opportunities at Nintendo, Hallmark and more!

What's Broken with Identity Management? | CSA

- cloudsecurityalliance.org - March 25, 2024

The exponential growth of non-human identities has completely changed the identity access management landscape.

How TV 2 Prioritizes and Measures Developer Experience

- thenewstack.io devops - March 25, 2024

Read how Denmark's biggest media tech company has evolved from a focus on DevOps to one on improving and measuring developer experience.

Researchers uncover "GoFetch" vulnerability in Apple M-series chips, potentially allowing attackers to extract secret cryptographic keys.

Iran-linked hackers, MuddyWater, launch new phishing attacks against Israeli organizations.

DEVOPS WEEKLY ISSUE #690 - 24th March 2024

- devopsweeklyarchive.com - March 24, 2024

Unreliable platform engineering, scaling databases, configuration management, software supply chain security and more this week. A good mix of interesting topics I think.

German authorities shut down Nemesis Market, an underground marketplace for drugs, stolen data, and cybercrime services.

Kimsuky shifts tactics, now using CHM files to deliver malware, targeting sensitive data globally.

SRE Weekly Issue #417 – SRE WEEKLY

- sreweekly.com - March 24, 2024

Remember that cool lava lamp random number generator that Cloudflare uses? Now they have a couple of other sources of entropy, and they're teaming up with other companies.

STAR Level 2: CSA STAR Attestations & Certifications | CSA

- cloudsecurityalliance.org - March 23, 2024

Dive into the intricacies of CSA STAR Level 2, which includes both STAR Attestation (for SOC 2) and STAR Certification (for ISO/IEC 27001).

Linux: Run a Single Command across Multiple Servers with SSH

- thenewstack.io operations - March 23, 2024

You don't always need third-party software to control multiple Linux servers — not when a bit of scripting magic can get the job done.

Anti-Agile Project Tracker Linear the Latest to Take on Jira

- thenewstack.io devops - March 23, 2024

We look at Linear, a new project management tool that is certainly opinionated — about not adhering to the agile software philosophy.

US Tech Cannot Comprehend the Digital Nomad Way of Life

- thenewstack.io operations - March 23, 2024

Around 66 countries have agreed on what the term 'remote working' means, but some U.S. tech companies have decided otherwise.

ybersecurity firm Mandiant links recent cyber attacks on diplomatic entities to Midnight Blizzard, a group with ties to Russia's SVR.

The nonprofit organization that supports the Firefox web browser said today it is winding down its new partnership with Onerep, an identity protection service recently bundled with Firefox that offers to remove users from hundreds of people-search sites. The move…

It's the last day, and so much has already happened! We've shown how amazing things can be created when we come together as a community. Here's a look at the highlights from day 4 of KubeCon +…

Architecting secure data transfer workloads is critical for today's businesses. Customers need to be sure that each end user can only access the minimally appropriate set of files and folders once authenticated to AWS Transfer Family. There are multiple Identity and Access Management (IAM) roles necessary when designing these authentication and access controls, and customers […]

The Future of AI: Hybrid Edge Deployments Are Indispensable

- thenewstack.io edge-computing - March 22, 2024

By distributing tasks between the edge and the cloud, we can optimize AI applications for speed, efficiency, security and privacy.

Introducing Cloud Run volume mounts

- GCP storage blogs - March 22, 2024

Cloud Run volume mounts lets you mount a Cloud Storage bucket or NFS share to your Cloud Run service or job.

GKE gets new quota monitoring feature

- GCP containers blogs - March 22, 2024

You can now monitor and set alerts for scaling limits on your Google Kubernetes Engine environment.

Stanford team uses DevOps tools to manage research data

- GCP containers blogs - March 22, 2024

How Stanford researchers use Google Cloud data storage, computing and analytics to manage scientific data following DevOps principles.

HPC VM image makes it easy to build an HPC-ready VM instance for MPI workloads, and is now available with Rocky Linux 8 and CentOS 7 VMs.

When you migrate your Windows environment to Amazon Web Services (AWS), you might need to address certificate management for computers and users in your Active Directory domain. Today, Windows administrators commonly use Active Directory Certificate Services (AD CS) to support this task. In this post, we will show you how to migrate AD CS to […]

How Attackers Exploit Non-Human Identities | CSA

- cloudsecurityalliance.org - March 22, 2024

Uncover the critical security risks of non-human identities in cloud environments through a detailed analysis of supply chain attack techniques and strategies for robust defense.

Researchers at Palo Alto Networks Unit 42 uncover a new wave of phishing attacks delivering StrelaStealer malware, impacting over 100 organizations in

A now-patched vulnerability in AWS Managed Workflows for Apache Airflow (MWAA) could have allowed attackers to hijack sessions & execute code remotely

OpenTelemetry maintainers added profiling capabilities so DevOps teams can identify the root cause of issues down to a specific line of code.

Self-Managed FedRAMP Red Team Exercises | CSA

- cloudsecurityalliance.org - March 22, 2024

Learn how to navigate FedRAMP Rev 5's new red team requirement with our guide on performing compliant internal exercises, ensuring your cloud services meet stringent security standards.

This blog post details how to run chaos experiments for serverless applications built using Lambda. The described approach uses Lambda extension to inject faults into the execution environment. This allows you to use the same method regardless of runtime or configuration of the Lambda function.

Any comprehensive approach to observability needs to include an analysis of the network services upon which organizations depend.

Over 39,000 WordPress sites have fallen victim to the Sign1 malware campaign in just 6 months, redirecting unsuspecting users to scam sites through ma

China-linked threat group aggressively exploits software flaws in Connectwise ScreenConnect & F5 BIG-IP.

Edge computing will drive a long-overdue convergence of DevOps, data engineering, security, networking, OT and MLOps best practices.

Implementing Zero Trust Controls for Compliance

- thehackernews.com - March 22, 2024

Introducing the ThreatLocker® Zero Trust Endpoint Protection Platform: Elevate your organization's cyber defense with policy-based controls.

What Is Architecture Drift & How It Causes Breaches | CSA

- cloudsecurityalliance.org - March 22, 2024

Explore the concept of architecture drift: what it is, why it matters, and how application security posture management (ASPM) can help.

As we gear up to celebrate the remarkable 10-year journey of Kubernetes, we are thrilled to announce an exciting opportunity for the creative minds in our vibrant community. It's time to capture the…

Announcing the Kubestronaut program

- cncf.io - March 22, 2024

CNCF is excited to announce the launch of the new Kubestronaut program. A Kubestronaut is someone who has passed all five of CNCF's Kubernetes-related certifications: Certified Kubernetes…

U.S. Department of Justice and 16 state AGs have filed a lawsuit against Apple, accusing it of maintaining an illegal smartphone monopoly.

AcidPour malware targets four telecom providers in Ukraine, linked to AcidRain and Russian military intelligence operations.

Securing Ray to run on Google Kubernetes Engine

- GCP containers blogs - March 22, 2024

Running Ray on GKE takes advantage of existing global Google infrastructure components like Identity-Aware Proxy (IAP), for a more secure deployment.

Starting today, administrators of package repositories can manage the configuration of multiple packages in one single place with the new AWS CodeArtifact package group configuration capability. A package group allows you to define how packages are updated by internal developers or from upstream repositories. You can now allow or block internal developers to publish packages […]

It's a time of more: more data, more workloads, and more powerful technologies. So it's critical to ask ourselves how cloud native can help improve our environmental footprint. Here's what we heard at…

AWS recently announced support for mutually authenticating clients that present X509 certificates to Application Load Balancer (ALB). In this post, we discuss options for implementing this new feature, and things to consider while implementing. ALB operates at the application layer (layer 7 in the OSI model) and load balances incoming HTTP/HTTPS requests to backend targets. […]

In 2022, we launched AWS CloudTrail Lake, an immutable managed data lake designed to simplify audit, security, and compliance investigations by capturing, storing, and analyze AWS user and API activities. By providing immutable storage for your activity logs, CloudTrail Lake protects the integrity of your audit data by providing read-only access. CloudTrail Lake integrates seamlessly […]

CDE technology is driving the fastest DevOps transformation trend today with the entire cloud native development industry moving development environments online.

KubeCon24: Red Hat OpenShift 4.15 Accelerates App Delivery

- thenewstack.io operations - March 21, 2024

Grounded in Kubernetes 1.28 and CRI-O 1.28, OpenShift is Red Hat's platform for hybrid cloud and edge application development.

Russian threat group Turla strikes again! NGO in Europe hit with TinyTurla-NG backdoor.

Learn how to migrate your Windows Server to Azure with these expert resources—and maximize your business potential.

Now you can use NetApp's high-performance storage with your Google Cloud VMware Engine deployment.

New report reveals 800+ packages in the npm registry contain hidden code discrepancies.

CSA Community Spotlight: Risk Manager Heinrich Smit | CSA

- cloudsecurityalliance.org - March 21, 2024

Heinrich Smit has worked with CSA extensively over the years, collaborating with other experts on Zero Trust training and research.

Learn how Red Hat Enterprise Linux on Azure maximizes return on investment

Researchers uncover AndroxGh0st, a tool targeting Laravel apps to steal sensitive data from .env files, affecting AWS & Twilio accounts.

Prepare Your Board of Directors for New SEC Rules | CSA

- cloudsecurityalliance.org - March 21, 2024

The SEC's Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure rule is much harder to understand than people anticipate.

With the explosion of SaaS applications in the modern workplace, IT and security teams often struggle to keep up with vendor risk assessments.

DevSecOps requires teams to collaborate and enable the organization to deliver safer applications to customers without compromising security.

Generative AI can help address the challenges of unifying diverse testing needs into a single continuous testing platform.

Powered by GitHub Copilot and CodeQL, the new autofix feature covers 90% of alert types in JavaScript, TypeScript, Java, and Python.

CISOs, Sewers, and Unsolvable Problems | CSA

- cloudsecurityalliance.org - March 21, 2024

Discover how CISOs and sewer engineers tackle complex system challenges using innovative cloud solutions like SASE for improved security and efficiency.

Breaking down OT cyber-attacks: Not all are complex! A new report delves into the types, historical trends, and what the future may hold for operation

U.S. Treasury announces sanctions against two Russian nationals & their companies for running cyber influence ops.

Atlassian has issued patches for over 25 security issues, including a critical SQL injection bug (CVE-2024-1597) in Bamboo Data Center & Server.

Ivanti announces critical RCE flaw in Standalone Sentry (CVE-2023-41724) with a high-risk CVSS score of 9.6.

Have your applications hosted on AWS ever experienced inter-Region or inter-Availability Zone (AZ) latency and you wanted to be proactively notified on these latency changes? This blog post describes an automated mechanism to set up those alarms. AWS has introduced the ability to understand the performance of the AWS Global Network by introducing Infrastructure Performance, […]

KubeCon24: VictoriaMetrics' Simpler Alternative to Prometheus

- thenewstack.io observability - March 20, 2024

The open source team behind this observability software package take pride in its simplicity and easy scalability.

Video encoding and transcoding are critical workloads for media and entertainment companies. Delivering high-quality video content to viewers across devices and networks needs efficient and scalable encoding infrastructure. As video resolutions continue to increase to 4K and 8K, GPU acceleration is essential to real-time encoding workflows where parallel encoding tasks are necessary. Although encoding on […]

Amazon Payment Services (APS) is a payment service provider in the Middle East and North Africa. With its secure and seamless payment experience, it empowers businesses to build their online presence. Amazon Payment Services is based on a broad and complex microservice based architecture that are dependent on multiple AWS services, including Amazon Elastic Compute […]

We had an exciting and busy start to KubeCon + CloudNativeCon Europe 2024. Here's a look at some of the key moments of the day (and, spoiler alert: AI was the subject of a lot of conversation).

The Advent of Automated Observability

- thenewstack.io operations - March 20, 2024

AI may never be a cure-all for observability, but it can certainly be a valuable companion.

Learn how NetRise uses large language models and Google-managed Cloud SQL for efficient vulnerability detection and code origin tracing.

Google Cloud is releasing an updated and stronger set of security defaults that can be implemented with Organizational Policies.

Researchers uncover a new DoS attack vector targeting UDP-based application protocols, potentially endangering hundreds of thousands of hosts.

Cloud Security and Safeguarding Identities | CSA

- cloudsecurityalliance.org - March 20, 2024

Identity is the perimeter in the cloud. Identity security must be the foundation for a robust cloud security program.

SUSE Upgrades Its Rancher Kubernetes Management Family

- thenewstack.io platform-engineering - March 20, 2024

The new features are designed to empower platform engineering teams to offer developers self-service capabilities alongside bolstered support for AI workloads.

This post is co-written with Dr. Jens Kohl, Daniel Engelhardt, and Sascha Kallin from BMW Group. The BMW Group – headquartered in Munich, Germany – is a vehicle manufacturer with 149,000 employees worldwide and manufactures in over 30 production and assembly facilities across 15 countries. Today, the BMW Group (BMW) is the world's leading manufacturer […]

Threat Detection on Cloud-Native Attack Surfaces | CSA

- cloudsecurityalliance.org - March 20, 2024

Mastering cloud-native security: Essential insights on managing the expanded attack and detection surfaces in the public cloud, driving innovation safely.

Multiple threat actors exploit security flaws in JetBrains TeamCity to deploy ransomware, crypto miners, Cobalt Strike beacons, and Spark RAT

Generative AI is revolutionizing industries, but not without its challenges. A security breach could mean exposure of sensitive data.

Trellix is a global company redefining the future of cybersecurity. The company's open and native extended detection and response (XDR) platform helps organizations confronted with today's most advanced threats gain confidence in the protection and resilience of their operations. Trellix's security experts, along with an extensive partner ecosystem, accelerate technology innovation through machine learning (ML) […]

For the most part, the demand for new technology to solve age-old problems has been a net increase in workload.

Current Cybersecurity Trends | CSA

- cloudsecurityalliance.org - March 20, 2024

Empowering secure digital transformations: Uncover essential insights on mitigating Apache ActiveMQ vulnerabilities and combatting sophisticated cyber threats.

New threat: BunnyLoader 3.0 malware variant emerges with advanced modules for data theft, keylogging, and evasion tactics.

We are excited to announce that together with Linux Foundation Training and Certification, we now offer four additional courses to our community. Argo provides a robust framework for managing complex…

Ukraine Cyber Police have arrested 3 individuals linked to the hijacking of over 100 million email & Instagram accounts worldwide.

U.S. EPA creates Water Sector Cybersecurity Task Force to protect critical critical infrastructure against increasing cyberattacks.

Commerzbank explains how VPC Service Controls have helped them keep their sensitive data secure while using built-in Google Cloud storage and data processing capabilities.

The Not-so-True People-Search Network from China

- krebsonsecurity.com - March 20, 2024

It's not unusual for the data brokers behind people-search websites to use pseudonyms in their day-to-day lives (you would, too). Some of these personal data purveyors even try to reinvent their online identities in a bid to hide their conflicts…

KubeCon24: MinIO Object Store Equipped with Enterprise Features

- thenewstack.io observability - March 19, 2024

The new commercially-available MinIO Enterprise Object Store addresses the challenges of managing billions of objects in an exabyte scale namespace.

This is part 3 of a series of posts on securing generative AI. We recommend starting with the overview post Securing generative AI: An introduction to the Generative AI Security Scoping Matrix, which introduces the scoping matrix detailed in this post. This post discusses the considerations when implementing security controls to protect a generative AI […]

Building Polyglot Developer Experiences in 2024

- thenewstack.io ci-cd - March 19, 2024

How to use Dapr, Knative Serving, and Dagger to build custom (and polyglot) developer experiences optimized for specialized workflows.

Decoding DevSecOps: Striking the Right Balance

- thenewstack.io devops - March 19, 2024

By combining automation and cultural transformation, organizations can unlock the full potential of DevSecOps.

If you couldn't get to KubeCon + CloudNativeCon Europe 2024 this year, we've got you covered. Here are highlights from the first day, which included a number of exciting co-located events.

Shocking report from Imperva finds API-related security incidents cost global businesses around $75 billion annually. Cybercriminals are exploiting AP

Nvidia CEO Details a New AI Way of Developing Software

- thenewstack.io ci-cd - March 19, 2024

"We're going to invent a new way for you to receive and operate software," Nvidia CEO Jensen Huang proclaimed at this week's GTC.

The Microsoft Azure Container Networking team is excited to announce Retina, a cloud-native container networking observability platform. Learn more.

As the threat landscape evolves, you can use Google Cloud Armor to build a comprehensive DDoS mitigation strategy. Here's how.

Learn how KubeRay and Kueue can orchestrate Ray applications running on GKE using either priority or gang scheduling.

GKE can now automatically install NVIDIA GPU drivers

- GCP compute blogs - March 19, 2024

With automated installation of NVIDIA GPU drivers, it's easier than ever to add GPUs to AI workloads running on Google Kubernetes Engine (GKE).

To operate websites, mobile apps, or services accessible to public users in China, companies should complete internet content provider (ICP) recordal and host systems on local servers or approved cloud servers located in mainland China. Amazon Web Services (AWS) offers AWS China Regions, two Regions situated in China that allow customers to host websites and […]

Zero Trust: Win Friends and Improve Your Maturity | CSA

- cloudsecurityalliance.org - March 19, 2024

For security teams, actively involving the Line of Business in your Zero Trust initiative will make all the difference.

Public IPv4 addresses have been a scarce resource going all the way back to 2011, when the Internet Assigned Numbers Authority (IANA) distributed the last block of unallocated public IPv4 addresses. Alongside, the private IPv4 range carved out by RFC1918 has also been too small for large networks and deployments, like containers that consume a […]

TestifySec's Witness aims to provide a solution to a problem that's long plagued DevOps teams: Communication and documentation in workflows.

Generative AI can modify malware source code to bypass string-based detection, significantly lowering the rates at which they're caught, according to

This week at KubeCon + CloudNativeCon EU in Paris, we are announcing the release of Fluent Bit v3, which includes several new features as well as performance enhancements. The release adds support…

Email Security Best Practices for 2024 (and Beyond) | CSA

- cloudsecurityalliance.org - March 19, 2024

Discover key cybersecurity strategies for protecting your organization against emerging email threats in 2024.

A JFrog survey found that 60% of IT professionals typically spend four days or more remediating application vulnerabilities in a given month.

New SEC Cyber Disclosure Rules demand more transparency on cyber risk management. Is your company ready to comply and showcase its cybersecurity resil

Cybercriminals are now using digital document publishing sites like FlipSnack, Issuu, and Marq for phishing and credential theft.

AI Safety vs. AI Security: Navigating the Differences | CSA

- cloudsecurityalliance.org - March 19, 2024

Explore the distinction between AI security and AI safety. AI security safeguards systems, while AI safety considers human well-being and ethics.

New "AcidPour" malware unleashed, targeting Linux x86 systems. This dangerous variant of the notorious AcidRain wiper can destroy your data.

Cross-post from the Cloud Native Sustainability blog by Antonio di Turi, Imma Valls, Kristina Devochko, Leonard Pahlke, Niki Manoledaki, Ross Fairbanks Cloud computing has a significant environmental…

Project announcement by Istio Maintainers The upcoming 1.22 version of Istio brings the Layer 4 features of the sidecar-less service mesh architecture to production readiness Istio…

The AI Working Group is pleased to announce the AI Working Group's Cloud Native AI whitepaper, which presents a brief overview of the state-of-the-art AI/ML techniques, followed by what cloud native…

Project post by Prithvi Raj, Community Manager, LitmusChaos + Saranya Jena, Maintainer, LitmusChaos With the cloud native community increasingly adopting more services and deployments…

Announcing the OpenFeature Web SDK v1

- cncf.io - March 19, 2024

We are excited to announce the availability of the OpenFeature Web SDK v1. The Web SDK represents a culmination of years of research and industry consensus. It was built from the ground up to be…

Project announcement by OpenTelemetry maintainers In 2023, OpenTelemetry announced that it achieved stability for logs, metrics, and traces. While this was our initial goal at the formation of the…

As containers and cloud native artifacts become common deployment units, users want to make sure that they are authentic in their environments. Notary Project is a set of tools and specifications…

New phishing attacks target US organizations. Hackers use NetSupport RAT to steal data & control computers.

Moldovan national gets 3+ years in US prison for running E-Root Marketplace, a massive platform selling stolen login details.

Overview In this blog post, we describe how to use Amazon Athena with Amazon CloudWatch Internet Monitor's measurement information stored on Amazon S3. You can use Athena to analyze event logs, and then build a dashboard to visualize the measurement logs and gain insights by using Amazon QuickSight. Internet Monitor publishes measurements to CloudWatch Logs […]

In today's fast-paced digital world, users expect fast and reliable web experiences. Slow-loading pages, errors, and other performance issues can lead to lower engagement and conversion rates, ultimately hurting a business's bottom line. That's where Real User Monitoring (RUM) comes in. Real User Monitoring (RUM) is a crucial aspect of modern web application development, allowing developers and […]

GKE is a foundational platform to run AI / ML workloads. NVIDIA NeMo framework on GKE demonstrates ease of provisioning infrastructure, building and customizing generative AI models for your environment.

Docker and Chainguard Join Forces to Deliver Secure Containers

- thenewstack.io containers - March 18, 2024

Chainguard's secure Developer Images will now be available via Docker Hub as part of the Docker Verified Publisher program.

JetBrains introduces a new SaaS CI/CD tool called TeamCity Pipeline. It's available in public beta and features built-in optimizations.

New cyberattack campaign, DEEP#GOSU, uses PowerShell & VBScript to target Windows systems.

Storage, storage, storage! Last week, we celebrated 18 years of innovation on Amazon Simple Storage Service (Amazon S3) at AWS Pi Day 2024. Amazon S3 mascot Buckets joined the celebrations and had a ton of fun! The 4-hour live stream was packed with puns, pie recipes powered by PartyRock, demos, code, and discussions about generative […]

A conversation with Google Cloud Champion Innovator Rohan Singh on the future of infrastructure modernization.

The recognition of Google as a Leader in The Forrester Wave™: AI Infrastructure Solutions, Q1 2024 is a testament to our track record and vision.

Assured Workloads can help you ensure comprehensive data protection and regulatory compliance with folders that support your compliance requirements. Here's how.

The benefits of using GKE for running Ray AI workloads

- GCP containers blogs - March 18, 2024

Using GKE to run your Ray AI workloads can deliver scalability, cost-efficiency, fault tolerance, isolation, and portability benefits.

Cross-posted from the cert-manager blog In late 2023 the cert-manager project began a security audit, sponsored by the CNCF and carried out by the team at Ada Logics, as part of the ongoing effort for…

Member post originally published on Sparkfabrik's blog by SparkFabrik Team The European Union (EU) has recently demonstrated a proactive stance towards cybersecurity regulation…

How Pentesting Fits into AI's 'Secure By Design' | CSA

- cloudsecurityalliance.org - March 18, 2024

An effective, AI-aware security testing program can pick up on many potential risks and help teams patch vulnerabilities.

Learn how Microsoft Dev Box can help organizations "achieve massive improvements in developer productivity" according to the benchmark report by GigaOm.

Fortra patches critical flaw in FileCatalyst transfer tool. Vulnerability allows remote code execution via directory traversal.

Researchers uncover a sophisticated malware campaign using fake Google Sites pages and HTML smuggling to distribute AZORult, a notorious info stealer.

State of Cloud Security Report | Risk Prioritization | CSA

- cloudsecurityalliance.org - March 18, 2024

Orca Security has released the 2024 State of Cloud Security Report. Here's an overview of the main findings and statistics.

Looking for a great new DevOps job? Check out these available opportunities at the NHL, Hard Rock Digital, Zscaler and more!

ECC & Cyber Defense in Saudi Arabia | CSA

- cloudsecurityalliance.org - March 18, 2024

Saudi Arabia's ECC represents a pivotal advancement in national cybersecurity, setting a new standard for compliance and protection in the Middle East.

Over 10,300 sites at risk due to a vulnerability in miniOrange plugins allowing unauthenticated password changes and admin access.

IBM X-Force uncovers extensive phishing campaigns by APT28, targeting Europe, the South Caucasus, Central Asia, and the Americas.

DEVOPS WEEKLY ISSUE #689 - 17th March 2024

- devopsweeklyarchive.com - March 17, 2024

Gamedays as a technique for testing and improving performance and stability, pitfalls with measuring developer productivity, serverless databases, new code editors and more. A range of topics more than any theme this week.

The PGA TOUR is the world's premier membership organization for touring professional golfers, co-sanctioning tournaments on the PGA TOUR along with several other developmental, senior, and international tournament series. The PGA TOUR is passionate about bringing its fans closer to the players, tournaments, and courses. They developed a new mobile app and the PGATOUR.com website […]

SRE Weekly Issue #416 – SRE WEEKLY

- sreweekly.com - March 17, 2024

They cover incidents from GitLab, Tarsnap, Roblox, and Cloudflare with great summaries and takeaways.

Cognition Labs previewed Devin, which it describes as the world's first software engineer based on artificial intelligence (AI).

Researchers at G DATA have exposed a scheme dubbed "gitgub" on GitHub, where 17 repositories were delivering the information stealer, RisePro.

Back up Your Linux Server with Borgmatic

- thenewstack.io storage - March 16, 2024

We walk you through the installation and setup of Borgmatic, so your servers will be backed up when disaster strikes.

When there's no gemba to go to

- surfingcomplexity.blog - March 16, 2024

I'm finally trying to read through some Toyota-related books to get a better understanding of the lean movement. Not too long ago, I read Sheigo Shingo's Non-Stock Production: The Shing…

If you've spent time migrating non-AWS Terraform templates to the Amazon Web Services (AWS) Cloud, you know it can be a time-consuming, manual process with ample room for error. Most organizations would rather allocate engineering resources toward higher-value, more impactful initiatives such as cloud modernization. With all the latest rage about generative artificial intelligence (AI), […]

New CPU attack, "GhostRace" discovered. Exploits speculative execution + race conditions to steal sensitive data.

Analyzing and automating processes, infusing them with AI, and adopting a more intelligent approach to data management are the keys to achieving this objective.

CISO Phil Venables highlights the importance of developing psychological resilience in cybersecurity leadership, from our newest Perspectives on Security for the Board report.

Using Persistent Disk Async Replication for Windows Server disaster recovery minimizes costs, speeds up recovery, and minimizes manual intervention.

Strategies for Security Remediation in 2024 | CSA

- cloudsecurityalliance.org - March 15, 2024

Learn how CISOs, security teams, and developers can communicate more effectively to drive overall business outcomes together.

Community post by Junya Okabe, Kaito Ii, and Nao Nishijima Japanese is the national language of Japan and is used daily by approximately 120 million people in Japan. It uses hiragana, kanji…

Ambassador post originally published on Medium by Yoshiyuki Tabata The era of Web 3.0 is upon us, and with it might come a shift in how we manage our digital identities.

Fly.io Luring Devs from the Big 3 Clouds with Object Storage

- thenewstack.io storage - March 15, 2024

As quiet as it's kept, Fly.io is creeping up on PaaS providers and the Big 3, amassing a large base of developers and forming strategic partnerships.

Avoid IAM Drifts Using Explicit-Deny | CSA

- cloudsecurityalliance.org - March 15, 2024

Here are several authorization features that may lead to authorization drift. Use explicit-deny over implicit-deny to avoid this.

In the world of software development, the integration of security into the software development life cycle (SDLC) is no longer a luxury.

Cybersecurity experts have uncovered new vulnerabilities in #ChatGPT's third-party plugins, posing a significant risk to user data and account.

Defend from Azure Cross-Tenant Synchronization Attacks | CSA

- cloudsecurityalliance.org - March 15, 2024

Azure cross-tenant synchronization introduced a new attack surface on Microsoft Entra ID where attackers can move to a partner tenant or existing tenant.

Google announces a major upgrade to Safe Browsing! Real-time, privacy-preserving URL checks are now on Chrome for desktop & iOS.

Chinese users searching for Notepad++ & VNote on engines like Baidu face malicious ads leading to fake versions with trojans.

The data privacy company Onerep.com bills itself as a Virginia-based service for helping people remove their personal information from almost 200 people-search websites. However, an investigation into the history of onerep.com finds this company is operating out of Belarus and…

Learn the Go Programming Language: Start Here

- thenewstack.io operations - March 14, 2024

This tutorial will teach you how to set up a Go programming environment and write your first Golang program.

Google Cloud network observability partner ecosystem continues to expand with new network performance monitoring (NPM) partners and solutions.

Cloud HPC Toolkit's new ML blueprint spins up a HPC system on GPU-based A3 VMs that's designed for LLMs and other AI/ML workloads.

Today is AWS Pi Day! Join us live on Twitch, starting at 1 PM Pacific time. On this day 18 years ago, a West Coast retail company launched an object storage service, introducing the world to Amazon Simple Storage Service (Amazon S3). We had no idea it would change the way businesses across the globe […]

Member post by Sergey Pronin, Percona Before joining Percona almost 4 years ago I was a strong believer of the "Kubernetes is for stateless" and 12-factor apps approach. But there are two north stars…

2023 Threat Intelligence Year in Review: Key Insights | CSA

- cloudsecurityalliance.org - March 14, 2024

2023 presented more cyber attacks than ever before, with more complex attack chains. Here are some key TTP highlights from 2023 you should know about.

CircleCI added a release orchestration capability to its namesake CI/CD platform to give developers more control over app deployments.

Mikhail Vasiliev, a 34-year-old Russian-Canadian, sentenced to nearly 4 years in jail for his role in the LockBit ransomware operation.

Amazon Virtual Private Cloud (Amazon VPC) endpoints, powered by Amazon Web Services (AWS) PrivateLink, can be used to privately connect your applications to AWS services as if they were in your VPC. For enterprises that use many AWS services, it may be difficult to understand which services are being used most often and therefore can […]

lamNote: To learn more about Amazon Route 53 Application Recovery Controller (Route 53 ARC), we recommend you read Part 1 and Part 2 of the series, and try out the examples. It demonstrates how the ARC service allows you to coordinate failovers and the recovery readiness of your application. In this blog post, we provide […]

Amazon EventBridge helps developers build event-driven architectures (EDA) by connecting loosely coupled publishers and consumers using event routing, filtering, and transformation. CloudEvents is an open-source specification for describing event data in a common way. Developers can publish CloudEvents directly to EventBridge, filter and route them, and use input transformers and API Destinations to send CloudEvents […]

As the year rolls on, here are a few key DevOps trends, from Apple Silicon to remote work to security, to watch for in 2024.

A Comprehensive Guide to Business Cyber Security | CSA

- cloudsecurityalliance.org - March 14, 2024

Delve into the multifaceted approach required to safeguard your business, including cybersecurity, phishing awareness, and network security.

Ramp plans are becoming a vital tool for containing cloud resources as companies try to control cloud sprawl and spending.

A high-severity flaw in Kubernetes, CVE-2023-5528, has been patched. This vulnerability allowed attackers remote code execution with SYSTEM privileges

AI's increasing integration into the wider DevOps framework will bring about significant changes in the way we approach software development.

3 Things CISOs Achieve with Cato

- thehackernews.com - March 14, 2024

CISOs globally are turning to Cato SSE 360 for seamless SASE and SSE transitions, achieving top results in visibility, threat prevention, and data sov

Preventing Business Email Compromise | CSA

- cloudsecurityalliance.org - March 14, 2024

Protecting your business from BEC attacks is crucial. Learn about cybersecurity, IAM, and cloud security to stay ahead of cyber threats.

RedCurl cybercrime group found exploiting Windows Program Compatibility Assistant for malicious activities. This sophisticated method allows attackers

Blind Eagle expands its cyber attack realm! Now targeting North America's manufacturing sector with phishing emails.

A new DarkGate malware campaign uses a recently patched #MicrosoftWindows flaw (CVE-2024-21412) to deploy malicious software via bogus installers.

Fortinet warns of a severe flaw in FortiClientEMS allowing attackers to execute code remotely. CVE-2023-48788 has a CVSS score of 9.3.

Starting today, you can use InfluxDB as a database engine in Amazon Timestream. This support makes it easy for you to run near real-time time-series applications using InfluxDB and open source APIs, including open source Telegraf agents that collect time-series observations. Now you have two database engines to choose in Timestream: Timestream for LiveAnalytics and […]

Last week, Anthropic announced their Claude 3 foundation model family. The family includes three models: Claude 3 Haiku, the fastest and most compact model for near-instant responsiveness; Claude 3 Sonnet, the ideal balanced model between skills and speed; and Claude 3 Opus, the most intelligent offering for top-level performance on highly complex tasks. AWS also […]

Users have successfully leveraged Amazon Web Services (AWS) Snow Family to transfer petabytes of data between on premises and AWS Regions since its launch in 2015 with the AWS Snowball device. Increasingly, users are not just migrating data with the AWS Snow Family but now are using AWS Snowball Edge Compute Optimized devices to host […]

Can OpenTofu Become the HTTP of Infrastructure as Code?

- thenewstack.io operations - March 13, 2024

From the perspective of the ecosystem, OpenTofu's game-changing "credibility potential" could play a critical role in ushering in a universal standard.

Demystifying a Common Cybersecurity Myth

- thehackernews.com - March 13, 2024

Limitations of 3 popular tools in cyber security and a comprehensive look at what it takes to prevent malware threats in today's ever-evolving file up

New Dataflow streaming committed use discounts (CUDs) let you save 20% for a one-year commitment, or 40% for a three-year commitment.

We're excited to announce a slew of graduated project updates. Read on for some, but not all, of the latest news from the project teams, or get the comprehensive details on the video (which will…

Lessons from HIPAA Compliance Breaches | CSA

- cloudsecurityalliance.org - March 13, 2024

Learn crucial strategies for enhancing HIPAA compliance and securing patient data to prevent healthcare breaches and maintain trust.

Flox's open source CLI tool enables developers to more easily spin up multiple custom development environments.

IBM reports a new evasion technique by PixPirate Android trojan targeting Brazilian users. The malware now hides its icon, making it undetectable on v

The Growing Appeal of On-Premise and Hybrid Solutions | CSA

- cloudsecurityalliance.org - March 13, 2024

Organizations are increasingly turning to on-premise and hybrid-based digital trust solutions. Explore the factors driving this shift.

It's often challenging to adopt modern DevOps practices around infrastructure-as-code (IaC). Here's how to make the journey smoother.

ElasticSearch Goes Deep on OpenTelemetry with eBPF Donation

- thenewstack.io observability - March 13, 2024

Elastic is collaborating with OpenTelemetry across various areas, not solely on profiling but also on the common schema and the semantic convention.

Is it Time to Reconsider CI? - DevOps.com

- devops.com - March 13, 2024

If you have issues with Jenkins, look around. There are options. Find the best CI tool for you, not just the most convenient.

From Humans to Bots: Every Identity in Your SaaS App Could Be a Backdoor for Cybercriminals. Join an informative webinar on identity risks in SaaS app

Cybersecurity Regulations' Impact on Consumers | CSA

- cloudsecurityalliance.org - March 13, 2024

Explore the impact of cybersecurity regulations like GDPR on consumer protection, and learn practical tips for enhancing online safety and privacy.

A new phishing campaign uses a Java-based downloader to distribute VCURMS & STRRAT RATs, leveraging public services like AWS & GitHub for malware host

Google's Gemini large language model faces vulnerabilities that could lead to security breaches, including leaking system prompts & generating harmful

Finally, Platform Engineering for Enterprise Cloud Migration

- thenewstack.io devops - March 13, 2024

How can platform engineering ease the way for enterprise cloud migration and DevOps, a decade or more into stalled legacy system modernization?

Happening on 19 March 2024 in Paris Co-chairs: Bartlomiej Plotka and Sonia Singla ThanosCon Europe is a day to learn about the work being put into the project by the community and all the rapid…

Microsoft releases Patch Tuesday updates to patch 61 new vulnerabilities, including privilege escalation flaws in Azure, Windows, & Authenticator.

With the rise in data sovereignty and privacy regulations, organizations are seeking flexible solutions that balance compliance with data sovereignty regulations and the agility of the cloud. For example, to comply with data sovereignty regulations, users in the financial and healthcare industries need to deploy applications on premises and store data locally. To provide the […]

InterSystems IRIS is a cloud-based data platform optimized for high-throughput applications that must simultaneously process transactions and a range of analytics, including analytic SQL, business rules, and machine learning. Users use the InterSystems IRIS Data Platform to rapidly develop and deploy critical applications. InterSystems recommends that users consider several backup methods, such as external backups, […]

At re:Invent in 2023, AWS announced Infrastructure as Code (IaC) support for Amazon CodeWhisperer. CodeWhisperer is an AI-powered productivity tool for the IDE and command line that helps software developers to quickly and efficiently create cloud applications to run on AWS. Languages currently supported for IaC are YAML and JSON for AWS CloudFormation, Typescript and […]

We're excited to announce that Amazon Web Services (AWS) has completed the annual Dubai Electronic Security Centre (DESC) certification audit to operate as a Tier 1 cloud service provider (CSP) for the AWS Middle East (UAE) Region. This alignment with DESC requirements demonstrates our continuous commitment to adhere to the heightened expectations for CSPs. Government […]

Most people think of disaster recovery as a mechanism to protect their applications against big events. However, in the fast-paced world of development where new code and infrastructure changes are occurring several times a month, it is important to put mechanisms in place to proactively understand impacts to the resilience posture of your applications. In […]

Community blog by Seven Cheng WebAssembly (Wasm) was originally created for the browser, and it has become increasingly popular on the server-side as well. In my view…

Distribution, Commercialization and the Future of Open Source

- thenewstack.io operations - March 12, 2024

As the market continues to mature, both founders and investors need to evolve their thinking to ensure the long-term success of open source businesses.

Amazon Web Services (AWS) is pleased to announce the publication of our annual compliance assessment report on the Information Assurance Regulation (IAR) established by the Telecommunications and Digital Government Regulatory Authority (TDRA) of the United Arab Emirates (UAE). The report covers the AWS Middle East (UAE) Region. The IAR provides management and technical information security […]

Happening on 19 March 2024 in Paris Co-chairs: Tina Tsou and Mars Toktonaliev Kubernetes on Edge Day Europe is a celebration of the fact that edge computing is here and it's powered by Kubernetes. We'…

CSA Community Spotlight: Larry Whiteside Jr. | CSA

- cloudsecurityalliance.org - March 12, 2024

Celebrate CSA's 15th anniversary with this interview of Larry Whiteside Jr., CISO at RegScale and longtime CSA collaborator and supporter.

Project post by Prithvi Raj, Community Leader, LitmusChaos KubeCon + CloudNativeCon EU 2024 kicks off in the beautiful and mesmerising city of Paris a week from now from March 19-22.

A Guide to GCP Organization Policy: Managing Access | CSA

- cloudsecurityalliance.org - March 12, 2024

Here's all you need to know about GCP Organization Policies and how to leverage them to centralize control over your environment.

Introducing Security Command Center Enterprise

- GCP security blogs - March 12, 2024

Security Command Center Enterprise is the first multicloud risk management solution that fuses AI-powered SecOps with cloud security.

The integration of AI and ML in testing is a fundamental shift in how we approach software quality and reliability in DevOps environments.

7 malicious packages found on PyPI designed to steal wallet recovery phrases.

Artificial intelligence (AI) and machine learning (ML) are powerful tools in the realm of continuous testing the SDLC.

Curious about CTEM? It's not just a buzzword—it's a proactive strategy to identify, prioritize, and mitigate cyber risks.

Designing Cloud-Native Applications: Security Aspects | CSA

- cloudsecurityalliance.org - March 12, 2024

Organizations should consider security when designing applications in the cloud, including access management, network security, and more.

Meet DBOS: A Database Alternative to Kubernetes

- thenewstack.io cloud-native - March 12, 2024

The creator of PostgreSQL has teamed with the creator of Apache Spark to build a cloud OS on top of a distributed database, aiming to offer better security and less management complexity than the Linux/K8s combo so widely-used today.

WordPress sites under attack! A new malware campaign exploits Popup Builder plugin vulnerability (CVE-2023-6000) infecting over 3,900 sites

For the first time, a South Korean national, Baek Won-soon, has been detained in Russia on cyber espionage charges, now transferred to Moscow for furt

Patch Tuesday, March 2024 Edition

- krebsonsecurity.com - March 12, 2024

Apple and Microsoft recently released software updates to fix dozens of security holes in their operating systems. Microsoft today patched at least 60 vulnerabilities in its Windows OS. Meanwhile, Apple's new macOS Sonoma addresses at least 68 security weaknesses, and…

Introduction Selecting your first workloads to migrate your organization to AWS is a key stage in delivering a successful migration. In this blog post we provide guidance on how to select early migration candidates. We cover how selecting these candidates can help to kick-off a successful migration, reduce risk, and build skills inside your organization. […]

Amazon Web Services (AWS) is excited to announce that AWS Wickr has achieved Federal Risk and Authorization Management Program (FedRAMP) authorization at the High impact level from the FedRAMP Joint Authorization Board (JAB). FedRAMP is a U.S. government–wide program that promotes the adoption of secure cloud services by providing a standardized approach to security and […]

Incognito Darknet Market Mass-Extorts Buyers, Sellers

- krebsonsecurity.com - March 11, 2024

Borrowing from the playbook of ransomware purveyors, the darknet narcotics bazaar Incognito Market has begun extorting all of its vendors and buyers, threatening to publish cryptocurrency transaction and chat records of users who refuse to pay a fee ranging from…

The Implications of AI in Cybersecurity | CSA

- cloudsecurityalliance.org - March 11, 2024

As AI integrates with cybersecurity, the need for AI training and standards grows. Here's how we can ensure a resilient digital infrastructure.

Cloud Native Computing and AI: A Q&A with CNCF's Head of Ecosystem

- thenewstack.io kubernetes - March 11, 2024

A week before KubeCon Taylor Dolezal, head of ecosystem and AI for the Cloud Native Computing Foundation, discusses how the CNCF is setting the stage for production-ready AI.

Simplify Kubernetes Hosted Control Planes with K0smotron

- thenewstack.io operations - March 11, 2024

Hosting Kubernetes control planes as pods can enable (and simplify) operations for multicluster and Edge use cases. But, bring along some new requirements and concerns. And standards may be slow in coming.

Cross-posted from the Istio blog Announcing the latest member of the CNCF family of mascots. Having sailed into, and proudly graduated within the Cloud Native Computing Foundation in 2023…

Hear our security experts share strategies for fortifying your security posture and bolstering resilience to cyber threats at the first Security Talks of the year on March 13. Sign up today.

Introduction AWS CloudFormation customers often inquire about the behind-the-scenes process of provisioning resources and why certain resources or stacks take longer to provision compared to the AWS Management Console or AWS Command Line Interface (AWS CLI). In this post, we will delve into the various factors affecting resource provisioning in CloudFormation, specifically focusing on resource stabilization, which allows […]

Last Friday was International Women's Day (IWD), and I want to take a moment to appreciate the amazing ladies in the cloud computing space that are breaking the glass ceiling by reaching technical leadership positions and inspiring others to go and build, as our CTO Werner Vogels says. Last week's launches Here are some launches […]

Member post originally published on the Last9 blog by Prathamesh Sonpatki A detailed checklist of points you should consider before choosing a monitoring system By virtue of being a 'managed'…

Hackers are getting creative with CHAVECLOAK. This malware can block screens, log keystrokes, and even show fake pop-up windows to steal banking login

Cyber threats are escalating, making Privileged Access Management essential. Meet One Identity PAM Essentials: a cloud-based solution prioritizing sec

Phishing on Executive Accounts in Azure | CSA

- cloudsecurityalliance.org - March 11, 2024

Learn how to protect Microsoft Azure from sophisticated cyberattacks with actionable security strategies for risk management and data safety.

Community post originally published on Medium by Maryam Tavakkoli Having attended my first in-person KubeCon + CloudNativeCon in Amsterdam in 2023, I gained invaluable insights that differed from my…

With YAMLScript, YAML Becomes a Proper Programming Language

- thenewstack.io operations - March 11, 2024

Ingy döt Net is brewing up a scripting language that brings to YAML all the programming capabilities many assumed it already had.

The Future Role of AI in Cybersecurity | CSA

- cloudsecurityalliance.org - March 11, 2024

AI's impact on cybersecurity: unlocking potential while navigating threats, privacy, and the critical role of human oversight.

Leveraging eBPF for DevSecOps - DevOps.com

- devops.com - March 11, 2024

The applications for enhancing security observability with eBPF are vast, and it's increasingly valuable for DevSecOps use cases.

It's time for a data security makeover! Say goodbye to on-prem solutions and hello to Browser DLP. @LayerX's guide reveals the path forward.

Looking for a great new DevOps job? Check out these available opportunities at Broadcom, CGI, EY and more!

5 Lessons From Okta's Support Site Breach | CSA

- cloudsecurityalliance.org - March 11, 2024

Learn from 1Password, BeyondTrust, Cloudflare, & Okta breaches: Key takeaways on Zero Trust, SaaS governance, and data security risks.

Hackers leveraging JetBrains TeamCity flaws to propagate BianLian ransomware attacks

Progress OpenEdge has a severe authentication bypass flaw (CVE-2024-1403). This could grant hackers unauthorized access.

Magnet Goblin, a threat group known for fast exploitation of 1-day vulnerabilities, targets edge devices & public servers to deploy malware.

VTEX is a multi-tenant platform with a distributed engineering operation. Observing hundreds of services in real time in an efficient manner is a technical challenge for the business. In this blog, we will show how VTEX created a resilient open source-based architecture aligned with a sharding strategy, using Amazon Managed Service for Prometheus (AMP) to […]

DEVOPS WEEKLY ISSUE #688 - 10th March 2024

- devopsweeklyarchive.com - March 10, 2024

Build tools, API observability, eBPF, managing development environments and some comedic relief this week.

SRE Weekly Issue #415 – SRE WEEKLY

- sreweekly.com - March 10, 2024

Simplify Linux and Docker Command Lines with Bash Completion

- thenewstack.io containers - March 09, 2024

By way of the Tab key, Bash Completion can autocomplete your thorniest Linux and Docker commands. Here's how to set it up.

Russian hackers 'Midnight Blizzard' have accessed Microsoft's source code and internal systems. The state-sponsored group is actively exploiting stol

Do you need to capture terabytes or petabytes of data from the field, but struggle to offload the data efficiently, keep up with storage capacity, and maintain equipment in extreme environmental conditions? We commonly hear these challenges from customers who are capturing data in remote locations for future analysis. It is time consuming to offload […]

Organizations continue to grow their data lakes in the cloud as they build out new and innovative analytics, machine-learning, and generative AI workloads. At the same time, these workloads often access data that requires compliance with stringent data security and privacy standards. These compliance frameworks typically specify additional requirements for encryption at-rest, which leads customers […]

How to fail at platform engineering

- cncf.io - March 08, 2024

Member post originally published on the InfraCloud blog by Atulpriya Sharma A team of DevOps professionals working at DevOpsX had high expectations from the platform their organization just launched.

A Close Up Look at the Consumer Data Broker Radaris

- krebsonsecurity.com - March 08, 2024

If you live in the United States, the data broker Radaris likely knows a great deal about you, and they are happy to sell what they know to anyone. But how much do we know about Radaris? Publicly available data…

HijackLoader Improves Defense Evasion | CSA

- cloudsecurityalliance.org - March 08, 2024

A HijackLoader (IDAT Loader) sample has been identified that employs sophisticated evasion techniques to enhance the complexity of the threat.

Zero Trust Blueprint for Secure Digital Transformation | CSA

- cloudsecurityalliance.org - March 08, 2024

Unpack CSA's guide for implementing DAAS protection with Zero Trust and explore practical steps for enhancing your organization's cybersecurity.

Containers accelerate application development and enhance deployment consistency across environments, thus enabling organizations to improve productivity and agility. AWS container services such as Amazon Elastic Container Service (Amazon ECS) make it easier to manage your application so you can focus on innovation and your business needs. Customer experience is the most important yardstick by which […]

Sumo Logic will no longer charge for ingesting log data into its observability platform to encourage DevOps teams to apply deeper analytics.

Years of SaaS innovation and disruption threaten the profitability of vendor-driven open source projects, forcing licensing changes.

Happening 19 March 2024 in Paris Co-chairs: Laurent Bernaille and Bill Mulligan Cilium + eBPF Day Europe will feature end user stories that highlight how the two technologies are really improving…

Meta announces plans for interoperability between WhatsApp, Messenger, and third-party messaging services in response to the EU's Digital Markets Act.

Arm-based processors, which are increasingly popular, may capture a significant share of the semiconductor market with RISC-V.

What are Non-Human Identities? | CSA

- cloudsecurityalliance.org - March 08, 2024

Navigate the complexities of Non-Human Identity (NHI) management in cloud environments. Learn vital strategies for secure machine-to-machine authentication.

Unlock the secrets to robust cybersecurity with our guide on secrets management. Learn the common mistakes, lesser-known pitfalls.

Cisco patches critical flaw in Secure Client software. Update NOW to prevent attackers from hijacking your VPN sessions.

Threat actors leverage QEMU emulator for network tunneling, bypassing traditional defenses in a sophisticated cyber attack. Kaspersky highlights the n

CISA has added a critical JetBrains TeamCity flaw (CVE-2024-27198, CVSS 9.8) to its KEV catalog due to active exploitation.

This post discusses a very in-demand feature for PKI, the automation of certificate provisioning. It covers validation modes and ACME.

Calls to distributed services aren't always responded to quickly. Rather than wasting time, learn how to make the external call asynchronously, only to be notified later on when the call completes.

appCD's platform analyzes an application about to be deployed and automatically generates the code to provision the required infrastructure.

Falco Is a CNCF Graduate. Now What?

- thenewstack.io kubernetes - March 07, 2024

Falco offers sensors across distributive architectures, and it's geared particularly for distributed architectures, notably Kubernetes, containers, etc.

Move-in ready Kubernetes security with GKE Autopilot

- GCP containers blogs - March 07, 2024

GKE Autopilot uses Google Cloud's deep Kubernetes security expertise to configure your clusters to be move-in ready for your production workloads.

Learn how Google Kubernetes Engine (GKE) enables you to build a secure, scalable developer platform for fast and reliable application delivery.

GKE Autopilot supports Elastic Cloud on Kubernetes (ECK)

- GCP containers blogs - March 07, 2024

Running Elastic Cloud on Kubernetes on GKE Autopilot removes the need to know, plan and size node pools to match the size of your Elastic nodes.

Community post originally published on Medium by Maryam Tavakkoli This article outlines my hands-on experience with implementing ArgoCD in our project. Drawing from these experiences, I've tried to…

Permiso today launched an open source tool dubbed CloudGrappler that surfaces indicators of compromise in cloud computing environments.

Over 700 WordPress sites hit by brute-force attacks using malicious JavaScript injections, leveraging innocent visitors' browsers to compromise more s

China-backed hackers, Evasive Panda, target Tibetan users in watering hole & supply chain attacks.

Fuzzing and Bypassing the AWS WAF | CSA

- cloudsecurityalliance.org - March 07, 2024

Sysdig discovered techniques that allowed the AWS Web Application Firewall to be bypassed using a specialized DOM event.

Database observability unlocks DORA metrics along with other indicators that matter to your DevOps, application, database and IT teams.

Paris, France, March 7th, 2024, CyberwireCompany Open Sources FHE Libraries to Build Privacy-Preserving Blockchain and AI Applications for the First

Software teams use DORA metrics in an organization to help improve their efficiency and enhance the effectiveness of company deliverables.

New Phishing Methods: QR Codes, Audio Notes, Voicemail | CSA

- cloudsecurityalliance.org - March 07, 2024

Phishers are adding new sophisticated techniques to their repertoire that make attacks harder to detect.

Human vs. Non-Human Identity in SaaS

- thehackernews.com - March 07, 2024

From Calendly integrations to SwiftPOS data transfers, non-human accounts play a crucial role in SaaS ecosystems. Learn why their security is as criti

Former Google engineer arrested for secretly working with Chinese tech companies while at Google. Linwei Ding charged with theft of AI supercomputing

New Python-based info stealer dubbed 'Snake' is leveraging Facebook messages to capture sensitive data, targeting credentials & cookies for malicious

Fake video conferencing websites mimic Google Meet, Skype, & Zoom to distribute malware to Android & Windows users.

This post is written by Jeff Harman, Senior Prototyping Architect, Vaibhav Shah, Senior Solutions Architect and Erik Olsen, Senior Technical Account Manager. Many industries are required to provide audit trails for decision and transactional systems. AI assisted decision making requires monitoring the full inputs to the decision system in near real time to prevent fraud, […]

The Securities and Exchange Commission (SEC) has adopted new rules to enhance and standardize climate-related disclosures by public companies and in Explore how the SEC's new climate-related disclosure rules are catalyzing a shift towards sustainability in corporate reporting, driving innovation in cloud computing, and promoting the development of energy-efficient AI solutions.

Slack has launched a new developer portal that is the new home for developers seeking information and help building Slack apps.

To safeguard data against natural disasters and ransomware attacks, many AWS users opt to protect their data by creating snapshots and replicating them to different AWS Regions. It is crucial for these users to monitor snapshots and associated data transfers for inter-regional costs, allowing them to provide accurate chargebacks to both internal and external stakeholders. […]

AWS Heroes are inspirational thought leaders who go above and beyond to knowledge share in a variety of ways. You can find them speaking at local meetups, AWS Community Days, or even at re:Invent. And these technical experts are never done learning—they're passionate about solving problems and creating content to enable the community to build […]

Today, I am pleased to announce the availability of Provisioned IOPS (PIOPS) io2 Block Express storage volumes for all database engines in Amazon Relational Database Service (Amazon RDS). Amazon RDS provides you the flexibility to choose between different storage types depending on the performance requirements of your database workload. io2 Block Express volumes are designed […]

Copado Explorer enables DevOps teams to integrate custom scripts into testing processes that can be repeated as required.

Announcing Vitess 19

- cncf.io - March 06, 2024

Project post by the Vitess Maintainers We're thrilled to announce the release of Vitess 19, our latest version packed with enhancements aimed at improving scalability, performance…

New malware campaign targets misconfigured servers running Apache Hadoop YARN, Docker, Atlassian Confluence, and Redis to deliver crypto malware.

Build Spring-based gRPC microservices with OSS monitoring

- GCP devops/sre blogs - March 06, 2024

Create microservices with gRPC with Spring, and leverage Managed Service for Prometheus and Grafana for monitoring and observability.

New compute classes, reservations, and improved price/performance enhance GKE Autopilot for running AI training and serving workloads.

Community post originally published on Linux.com by Tamimi Ahmad, Solace In basic terms, an event-driven architecture (EDA) is a distributed system that involves moving data and events between…

Forget the hype – artificial intelligence is here and it's only going to get more pervasive as time goes on. Luckily KubeCon + CloudNativeCon Europe 2024 has a plethora of keynotes, tracks…

Apache Struts Vulnerability CVE-2023-50164 | CSA

- cloudsecurityalliance.org - March 06, 2024

The Apache Struts vulnerability CVE-2023-50164, with a critical CVSS score of 9.8, poses a significant threat to a wide range of industries.

BlackCat ransomware gang suspected of pulling a major exit scam. Bogus law enforcement seizure notice uploaded to their site as they shut down.

AISecOps, the application of DevSecOps principles to AI/ML and generative AI, means integrating security into models' life cycles.

Happening 19 March 2024 in Paris Co-chairs: Amber Graner and Ricardo Rocha Kubeflow Summit Europe will bring together end users, service managers and project maintainers. We will have multiple…

How Do I Choose a SOC Auditor? | CSA

- cloudsecurityalliance.org - March 06, 2024

Unlock the secrets to SOC 2 compliance: Find the perfect auditor with our guide. Navigate the myths and ensure your cloud services meet top security standards.

LinkedIn Open Sources OpenHouse Data Lakehouse Control Plane

- thenewstack.io storage - March 06, 2024

At the heart of OpenHouse lies its Catalog, a RESTful table service that offers secure and scalable table provisioning alongside declarative metadata management.

Here are seven API observability anti-patterns and pitfalls to avoid to your APIs observable and your users happy.

Cloudflare's Magic Cloud Networking platform makes it simpler to programmatically manage multiple cloud networking environments.

Google is Right to be Afraid - DevOps.com

- devops.com - March 06, 2024

Google's recent AI stumbles come at an inopportune time, but the concerns that made them address the controversy are worse than most know.

Reflectiz: The ultimate website security solution that proactively detects, prioritizes, and mitigates web threats. Say goodbye to client-side attacks

Implementing DevSecOps: Considerations for CISOs | CSA

- cloudsecurityalliance.org - March 06, 2024

DevSecOps adds cybersecurity talent to the software development lifecycle so that hard-won security wisdom can guide DevOps personnel.

How to Find and Fix Risky Sharing in Google Drive

- thehackernews.com - March 06, 2024

Excessive permissions & improper sharing pose risks in Google Drive. Discover how Material Security's platform helps manage and secure your data.

VMware releases updates for ESXi, Workstation, and Fusion to patch new security vulnerabilities with potential for code execution by attackers.

U.S. Department of Treasury sanctions individuals and entities of the Intellexa Alliance for distributing spyware.

Cisco Talos reveals that GhostSec & Stormous ransomware groups are now offering GhostLocker through a new RaaS program, STMX_GhostLocker.

Lotus Bane APT targets Vietnamese financial entity, first detected in March 2023.

pple rolls out crucial updates for iOS & iPadOS to patch actively exploited vulnerabilities CVE-2024-23225 & CVE-2024-23296, enhancing kernel memory p

Application modernization is a focus area for organizations of different sizes and across industries to achieve business objectives such as reduced time to market, improved cost efficiency, and better customer experience. Containers and container orchestration platforms have been one of the key enablers for these modernization initiatives. Many customers standardize on Kubernetes as a containers […]

Introduction Today, we are announcing the availability of Credentials Fetcher integration with AWS Fargate on Amazon Elastic Container Service (Amazon ECS). With this launch, you have the option of running Linux containers on Amazon ECS using both the Amazon Elastic Compute Cloud (Amazon EC2) launch type, as well as with AWS Fargate serverless compute launch […]

KubeCon 24: Crossplane, a Developer-Friendly Control Plane

- thenewstack.io platform-engineering - March 05, 2024

Those heading to KubeCon+CloudNativeCon Europe later this month should stop by the Crossplane booth to learn about the latest release of this cloud-native control plane.

Techstrong Research underscores the critical role of database caching in supporting real-time applications and digital experience delivery.

North Korean hackers exploit ConnectWise ScreenConnect vulnerabilities (CVE-2024-1708 & CVE-2024-1709) to deploy TODDLERSHARK malware.

Project post originally published on the Linkerd blog by Flynn This blog post is based on a workshop that I delivered way back in September 2023(!) at Buoyant's Service Mesh Academy.

Codefresh and Octopus: GitOps, K8s and VMs Under One Roof

- thenewstack.io devops - March 05, 2024

Codefresh and Octopus Deploy will go a long way in unifying the deployments of cloud native architectures, particularly for large enterprises.

Use of long-term access keys for authentication between cloud resources increases the risk of key exposure and unauthorized secrets reuse. Amazon Web Services (AWS) has developed a solution to enable customers to securely authenticate Azure resources with AWS resources using short-lived tokens to reduce risks to secure authentication. In this post, we guide you through […]

Changing IT providers has always required time, effort, and money, but cloud computing has made that process easier than ever. Before cloud services, switching was often prohibitively difficult and expensive: over a multi-year process, companies would make up-front investments in new hardware and rewrite software to conform to their new provider's proprietary operating system. At […]

You told us one of the primary reasons to adopt Amazon Web Services (AWS) is the broad choice of services we offer, enabling you to innovate, build, deploy, and monitor your workloads. AWS has continuously expanded its services to support virtually any cloud workload. It now offers over 200 fully featured services for compute, storage, […]

Adhere to the EU Cloud CoC through CSA | CSA

- cloudsecurityalliance.org - March 05, 2024

Join the CSA-EU Cloud CoC collaboration for GDPR compliance and cloud security. Enhance trust with the STAR Registry. Start your adherence journey now!

appCD Lifts Developer Load by Automating Infrastructure from Code

- thenewstack.io operations - March 05, 2024

Startup's software, in early access, auto-generates infrastructure from application code and automatically applies operations and security policies.

As technology continues to evolve rapidly, the role of platform engineering, bolstered by effective TDM, becomes increasingly crucial.

The evolution of CI/CD frameworks reflects the DevOps industry's dynamic nature and the demand for efficient software delivery pipelines.

Cycode has acquired Bearer, a provider of a set of tools for SAST, API discovery and identification of sensitive data.

Email Threats: 5 Attacks to Watch For in 2024 | CSA

- cloudsecurityalliance.org - March 05, 2024

Explore 2024's top email threats: AI attacks and sophisticated phishing, plus security strategies to safeguard your organization against cyber risks.

Over 225,000 OpenAI ChatGPT credentials were compromised and sold in underground markets by October 2023.

Hybrid environments are the new norm for mid-market companies, blending cloud agility with on-prem reliability. Discover how they navigate the securit

Beware of ZIP attachments in emails! TA577's new phishing tactic aims to steal NTLM hashes, posing a serious threat to enterprise security.

The new DNS threat snaring victims into fake investment schemes. Don't let sophisticated cyber tricks drain your wallet

JetBrains TeamCity vulnerabilities could let hackers take full control of your servers.

There are indications that U.S. healthcare giant Change Healthcare has made a $22 million extortion payment to the infamous BlackCat ransomware group (a.k.a. "ALPHV") as the company struggles to bring services back online amid a cyberattack that has disrupted prescription…

This blog post provides architectural guidance on AWS CloudHSM crypto user credential rotation and is intended for those using or considering using CloudHSM. CloudHSM is a popular solution for secure cryptographic material management. By using this service, organizations can benefit from a robust mechanism to manage their own dedicated FIPS 140-2 level 3 hardware security […]

Ambassador post by Annalisa Gennaro When I embarked on my journey as a CNCF Ambassador, little did I know that it would lead to unexpected opportunities, personal growth, and a deeper connection with…

What's happening to standard RIs?

- cncf.io - March 04, 2024

Member post originally published on the Zesty blog by Pini Ben-Nahum When it comes to AWS discount plans, management approaches vary greatly. The often overlooked (Standard Reserved Instance) SRI has…

Happening on 19 March 2024 in Paris Co-Chairs: Melissa Logan and Sheetal Joshi Data on Kubernetes Day (also known as DOK Day) is, as its name suggests, a deep dive into how to get the most out of data…

Transforming Identity and Access Management with Event Sourcing

- thenewstack.io microservices - March 04, 2024

How ZITADEL, an open source identity and access management solution, implements event sourcing right from the start.

Choosing a regional vs. zonal GKE cluster

- GCP containers blogs - March 04, 2024

When designing your Google Kubernetes Engine environment, learn when to choose between a regional or zonal cluster.

In September 2023, we announced a strategic collaboration with Anthropic that brought together their respective technology and expertise in safer generative artificial intelligence (AI), to accelerate the development of Anthropic's Claude foundation models (FMs) and make them widely accessible to AWS customers. You can get early access to unique features of Anthropic's Claude model in […]

This has been a busy week – we introduced a new kind of Amazon CloudFront infrastructure, more efficient ways to analyze data stored on Amazon Simple Storage Service (Amazon S3), and new generative AI capabilities. Last week's launches Here's what got my attention: Amazon Bedrock – Mistral AI's Mixtral 8x7B and Mistral 7B foundation models […]

Member post by Asaf Yigal, Co-Founder and CTO at Logz.io Software developers are all too familiar with the complexities that come with managing Kubernetes environments. From the layers of abstraction…

DORA: EU's New Framework For BFSI | CSA

- cloudsecurityalliance.org - March 04, 2024

Unpacking DORA: EU's move to boost financial cybersecurity with strict standards on risk management and resilience. Key for EU finance firms facing a 2025 deadline.

Developers often move from single responsibility functions to the Lambda-lith when they architectures demand it, but both approaches have relative trade-offs. It's possible to have the best of both approaches by dividing your workloads per read and write operations.

Maximizing the value from Enterprise Software tools requires an understanding of who and how users interact with those tools. As we have worked with builders rolling out Amazon CodeWhisperer to their enterprises, identifying usage patterns has been critical. This blog post is a result of that work, builds on Introducing Amazon CodeWhisperer Dashboard blog and […]

ServiceNow, Hugging Face and NVIDIA are advancing a generative AI platform specifically trained to generate high-quality code.

A sophisticated Android app named XHelper is being used by criminals to manage money-laundering activities in India.

Jenkins Vulnerability Affecting Cloud Environments | CSA

- cloudsecurityalliance.org - March 04, 2024

Jenkins, a CI/CD automation tool, released a security advisory regarding a new critical vulnerability that can allow arbitrary file read, leading to RCE.

Traditionally, scraping application Prometheus metrics required manual updates to a configuration file, posing challenges in dynamic AWS environments where Amazon EC2 instances are frequently created or terminated. This not only proves time consuming but also introduces the risk of configuration errors, lacking the agility necessary in dynamic environments. In this blog post, we will demonstrate […]

Low-code platforms have been created to meet the needs of moderately skilled app developers and competitively focused organizations.

A recent survey found that, on average, organizations have 55.5 security vulnerabilities each day in their remediation queue.

Looking for a great new DevOps job? Check out these available opportunities at New York City's MTA, Mayo Clinic and more!

Design Cloud-Native Applications: Introduction | CSA

- cloudsecurityalliance.org - March 04, 2024

Building a new application requires a thorough design process. During the design phase, avoid locking yourself to a specific cloud provider.

Facing the SaaS security maze? Discover how mid-market companies are navigating the complexities of rapid growth and evolving threats.

Over 100 AI/ML models discovered with malicious intent on the Hugging Face platform. The cyber realm faces a new threat.

U.S. agencies warn of Phobos ransomware attacks targeting vital sectors. Millions in ransom already paid.

DEVOPS WEEKLY ISSUE #687 - 3rd March 2024

- devopsweeklyarchive.com - March 03, 2024

Platform Engineering, alert design and some good real world stories of debugging, testing or building internal tooling this week.

SRE Weekly Issue #414 – SRE WEEKLY

- sreweekly.com - March 03, 2024

This year's VOID Report is out, and it's well worth a read. The subtitle is "Exploring the Unintended Consequences of Automation in Software" which is a really good way to get me to read something!

A U.S. court has ordered Israeli spyware company NSO Group to disclose the source code and functionality details of its Pegasus spyware to Meta.

U.S. Department of Justice unveils charges against an Iranian national for a sophisticated cyber-attack campaign.

Last week, we announced that Mistral AI models are coming to Amazon Bedrock. In that post, we elaborated on a few reasons why Mistral AI models may be a good fit for you. Mistral AI offers a balance of cost and performance, fast inference speed, transparency and trust, and is accessible to a wide range […]

Logz.io's real-time anomaly detection simplifies correlation of the impact IT events have on business processes.

Learn how the AWS Quick Start team reduced documentation delays by implementing a docs-as-code solution based on GitHub and AsciiDoc.

New Relic is moving to make it simple to analyze and store telemetry data regardless of when it was collected.

Starting on April 1, our Kubernetes training and certification exams will move from a 36-month certification period to a 24-month certification period. This includes CKA, CKAD, KCNA, KCSA, PCA, ICA…

Member post originally published on Devtron's blog by Shubham Kumar TL;DR: In this article we'll learn about how to deploy Hashicorp vault in Kubernetes and how to fetch secrets from vault and…

Looking Forward, Looking Back: 24 Years as a CISO | CSA

- cloudsecurityalliance.org - March 01, 2024

Gail Coury, retiring CISO at F5, explores how cybersecurity has evolved and what the future holds.

Cryptocurrency users BEWARE! Sophisticated phishing kit actively impersonating major exchanges.

Why Compliance is a Roadmap to Security | CSA

- cloudsecurityalliance.org - March 01, 2024

Explore the critical balance between cybersecurity compliance and risk management, emphasizing automation's role in enhancing security posture.

For many network security operators, protecting application uptime can be a time-consuming challenge of baselining network traffic, investigating suspicious senders, and determining how best to mitigate risks. Simplifying this process and understanding network security posture at all times is the goal of most IT organizations that are trying to scale their applications without also needing […]

A balanced approach to AI adoption in software development would result in a future where AI and human capabilities are intertwined.

AI-enabled tools will have a major impact on software development, increasing the volume and velocity of code delivery and innovation.

Observe added a Trace Explorer tool to its observability platform that simplifies search, analysis and visualization of billions of traces.

How To Secure Your AWS Environment: 6 Best Practices | CSA

- cloudsecurityalliance.org - March 01, 2024

Securing your AWS environment can be a difficult process. Here are six best practices that can help you keep it secure.

Cybersecurity researchers have discovered a new variant of the BIFROSE remote access trojan targeting Linux systems, employing deceptive domains to mi

4 Instructive Postmortems on Data Downtime and Loss

- thehackernews.com - March 01, 2024

Learn from GitLab's 2017 incident: 300GB of data lost in seconds, but their transparent recovery is a masterclass in accountability.

Five Eyes intelligence alliance issued a cybersecurity advisory concerning cyber threat actors exploiting known vulnerabilities in Ivanti.

GitHub's new default push protection has got your back, scanning for secrets in public repos

Fulton County, Security Experts Call LockBit's Bluff

- krebsonsecurity.com - February 29, 2024

The ransomware group LockBit told officials with Fulton County, Ga. they could expect to see their internal documents published online this morning unless the county paid a ransom demand. Instead, LockBit removed Fulton County's listing from its victim shaming website…

A Firefly survey suggests usage of infrastructure-as-code (IaC) tools is evolving rapidly in the cloud computing era.

Amazon Web Services (AWS) has released a new whitepaper to help financial services customers in Canada accelerate their use of the AWS Cloud. The new AWS User Guide for Federally Regulated Financial Institutions in Canada helps AWS customers navigate the regulatory expectations of the Office of the Superintendent of Financial Institutions (OSFI) in a shared responsibility environment. […]

Users who choose to migrate workloads to the cloud prefer to do so without modifying application code and without being required to learn new methods for managing data. Ideally they are seeking a cloud service with like-for-like functionality, and management similar to their on-premises infrastructure. The goal is to accelerate migration and deployment in the […]

AWS customers are increasingly relying on AWS User Notifications to monitor and get real-time notifications about the AWS resources that are most important to them. The AWS Console Mobile Application can be configured as a notification delivery channel, where users can monitor AWS resources, get detailed resource notifications, diagnose issues, and take remedial actions, from […]

Member post originally published on Fairwinds' blog by Andy Suderman In the rapidly evolving Kubernetes ecosystem, managing costs effectively is as critical as ensuring operational efficiency.

Member post originally published on Facets.cloud's blog by Pravanjan Choudhury $100,000 – for FREE. That's what you get when you sign up for the AWS startup program. Microsoft will see and raise at…

Quiz #21 was: An organization's critical online service has a Service Level Objective (SLO) of 99% uptime. Over a quarter, the service experienced several

Researchers have disclosed a new attack technique, "Silver SAML," targeting applications that use cloud identity providers such as Microsoft Entra ID.

CSA Partners with EU Cloud CoC for GDPR Compliance | CSA

- cloudsecurityalliance.org - February 29, 2024

In an era where data protection has become a vital concern for cloud providers, the EU Cloud Code of Conduct offers a seamless GDPR compliance solution.

A hybrid cloud is the future of cloud-native solutions for complex enterprise applications and data. Here's why.

10 Ways to Optimize Your Cloud - DevOps.com

- devops.com - February 29, 2024

Cloud optimization involves ensuring that you're not overprovisioning–or underprovisioning–your cloud computing resources.

Discover the Stealthy New Malware Targeting Telecom Networks! GTPDOOR uses GPRS Tunnelling Protocol for unseen levels of control.

Cloudflare Hacked Following Okta Compromise | CSA

- cloudsecurityalliance.org - February 29, 2024

Discover how the Cloudflare breach, stemming from the Okta compromise, underscores the critical need for holistic risk management in SaaS applications.

Happening 19 March 2024 in Paris Co-chairs: Rajas Kakodkar, Yuan Tang, and Marcin Wielgus Cloud Native AI Day aims to merge two cutting-edge domains – cloud native technologies and artificial…

Lazarus Group's latest exploit showcases unprecedented sophistication in cyber warfare, leveraging a zero-day flaw in Windows Kernel.

Cybersecurity isn't just about spending more; it's about spending smart. Discover how a risk-based approach can maximize your security ROI.

SPIKEDWINE cyber group targets European officials with sophisticated WINELOADER backdoor.

North Korean hackers infiltrated PyPI with malware-laden packages, exploiting common typos.

Two suspected China-linked cyber espionage clusters, UNC5325 and UNC3886, exploit Ivanti VPN flaws, deploying new malware.

President Biden signs Executive Order to prevent mass data transfers to 'countries of concern'. A bold move to protect Americans' genomic, biometric,

Cloud strategies and edge computing

- cncf.io - February 28, 2024

Member post originally published on Coredge's blog by Coredge Marketing Adopting cloud computing is not always a one-way path as one might think. The cloud does not have all the answers…

Calendar Meeting Links Used to Spread Mac Malware

- krebsonsecurity.com - February 28, 2024

Malicious hackers are targeting people in the cryptocurrency space in attacks that start with a link added to the target's account at Calendly, a popular free calendar application for scheduling appointments and meetings. The attackers impersonate established cryptocurrency investors and…

Safer Image Builds with Cloud Native Buildpacks and Wolfi

- thenewstack.io cloud-native - February 28, 2024

This post discusses how to create containers that are smaller and more secure by including Wolfi as the base image when creating containers using Cloud Native Buildpacks.

In this post, I'll show how you can export software bills of materials (SBOMs) for your containers by using an AWS native service, Amazon Inspector, and visualize the SBOMs through Amazon QuickSight, providing a single-pane-of-glass view of your organization's software supply chain. The concept of a bill of materials (BOM) originated in the manufacturing industry […]

Some Linkerd Users Must Pay: Fear and Anger Explained

- thenewstack.io kubernetes - February 28, 2024

There's some misunderstanding about what Buoyant's decision to charge organizations with 50 or more users for access to the stable releases of its open source service mesh actually means.

In this newsletter, guest columnist Charley Snyder, public policy expert at Google, explains our new AI initiative announced at the Munich Security Conference.

Using Private Service Connect for Apigee-GKE connectivity

- GCP containers blogs - February 28, 2024

With Private Service Connect (PSC), you can create private and secure connections from Apigee to your backend Google Kubernetes Engine (GKE) targets.

Australia Endorses Zero Trust | CSA

- cloudsecurityalliance.org - February 28, 2024

With its intention to develop a whole-of-government zero trust approach, Australia has taken a step in the right direction when it comes to cybersecurity.

Cyber espionage intensifies as UNC1549, linked to Iran, targets aerospace and defense in the Middle East.

The New Monitoring for Services That Feed from LLMs

- thenewstack.io observability - February 28, 2024

What are the new golden signals you need to follow to make sure your AI applications behave properly? Adrian Cockcroft offers answers in this episode of Makers.

You can use Amazon Security Lake to simplify log data collection and retention for Amazon Web Services (AWS) and non-AWS data sources. To make sure that you get the most out of your implementation requires proper planning. In this post, we will show you how to plan and implement a proof of concept (POC) for […]

Imagine a world where software developers build applications quickly on the cloud, focusing on innovative features, unburdened by complex infrastructure and intricate configurations. Welcome to the era of the cloud platform team. Cloud platform teams build internal tools, automation, and self-service infrastructure to free developers from commodity tasks and enable them to innovate faster. However, […]

Understanding the Ransomware Wave of 2023 | CSA

- cloudsecurityalliance.org - February 28, 2024

A concerning surge in ransomware attacks in 2023 has significantly reshaped the cybersecurity landscape.

JFrog's integration with Qwak's MLOps platform will advance collaboration between teams building and deploying software artifacts.

BlackCat ransomware returns with a vengeance, healthcare sector under fire. U.S. government warning a must-read.

How Much Testing is Too Much? - DevOps.com

- devops.com - February 28, 2024

Advances in automated testing have great potential, but there are also downsides to consider as the technology matures.

First-party data is your goldmine for deep customer insights. Learn to leverage it while staying privacy-compliant at our upcoming webinar.

Guidelines for Secure AI System Development | CSA

- cloudsecurityalliance.org - February 28, 2024

The recently released Guidelines for Secure AI System Development will assist developers of AI systems in reducing system risks before security issues arise.

Learn about the inefficiencies of perimeter-based security and the shift towards a more secure communication between users, systems, and networks.

Discover how sophisticated hackers are targeting Mexico with TimbreStealer, a new malware on the block.

Nations unite to warn against the MooBot botnet threat targeting Ubiquiti EdgeRouters.

Amazon Web Services (AWS) is pleased to announce that AWS Payment Cryptography is certified for Payment Card Industry Personal Identification Number (PCI PIN) version 3.1 and as a PCI Point-to-Point Encryption (P2PE) version 3.1 Decryption Component. With Payment Cryptography, your payment processing applications can use payment hardware security modules (HSMs) that are PCI PIN Transaction […]

Connect google cloud to on-prem and other clouds

- GCP networking blogs - February 27, 2024

Explore the Cross-Cloud Network architecture ebook and learn how Google's global scale network can support your enterprise multicloud and hybrid needs.

Introducing Security Command Center protection for Vertex AI

- GCP security blogs - February 27, 2024

Security Command Center Premium now works with organization policies to provide near real-time detection of changes to policies and to AI resource configurations.

Netflix Releases bpftop: An eBPF-Based Application Monitor

- thenewstack.io observability - February 27, 2024

Keep a real-time eye on running your eBPF programs with open source bpftop.

Amazon Web Services (AWS) is excited to announce that a new Information Security Registered Assessors Program (IRAP) report (2023 H2) is now available through AWS Artifact. An independent Australian Signals Directorate (ASD) certified IRAP assessor completed the IRAP assessment of AWS in December 2023. The new IRAP report includes an additional seven AWS services that are now assessed at the […]

Member post originally published on Bouyant's blog by Scott Rigby Progressive delivery is a vital tool for ensuring that new code is deployed safely to production with automated protections if things…

This is part two of our series on Tackling AI Together. We're looking at this new challenge/opportunity in the cloud native world and asking how we can work together – and bring in new voices – to get…

A critical flaw in LiteSpeed Cache for WordPress allows unauthenticated privilege escalation. Over 5M sites at risk

Get ready to be surprised at KubeCon + CloudNativeCon Europe 2024 because we have so many new offerings this year. Here's everything you need to know. Interested in the latest cutting edge cloud…

Departing Thoughts of the STAR Program Director | CSA

- cloudsecurityalliance.org - February 27, 2024

John DiMaria, former STAR Program Director at CSA, reflects on leading the CSA STAR program.

Midnight Blizzard | Secure Your Microsoft Environment | CSA

- cloudsecurityalliance.org - February 27, 2024

Learn the details of the Midnight Blizzard attack on Microsoft's Entra environment, one of the most sophisticated attacks seen on similar platforms.

Amazon Web Services (AWS) was recognized by KuppingerCole Analysts AG as an Overall Leader in the firm's Leadership Compass report for Policy Based Access Management. The Leadership Compass report reveals Amazon Verified Permissions as an Overall Leader (as shown in Figure 1), a Product Leader for functional strength, and an Innovation Leader for open source […]

Because of the critical nature of the DevOps pipeline, security is becoming a top priority. Here's how to integrate DevSecOps.

Xeno RAT, a new player in the malware scene, boasts alarming features for remote system exploitation. Learn more about its impact on Windows systems.

TsFile: A Standard Format for IoT Time Series Data

- thenewstack.io storage - February 27, 2024

The columnar storage file format is designed for IoT's unique needs, including reduced network transmission and cloud computing resources.

A no shift strategy argues for developing and testing directly in production, bypassing the traditional dev-to-production delivery pipeline.

What is Azure Policy? All You Need to Know | CSA

- cloudsecurityalliance.org - February 27, 2024

Azure Policy is a service within Microsoft Azure that allows organizations to create, assign, and manage policies and is used for resource consistency and regulatory compliance.

Alert overload is a critical challenge for SOC professionals. Learn how threat intelligence platforms can streamline investigations and bolster cybers

Hugging Face vulnerability allows attackers to hijack machine learning models.

Russian hackers target cloud infrastructure. Learn their tactics & how to defend yourself.

Improving Developer Experience Drives Profitability

- thenewstack.io devops - February 27, 2024

It's proven! Learn how and why an investment in developer experience — DevEx — is an investment in innovation and profit.

A critical security flaw (CVE-2024-1071) in the WordPress plugin Ultimate Member has been disclosed, affecting over 200,000 active installations.

The management of security services across organizations has evolved over the years, and can vary depending on the size of your organization, the type of industry, the number of services to be administered, and compliance regulations and legislation. When compliance standards require you to set up scoped administrative control of event monitoring and auditing, we […]

How to Deploy GitLab Server Using Docker and Ubuntu

- thenewstack.io containers - February 26, 2024

Have you ever wanted to host your own GitLab repositories? With the help of both Ubuntu Server and Docker, you can do just that.

How to use Regional AWS STS endpoints | Amazon Web Services

- AWS security blogs - February 26, 2024

This blog post provides recommendations that you can use to help improve resiliency in the unlikely event of disrupted availability of the global (now legacy) AWS Security Token Service (AWS STS) endpoint. Although the global (legacy) AWS STS endpoint https://sts.amazonaws.com is highly available, it's hosted in a single AWS Region—US East (N. Virginia)—and like other […]

The Community AWS re:invent 2023 re:caps continue! Recently, I was invited to participate in one of these events hosted by the AWS User Group Kenya, and was able to learn and spend time with this amazing community. AWS User Group Kenya Last week's launches Here are some launches that got my attention during the previous […]

New internal range API simplifies IP address management

- GCP networking blogs - February 26, 2024

The new internal range API lets you allocate subnets from a free address range within your VPC, and reserve or protect internal or external ranges.

5 Steps to Fortify Against Cyber Liabilities | CSA

- cloudsecurityalliance.org - February 26, 2024

In the face of rising cyberthreats, organizations must treat cybersecurity as a business issue and take proactive measures to protect themselves.

Akeyless Wants You to Throw Away the Encryption Key

- thenewstack.io devops - February 26, 2024

With Akeyless DFC, encryption keys are created as distributed fragments in the cloud. This means there's no key and, thus, no vault to manage.

Ukrainian entities in Finland targeted in a malicious campaign distributing Remcos RAT using IDAT Loader.

We continue to expand the scope of our assurance programs at Amazon Web Services (AWS) and are pleased to announce the first ever Winter 2023 AWS System and Organization Controls (SOC) 1 report. The new Winter SOC report demonstrates our continuous commitment to adhere to the heightened expectations for cloud service providers. The report covers […]

Today, I am happy to announce that we are working on an AWS Region in Mexico. This AWS Mexico (Central) Region will be the second Region in Latin America joining the AWS South America (São Paulo) Region and will give AWS customers the ability to run workloads and store data that must remain in-country. Mexico […]

Over 8,000 subdomains belonging to recognized brands and organizations are being exploited for malicious email distribution.

How to Find Hidden Certificates in Your Organization | CSA

- cloudsecurityalliance.org - February 26, 2024

An effective certificate lifecycle management (CLM) solution must provide multiple mechanisms to discover certificates.

Let's explore the impact of generative AI in key DevOps roles and explain how to prepare ourselves for the shift.

Fake npm packages linked to North Korea threaten software supply chain. Read on for details and protection tips.

CheerpJ 3.0: Run Apps in the Browser with WebAssembly

- thenewstack.io cloud-native - February 26, 2024

CheerpJ 3.0 represents a significant advancement in deploying applications in the browser with WebAssembly, particularly with Java.

Brea, California, February 26th, 2024, CyberwireThe current large surge in cyber threats has left many organizations grappling for security so

Five Great DevOps Job Opportunities - DevOps.com

- devops.com - February 26, 2024

Looking for a great new DevOps job? Check out these available opportunities at Stanford University, Northrop Grumman and more!

What is the Payment Card Industry Data Security Standard? | CSA

- cloudsecurityalliance.org - February 26, 2024

PCI DSS exists as a crucial framework for protecting sensitive data. Explore its significance, requirements, business impact, and what to expect when complying.

Three Tips to Protect Your Secrets from AI Accidents

- thehackernews.com - February 26, 2024

Over 10 million secrets were exposed in public GitHub commits last year alone. Are your secrets safe? Learn how to protect your data in the age of AI.

Build VMs on Mac M1/M2 with Vagrant & VMware Fusion

- devopscube.com - February 26, 2024

MAC silicon M1/M2 chips use ARM architecture which is different from x86 used by Intel processors. The only

Cybersecurity experts uncover a surge in phishing attacks using Google Cloud Run to distribute banking malware across LATAM and Europe.

LockBit ransomware group resurfaces after law enforcement takedown, claims FBI 'hacked' their infrastructure and leaked information.

Samba Network Shares for RHEL-Based Linux Distributions

- thenewstack.io operations - February 25, 2024

At some point, you're going to have a Linux server that includes directories that clients need to access from your network. Your best bet for this is Samba.

DEVOPS WEEKLY ISSUE #686 - 25th February 2024

- devopsweeklyarchive.com - February 25, 2024

Configuration management, long term support, data management, monitoring and testing this week. The breadth of challenges in modern operations is always interesting, and while some are evergreen, the tools and approaches to solving are constantly evolving.

In a dramatic turn of events, LockBitSupp, a key figure in the notorious LockBit ransomware operation, is reportedly cooperating with law enforcement.

The FBI's takedown of the LockBit ransomware group last week came as LockBit was preparing to release sensitive data stolen from government computer systems in Fulton County, Ga. But LockBit is now regrouping, and the gang says it will publish…

SRE Weekly Issue #413 – SRE WEEKLY

- sreweekly.com - February 25, 2024

This article discusses building failure management directly into our systems, using Erlang as a case study.

Microsoft has expanded free logging capabilities to all U.S. federal agencies using Microsoft Purview Audit.

Running distributed machine learning (ML) workloads on Amazon Elastic Container Service (Amazon ECS) allows ML teams to focus on creating, training and deploying models, rather than spending time managing the container orchestration engine. With a simple architecture, control plane transparent upgrades, and native AWS Identity and Access Management (IAM) authentication, Amazon ECS provides a great environment […]

Introduction AWS Service Catalog and AWS CloudFormation now support Git-sync capabilities to allow Platform Engineers to streamline their DevOps processes by keeping their Infrastructure as Code (IaC) templates in their source control libraries like GitHub and BitBucket. These enhancements help Platform Engineers to more effectively create, version, and manage their Well-Architected patterns with application teams […]

This post is co-written with Suraj Nair, Sr. DevOps Engineer at Grover. Introduction Grover is a Berlin based global leader in technology rentals, enabling people and empowering businesses to subscribe to tech products monthly instead of buying them. As a pioneer in the circular economy, Grover's business model of renting out and refurbishing tech products results […]

Q&A: Pulumi's Joe Duffy on the Renaissance of Infrastructure as Code

- thenewstack.io operations - February 23, 2024

Infrastructure as Code (IaC) is hot again. Organizations are realizing that their complex system deployments should be repeatable, in that

Troubleshooting often involves complex analysis across fragmented telemetry data. While alarms on metrics can signal high-level deviations, deeper context often resides in other areas such as log messages, which help uncover the root cause. This disjointed approach not only consumes time and effort, but also inflates telemetry costs. In this post, we'll showcase how structured […]

Member post originally published on Logz.io's blog by Dotan Horovits In the labyrinth of IT systems, logging is a fundamental beacon guiding operational stability, troubleshooting, and security.

Many customers run their mission critical container workloads on Amazon Web Services (AWS) using Amazon Elastic Kubernetes Service (Amazon EKS). One of the key focus areas for them is to analyze and act on operational events quickly. Getting real-time visibility into performance issues, traffic spikes and infrastructure events can enable teams to quickly address issues and […]

Dell updated its edge computing platform to make it simpler to programmatically provision infrastructure using DevOps best practices.

Mistral AI, an AI company based in France, is on a mission to elevate publicly available models to state-of-the-art performance. They specialize in creating fast and secure large language models (LLMs) that can be used for various tasks, from chatbots to code generation. We're pleased to announce that two high-performing Mistral AI models, Mistral 7B […]

Dormant Python package compromised on PyPI. Update pushed Nova Sentinel malware.

Tips for troubleshooting Private Service Connect

- GCP networking blogs - February 23, 2024

Before reaching out to Cloud Support, check out this post for useful tips on tackling issues related to Private Service Connect.

There are no simple solutions to securing cloud credentials, but one way to get started is to stop using service account keys. Here's how.

When building API-based web applications in the cloud, there are two main types of communication flow in which identity is an integral consideration: User-to-Service communication: Authenticate and authorize users to communicate with application services and APIs Service-to-Service communication: Authenticate and authorize application services to talk to each other To design an authentication and authorization solution for these […]

Who Owns Information in the Era of AI? | CSA

- cloudsecurityalliance.org - February 23, 2024

The advent of AI tools introduces a new dynamic to concerns over intellectual property theft.

Supply Chain Attacks: Non-Human Identities & TPRM Failure | CSA

- cloudsecurityalliance.org - February 23, 2024

Deep dive into the non-human identities attack surface, how it's created, how attackers exploit it, and what steps you can take to minimize your exposure now.

To avoid data loss and maintain a level of protection, organizations need a blueprint for adopting their hybrid cloud systems.

It probably doesn't get any better than Paris in the spring, but throw in the cloud native community, and… c'est magnifique! To make sure we all get the absolute most out of Paris, we asked our local…

AWS Cost Management in 2024 - DevOps.com

- devops.com - February 23, 2024

As businesses scale and diversify AWS services, it's crucial to manage costs to ensure cloud spending aligns with strategic objectives.

Microsoft releases PyRIT, an automation tool designed to proactively identify risks and ethical concerns in Generative AI systems, including security

How to Use Tines's SOC Automation Capability Matrix

- thehackernews.com - February 23, 2024

SOC Automation Capability Matrix revolutionizes how teams respond to incidents. Discover a new era of cybersecurity! Dive in for a transformative appr

3 Critical Steps for Application Security Teams | CSA

- cloudsecurityalliance.org - February 23, 2024

Heading into 2024, application security teams should keep in mind these key issues and steps to defend their custom software applications.

Happening on 19 March 2024 in Paris Co-chairs: Helen Greul, Balaji Sivasumbramanian, Waldir Montoya BackstageCon is the event that showcases platform engineering, a white hot space today.

A high-severity flaw in Apple's Shortcuts could expose your data without consent! Learn how Apple patched this with iOS 17.3 and more.

FTC fined Avast $16.5 million for deceptively collecting and selling users' browsing data.

The latest version of the AWS HITRUST Shared Responsibility Matrix (SRM)—SRM version 1.4.2—is now available. To request a copy, choose SRM version 1.4.2 from the HITRUST website. SRM version 1.4.2 adds support for the HITRUST Common Security Framework (CSF) v11.2 assessments in addition to continued support for previous versions of HITRUST CSF assessments v9.1–v11.2. As […]

This post is written by Beau Gosse, Senior Software Engineer and Paras Jain, Senior Technical Account Manager. AWS Lambda now supports .NET 8 as both a managed runtime and container base image. With this release, Lambda developers can benefit from .NET 8 features including API enhancements, improved Native Ahead of Time (Native AOT) support, and […]

Users face challenges in their digital transformation journey involving the migration of data across various platforms, on-premises file systems, and other cloud services. When using other cloud providers, scenarios arise where the seamless transfer of data becomes essential. Whether executing a one-time data transfer or integrating it into a scheduled workflow, minimizing business downtime is […]

The AWS Global Security & Compliance Acceleration (GSCA) Program has released AWS Customer Compliance Guides (CCGs) on the AWS Compliance Resources page to help customers, AWS Partners, and assessors quickly understand how industry-leading compliance frameworks map to AWS service documentation and security best practices. CCGs offer security guidance mapped to 16 different compliance frameworks for more than […]

5 Tips for Developer-Friendly DevSecOps

- thenewstack.io operations - February 22, 2024

Here are five tips to enhance the DevSecOps experience for developers, focused on making security tools more usable to unlock faster releases of more secure products.

Apple's iMessage is getting a major security boost with PQ3, the 'strongest' post-quantum encryption yet

Looking back at 2023, the Mandiant Managed Defense team highlights key observations from its cybersecurity engagements.

When Will Cybersecurity Place Greater Trust in AI? | CSA

- cloudsecurityalliance.org - February 22, 2024

In 2023, AI adoption rates soared for LLMs. Many industries are incorporating AI into common processes (healthcare and autonomous driving). What about cybersecurity?

Users face challenges in their digital transformation journey involving the migration of data across various platforms, on-premises file systems, and other cloud services. When using other cloud providers, scenarios arise where the seamless transfer of data becomes essential. Whether executing a one-time data transfer or integrating it into a scheduled workflow, minimizing business downtime is […]

Tabnine's generative AI testing platform can make more accurate and personalized recommendations based on engineering patterns.

EDA and the adoption of event streaming throughout enterprises are essential architectural requirements, but can introduce complexity.

Staff post by Chris Aniszczyk We are happy to announce Poster Pavilion sessions, which will debut at the upcoming KubeCon + CloudNativeCon Europe in Paris next month. Post sessions are a unique…

New Leak Shows Business Side of China's APT Menace

- krebsonsecurity.com - February 22, 2024

A new data leak that appears to have come from one of China's top private cybersecurity firms provides a rare glimpse into the commercial side of China's many state-sponsored hacking groups. Experts say the leak illustrates how Chinese government agencies…

5 Takeaways from a CISO Focus Group: Security & Compliance | CSA

- cloudsecurityalliance.org - February 22, 2024

Security AND compliance have become central to success. Delve into 5 key takeaways on navigating risk and compliance, new evidence-collection approaches, and more.

By leveraging modern build health tools, DevOps teams can more effectively monitor a project's overall quality and performance.

A tool intended for security, SSH-Snake, now aids attackers in exploiting networks. Discover the depths of its reach and how to safeguard your infrast

Russian government software compromised in suspected North Korean cyberattack. Konni RAT backdoor discovered in Ministry of Foreign Affairs tool.

A New Age of Hacktivism

- thehackernews.com - February 22, 2024

Hacktivism is reshaping the battlefield in the digital era, merging cyber tactics with political activism. Discover how this trend is influencing geop

U.S. State Department has set rewards of up to $15 million for information leading to the identification and arrest of LockBit ransomware group member

Member post originally published on Nirmata's blog by Anusha Hegde As Infrastructure as Code (IaC) continues to gain popularity among DevOps practitioners for its efficiency and scalability…

Member post originally published on Last9's blog by Aniket Rao Here's a detailed blog post on monitoring Cloudflare Workers using Prometheus Exporter. We discuss the data flow of how Prometheus…

Cost is top of mind for many enterprises, and building awareness of different cost contributors is the first step toward managing costs and improving efficiency. Costs for transferring data may segregate into common but low cost and less frequent but higher cost groups. Data about these two groups is mixed together, and separating them enables […]

Buoyant Revises Release Model for the Linkerd Service Mesh

- thenewstack.io operations - February 21, 2024

Starting in May, if you want a fully-compiled version of the open Linkerd to download and run, you will have to go with Buoyant's commercial distribution.

2024 Streaming Roadmap: Navigating the Real-Time Revolution

- thenewstack.io operations - February 21, 2024

Overcoming batch-oriented architectures and embracing the advantages of streaming data are foundational to robust AI deployments.

Pulumi Templates for GenAI Stacks: Pinecone, LangChain First

- thenewstack.io observability - February 21, 2024

The AI professional, who may not have operations experience, can define and orchestrate an ML stack, using Python or another language of their choice.

You can use open-source runtime security platform Falco with Google Kubernetes Engine to monitor cluster and container workload security. Here's how.

Recent performance testing of the Aeron messaging framework by Adaptive demonstrates Google Cloud's fitness for running digital exchanges.

Two new Arm processors increase the performance-per-socket provided by 50% and performance-per-watt provided by 20%, respectively.

Together with Linux Foundation Training and Certification and the Continuous Delivery Foundation, we are happy to announce the GitOps Associate (CGOA) certification, designed for DevOps engineers and…

Millions of Android, Linux, and ChromeOS devices are vulnerable new Wi-Fi attacks! Hackers can steal data or spy on you.

From Security Evolution to Generative AI: A Q&A | CSA

- cloudsecurityalliance.org - February 21, 2024

Lacework sat down with Rahul Gupta, Head of GRC at Sigma Computing, to discuss the evolving security industry, generative AI in cybersecurity, and more.

Microsoft is expanding our cloud infrastructure, in Europe, to support the growing demand for cloud services. Learn more.

seThis post is written by Eder de Mattos, Sr. Cloud Security Consultant, AWS and Fernando Galves, Outpost Solutions Architect, AWS. In this post, you will learn how to deploy an Amazon EMR cluster on AWS Outposts and use it to process data from an on-premises database. Many organizations have regulatory, contractual, or corporate policy requirements […]

Organizations can maintain their DevOps momentum while protecting the software supply chain by shifting security left.

Cycode's generative AI capabilities in its ASPM platform make it simpler for DevSecOps teams to identify the root cause of vulnerabilities.

What's Required After My First SOC 2 Report? | CSA

- cloudsecurityalliance.org - February 21, 2024

Understanding SOC 2 Compliance: Comparing Insights from Industry Experts and ChatGPT.

Techstrong Research finds the imperative to secure the software supply chain and CI/CD pipelines is undeniable and urgent.

Mustang Panda escalates cyber espionage in Asia with advanced DOPLUGS malware. Discover how this China-linked group targets nations with sophisticated

DevOps: What's the End Goal? - DevOps.com

- devops.com - February 21, 2024

Don MacVittie asks the existential question: What, exactly, are we trying to achieve through DevOps' integration with AI?

6 Ways to Simplify SaaS Identity Governance

- thehackernews.com - February 21, 2024

With the explosion of SaaS applications in most orgs, identity governance tasks can easily overwhelm the IT team. Learn how to automate many of these

AI & Software Security: Implement AI Successfully | CSA

- cloudsecurityalliance.org - February 21, 2024

Explore causes for caution when using AI, cases for optimism, and recommendations to build a successful and responsible AI adoption strategy.

Cybercriminals are targeting healthcare, exploiting vulnerabilities for huge ransoms. It's not just data at stake; it's patient care.

VietCredCare targets Facebook advertisers in Vietnam, hijacking accounts with positive Meta ad credits.

Signal rolls out usernames, ditch those phone numbers for added security.

VMware has identified a critical security flaw in its Enhanced Authentication Plugin (EAP), urging users to uninstall it.

Cybersecurity experts uncover a Russia-aligned cyber operation targeting Ukraine with disinformation.

One of the primary benefits of using memory mapping (MMAP) in applications is saving memory on the client, sharing data amongst multiple threads and processes, and reducing file system impact to the application. Users are constantly looking for ways to improve application performance, and often this means diving deep into their workloads' storage profiles to […]

U.S. and U.K. authorities have seized the darknet websites run by LockBit, a prolific and destructive ransomware group that has claimed more than 2,000 victims worldwide and extorted over $120 million in payments. Instead of listing data stolen from ransomware…

Generative AI capabilities in Skillsoft's Codecademy training platform will give developers hands-on experience using ChatGPT to write code.

Happening on 19 March 2024 in Paris Co-chairs: Austin Parker and Eduardo Silva Observability Day Europe is an exciting reminder that the cloud native ecosystem has grown to be more than Kubernetes.

The Top 5 Kubernetes Security Mistakes You're Probably Making

- thenewstack.io kubernetes - February 20, 2024

Exploring some of the major perils associated with Kubernetes runtime security.

Managed Instance Groups' (MIG) new standby pool feature lets you pause and resume VMs to reduce costs, or to respond faster to increased load.

Project post originally published on Istio's blog by Ben Leggett, Yuval Kohavi, and Lin Sun The Istio project announced ambient mesh – its new sidecar-less dataplane mode in 2022…

Trust Model: The First Step to Ensure Your IT Network | CSA

- cloudsecurityalliance.org - February 20, 2024

Master Zero Trust security with our guide on verification, least privilege, and breach assumption strategies for robust network protection.

Announcing the preview of Azure Storage Actions, a fully managed platform that helps you automate data management tasks. Learn more.

A novel malware named Migo targets Redis servers for cryptojacking. It disables security measures, injects XMRig miner, and hides processes.

Malicious packages lurking in open-source repositories. Discover how DLL side-loading is the latest technique used to evade security software.

CVE-2023-38545: High Severity cURL Vulnerability | CSA

- cloudsecurityalliance.org - February 20, 2024

A new version of curl (8.4.0) fixes a couple of vulnerabilities. Learn about CVE-2023-38545, how it is exploited, and how to detect it.

Generative AI is revolutionizing the way we create testing environments and feature management within DevOps workflows.

National Crime Agency (NCA) conducted Operation Cronos, obtaining LockBit's source code and intelligence about its operations and affiliates.

Generative AI provides a competitive edge, enabling superior digital experiences, innovative products and services and proactive responses.

AI in the SOC: Efficiency Without Replacing Human Expertise | CSA

- cloudsecurityalliance.org - February 20, 2024

Discover how AI is revolutionizing Security Operations Centers (SOCs) by enhancing efficiency and effectiveness while preserving the invaluable expertise of human analysts.

ConnectWise has released software updates to address two security flaws in its ScreenConnect remote desktop and access software.

Join us for an exclusive webinar dissecting real-life response strategies to the impactful exploits of the Scattered Spider threat group.

North Korean Hackers Target Defense Sector! Learn how state-sponsored actors employ sophisticated techniques via LinkedIn job scams.

SaaS Compliance through the NIST Cybersecurity Framework

- thehackernews.com - February 20, 2024

Strengthen your SaaS security like a pro! Discover how aligning with NIST standards can fortify your applications against cyber threats.

Critical flaw in Bricks WordPress theme allows hackers to execute arbitrary code.

Law enforcement from 11 countries seized LockBit's darknet domains, dealing a major blow to their operations.

Destructive malware, targeted phishing... new report analyzes sophisticated attacks deployed alongside Israel-Hamas war. This is the evolving face of

This post clarifies a few basic concepts around public key infrastructure, including CA tier, topology and what's in a X.509 certificate.

Introduction Today customers want to reduce manual operations for deploying and maintaining their infrastructure. The recommended method to deploy and manage infrastructure on AWS is to follow Infrastructure-As-Code (IaC) model using tools like AWS CloudFormation, AWS Cloud Development Kit (AWS CDK) or Terraform. One of the critical components in terraform is managing the state file which […]

Many customers building applications on Amazon Web Services (AWS) use Stripe global payment services to help get their product out faster and grow revenue, especially in the internet economy. It's critical for customers to securely and properly handle the credentials used to authenticate with Stripe services. Much like your AWS API keys, which enable access […]

Over the past week, our service teams have continued to innovate on your behalf, and a lot has happened in the Amazon Web Services (AWS) universe that I want to tell you about. I'll also share about all the AWS Community events and initiatives that are happening around the world. Let's dive in! Last week's […]

ClickHouse: Scaling Log Management with Managed Services

- thenewstack.io operations - February 19, 2024

Managed solutions, involving technologies like ClickHouse, signify a transition to more sophisticated data analysis techniques in observability.

Analysis of Xline Jepsen tests

- cncf.io - February 19, 2024

Member post by DatenLord In this article, we will mainly introduce the application of Jepsen in the testing of a distributed KV storage Xline. This includes an introduction to the chaos engineering…

NGINX Melds Open Source Tools into an Enterprise Platform

- thenewstack.io operations - February 19, 2024

NGINX introduced NGINX One, its new platform to help organizations to scale efficiently, ensure apps stay available, and keep the enterprise running smoothly and securely.

This post was co-authored by Cezar Guimarães, Sr. Software Engineer, VTEX Introduction Customers across the globe are increasingly adopting Amazon Elastic Kubernetes Service (Amazon EKS) to run their Windows workloads. This is a result of customers figuring out that refactoring existing Windows-based applications into an open-source environment, while ideal, is a very complex task. It […]

1. Introduction Migration Evaluator is a complimentary migration assessment service that helps customers to create a data-driven directional business case for migrating workloads to AWS. It includes a data collection tool that discovers server workloads running on-premises, along with their utilization patterns. Data from the Migration Evaluator collector needs to be received by the AWS […]

The roles of artificial intelligence (AI) and machine learning (ML) and their adoption across the mainframe will continue to grow.

Meta uncovers a range of international spyware firms are actively targeting users across iOS, Android, and Windows devices.

Five Great DevOps Job Opportunities - DevOps.com

- devops.com - February 19, 2024

Looking for a great new DevOps job? Check out these available opportunities at DISH, Autodesk, Zscaler and more!

How to Achieve the Best Risk-Based Alerting (Bye-Bye SIEM)

- thehackernews.com - February 19, 2024

Did you know that Network Detection and Response (NDR) has become the most effective technology to detect cyber threats?

Anatsa Android banking trojan expands to Slovakia, Slovenia, Czechia.

A new cyberespionage campaign has targeted over 80 organizations in Europe, exploiting vulnerabilities in Roundcube webmail servers.

The Iranian cyberespionage group Charming Kitten is using fake webinars and a new 'BASICSTAR' backdoor to target experts in Middle Eastern policy.

SRE Weekly Issue #412 – SRE WEEKLY

- sreweekly.com - February 18, 2024

Can a single dashboard to cover your entire system really exist?

GopherCon's First Capture-the-Flag Challenge

- thenewstack.io operations - February 18, 2024

How one longtime GopherCon attendee of gave back to the event, creating a game that captures the curiosity and positive vibes of the GoLang crowd.

DEVOPS WEEKLY ISSUE #685 - 18th February 2024

- devopsweeklyarchive.com - February 18, 2024

Incident postmortems, Git best practices, tips for management open telemetry names and tools and posts on open source software supply chain security this week.

Ukrainian cybercriminal pleads guilty to masterminding Zeus and IcedID malware schemes, infecting thousands of computers worldwide.

The Cloud Controls Matrix and Consensus Assessment Initiative

- cloudsecurityalliance.org - February 17, 2024

Two essential cloud computing tools are the CSA CCM and CAIQ. Get answers to some frequently asked questions about them.

Linux: Limit Concurrent Users on Your Server with SSH

- thenewstack.io operations - February 17, 2024

Limit the number of concurrent sessions that your server will accept with these handy SSH configuration settings.

Google open sources Magika, an AI-powered tool that boosts file type identification accuracy by 30%, helping defenders more easily identify malicious

Cybersecurity breaches are on the rise! Learn why safeguarding your business communication channels is more crucial than ever. Read more

What if everybody did everything right?

- surfingcomplexity.blog - February 17, 2024

In the wake of an incident, we want to answer the questions "What happened?" and, afterwards, "What should we do differently going forward?" Invariably, this leads to people…

Project post originally published on Kyverno's blog Service meshes are all too common these days in Kubernetes with some platforms even building them into clusters by default. Service meshes are no…

Q&A: Cockroach Labs' Spencer Kimball on Distributing SQL

- thenewstack.io cloud-native - February 16, 2024

How watching Google evolve distributed transactional databases inspired three engineers to bring these innovations to the enterprise.

AWS Network Firewall is a stateful managed network firewall and intrusion detection and prevention service designed for the Amazon Virtual Private Cloud (Amazon VPC). This post concentrates on automating rule updates in a central Network Firewall by using distributed firewall configurations. If you're new to Network Firewall or seeking a technical background on rule management, […]

GovMarket is a new digital marketplace that can help drive innovation in procurement for public institutions in Germany. Here's how.

Introduction A security or data breach can lead to both financial and reputational losses. Maintaining security and compliance is a shared responsibility between AWS and you (our customer), where AWS is responsible for "Security of the Cloud" and you are responsible for "Security in the Cloud". However, security in the cloud has a much bigger […]

A critical vulnerability (CVE-2020-3259) in Cisco ASA and FTD software has been added to CISA's KEV catalog.

Book Introduction: Generative AI Security Theories | CSA

- cloudsecurityalliance.org - February 16, 2024

The book “Generative AI Security: Theories and Practices” is a practical exploration of real-world GenAI security challenges.

Learn how organizations can maintain existing VMware skills and operational processes and leverage Azure cloud services to modernize their applications.

A new macOS backdoor dubbed "RustDoor" is targeting cryptocurrency companies.

Data Governance in the Cloud | CSA

- cloudsecurityalliance.org - February 16, 2024

Discover why mastering data governance is crucial for your organization's digital transformation and cloud computing success.

ReversingLabs launched a binary analysis tool that uses machine learning algorithms to identify risks before and after apps are deployed.

DevOps teams should consider a number of different strategies to ensure apps remain efficient and portable across various chip architectures.

Developers can guide AI to create the kind of clean, secure, reliable code that aids businesses rather than creating costly problems for them.

Zero Trust Messaging Needs a Reboot | CSA

- cloudsecurityalliance.org - February 16, 2024

Explore why Zero Trust lags in adoption despite its benefits, and how cloud platforms offer a practical path forward for organizations.

Why We Must Democratize Cybersecurity

- thehackernews.com - February 16, 2024

Cybersecurity breaches are not just a concern for big companies anymore. Learn how NTT Security is bridging the gap, making cybersecurity accessible

A malicious Python script allowing cybercriminals to launch SMS phishing attacks via AWS SNS

Cybersecurity breach in a state government organization! Former employee's account exploited, highlighting critical security gaps.

U.S. government disrupted a botnet comprised of SOHO routers used by the Russia-linked APT28 group for malicious activities.

How to Learn Git for DevOps: Beginners Git Roadmap

- devopscube.com - February 16, 2024

As a DevOps engineer, learning core git concepts is very essential. In this blog, I will talk about

This post is co-written with Rivlin Pereira, Staff DevOps Engineer at VMware Introduction VMware Tanzu CloudHealth is the cloud cost management platform of choice for more than 20,000 organizations worldwide that rely on it to optimize and govern the largest and most complex multi-cloud environments. In this post, we will talk about how VMware Tanzu […]

CISO Phil Venables explores the research and insights from the latest Google Cloud Threat Horizons report.

Happening on 19 March 2024 in Paris Co-chairs: Dan Garfield, Christian Hernandez, Carlos Santana ArgoCon is the best place to meet Argo maintainers and fellow end users to swap stories, strategies…

KCD post by Daniel Drack In the dynamic realm of cloud technology, the Kubernetes Community Days (KCD) Austria 2023 stood as a beacon, showcasing the vibrant potential of cloud-native solutions.

TAG post originally published on Github by TAG Storage NOTE: this document is available via this link: https://bit.ly/cncf-cloud-native-DR The purpose of this document is to introduce a new way of…

Microsoft Midnight Blizzard Breach: SaaS Security Alert | CSA

- cloudsecurityalliance.org - February 15, 2024

Explore essential defenses and insights from the Midnight Blizzard breach to protect your organization against emerging cyber threats. A guide for strengthening SaaS security.

LinkedIn Open Sources Interactive Debugger for K8s AI Pipelines

- thenewstack.io kubernetes - February 15, 2024

Based on Lyft's Flyte Kubernetes scheduler, FlyteInteractive connects with VSCode Server inside Kubernetes pods to access resources and large-scale data on the grid.

Russia hackers are using a new backdoor called TinyTurla-NG in a campaign targeting Polish non-governmental organizations

The fifth epoch of distributed computing

- GCP compute blogs - February 15, 2024

Through the history of computing, we have moved through four major transitions, or “epochs,” and are entering the fifth.

Ivanti Pulse Secure runs on an outdated version of Linux, underscoring the challenges of keeping software supply chains secure.

The Return of the Notorious Qakbot Threat Campaign | CSA

- cloudsecurityalliance.org - February 15, 2024

The QakBot cyberthreat is making a comeback. Bad actors are using QakBot's old tricks in a new phishing campaign.

Generative AI can go to many places that AIOps could never and provides a general-purpose approach that can be applied in many different ways.

Under an early access program, ngrok announced it has made available an API gateway that can be consumed as a service.

Generative AI's main impact on software development will be reducing mundane tasks and giving developers more time to innovate.

2023's cyber attacks put SaaS vulnerabilities in the spotlight. Find out why SaaS is the new supply chain and how to safeguard your organization.

Addressing Microsoft Teams Phishing Threats | CSA

- cloudsecurityalliance.org - February 15, 2024

AT&T Cybersecurity discovered phishing attacks conducted over Microsoft Teams. Here are actionable remediation steps to fortify your organization.

Traefik Proxy v3 Adds WebAssembly and Kubernetes Gateway API Support

- thenewstack.io kubernetes - February 15, 2024

The open source reverse proxy and load balancing software also now offers support for Open Telemetry.

Will Generative AI Kill DevSecOps?

- thenewstack.io devops - February 15, 2024

GenAI isn't going to run DevSecOps off, but it certainly is making them run down. How can security teams keep up with this speed of code?

Chinese-speaking cybercrime group behind sophisticated banking trojans like GoldPickaxe is targeting iOS and Android users.

A newly discovered privilege escalation vulnerability (CVE-2024-21410) in Microsoft Exchange Server is being actively exploited.

AWS Config advanced queries provide a SQL-based querying interface to retrieve resource configuration metadata of AWS resources and identify resource compliance state. You can use AWS Config advanced queries in a single AWS Account and Region or in a multi-account and cross-region setup with AWS Config configuration aggregators. Writing queries requires you to know SQL […]

Veracode's analysis found that, in more than a million applications, 42% contained flaws that remained unfixed for longer than a year.

CNCF-Approved Strimzi Eases Apache Kafka onto K8s Clusters

- thenewstack.io operations - February 14, 2024

With a set of operators, Strimzi extends the Kubernetes API in order to provide a native way to interact with Kafka.

U.S. Internet Leaked Years of Internal, Customer Emails

- krebsonsecurity.com - February 14, 2024

The Minnesota-based Internet provider U.S. Internet Corp. has a business unit called Securence, which specializes in providing filtered, secure email services to businesses, educational institutions and government agencies worldwide. But until it was notified last week, U.S. Internet was publishing…

Migration of in-tree volumes to CSI provisioned volumes

- GCP containers blogs - February 14, 2024

Embark on the migration journey from in-tree volumes to CSI-provisioned volumes for enhanced storage management. Check out the provided instructions in this blog if your GKE cluster still utilizes in-tree volumes.

Over time, Enterprises may need to undertake operations or make modifications to their data as part of general data management, to address changing business needs, or to comply with evolving data-management regulations and best practices. As datasets being generated, stored, and analyzed continue to grow exponentially, the need for simplified, scalable, and reproduceable data management […]

Many AWS customers use consolidated billing, and often need to allocate costs across their internal business units or accounts. This can be challenging when dealing with services that are shared by all accounts. For general chargebacks, some customers use cost allocation tags for this purpose. However, at the time of writing this post, there is […]

Policy-as-Code in the software supply chain

- cncf.io - February 14, 2024

TAG post by members of TAG security including Marina Moore, Michael Lieberman, John Kjell, James Carnegie, and Luca Bandini Software supply chain policy describes the required components and processes…

Ambassador Post originally published on a personal blog by BMK Lakshminarayanan In the ever-evolving landscape of cloud-native technologies, the journey through innovation, community building…

Major hacking groups tied to Russia, China, North Korea, and Iran are testing AI tools to boost their cyberwarfare.

Cybersecurity researchers have identified a vulnerability in the command-not-found utility on Ubuntu systems.

Strategic Cybersecurity: Navigating SEC Regulations | CSA

- cloudsecurityalliance.org - February 14, 2024

SEC charges against SolarWinds highlight the critical role of CISOs, raising questions on compliance and transparent cyber defense strategies.

A JumpCloud survey revealed IT pros are excited about the potential positives of AI, but also realize the negative security implications.

Many API attacks are effectively zero-day, novel attacks that exploit recent and unique changes to specific APIs. Here's how to stop them.

Data Gravity Will Remain an Issue - DevOps.com

- devops.com - February 14, 2024

Don MacVittie explains we're in the 'dream world' of data - where the cloud-native stack realizes the dream of portable programming.

Small banks are facing big threats in the cyber landscape. With limited resources, how can they protect customer data and assets from sophisticated cy

Preparing for Post-Quantum Cryptography | CSA

- cloudsecurityalliance.org - February 14, 2024

From ENIAC to quantum: the evolution of computing power revolutionizes industries but prompts post-quantum security measures against sophisticated threats.

Bumblebee, QakBot, Zloader, & PikaBot are back, sneakier than ever. Don't trust those shady emails or downloads.

Cybercriminals exploit a zero-day flaw in Microsoft Defender SmartScreen to target financial traders with sophisticated malware!

Microsoft's latest Patch Tuesday tackles 73 vulnerabilities, including actively exploited zero-days.

Fat Patch Tuesday, February 2024 Edition

- krebsonsecurity.com - February 13, 2024

Microsoft Corp. today pushed software updates to plug more than 70 security holes in its Windows operating systems and related products, including two zero-day vulnerabilities that are already being exploited in active attacks.

Legit Security updated its ASPM platform with the ability to detect when developers use generative AI tools to write code.

Akamai's Gecko initiative promises to make it simpler to centrally manage and deploy application workloads on edge computing platforms.

The BMW Group (BMW) is a global manufacturer of premium automobiles and motorcycles, covering the brands BMW, BMW Motorrad, MINI, and Rolls-Royce. Since 2022, BMW has started using AWS to scale its capacity to handle vast increases in needed compute and storage capacity to build and test automated driving features, such as adaptive cruise control, […]

Apache Flink: 2023 Retrospective and Glimpse into the Future

- thenewstack.io operations - February 13, 2024

Flink is ushering in a long-imagined era when data can finally be harnessed for on-target insights and informed, instantaneous decision-making.

Announcing the general availability of Azure Elastic SAN, the industry's first fully-managed and cloud-native SAN offering. Learn more.

Access control is essential for multi-tenant software as a service (SaaS) applications. SaaS developers must manage permissions, fine-grained authorization, and isolation. In this post, we demonstrate how you can use Amazon Verified Permissions for access control in a multi-tenant document management SaaS application using a per-tenant policy store approach. We also describe how to enforce the […]

With Azure Carbon Optimization, you can use ready-to-consume insights and recommendations for optimizing your carbon emissions and cloud efficiency. Learn more.

Network Function Optimizer available in GKE Enterprise

- GCP containers blogs - February 13, 2024

As part of GKE Enterprise, Network Function Optimizer delivers enterprise scale and high data-plane performance for containerized applications.

How Glovo migrated their self-managed VPN solution to AWS Client VPN In this blog post Glovo shares how they migrated their ~4000 TLS virtual private network (VPN) users from their self-managed OpenVPN Amazon Elastic Compute Cloud (Amazon EC2) solution to AWS Client VPN by also integrating with OneLogin for authentication and authorization. Amazon Web Services (AWS) Client […]

Co-chairs: Mark Fussell (Diagrid) , Roland Huss (Redhat), Paul Schweigert (IBM) AppDeveloperCon is for developers and architects at all levels. Traditionally KubeCon is focused on infrastructure…

Anatomy of a CVE

- cncf.io - February 13, 2024

Member post originally published on SighUp's blog by Simone Ragonesi and Sara Trappetti In this article, we will conduct an in-depth exploration of an impactful vulnerability affecting various…

Ransomware: Business Impact & Prevention Strategies | CSA

- cloudsecurityalliance.org - February 13, 2024

Delve into the unfolding saga of recent ransomware attacks and learn essential preventive measures to safeguard your business.

Community post by Dave Smith-Uchida, Technical Leader at Kasten, by Veeam Data on Kubernetes is a growing area with databases, object stores and other stateful applications migrating to the platform.

Glupteba botnet has been found to include an undocumented UEFI bootkit feature, enhancing its stealth and persistence capabilities significantly.

PikaBot malware undergoes a dramatic transformation, simplifying its code and communication methods

FedRAMP Baseline Transition Points to OSCAL-Native Tools | CSA

- cloudsecurityalliance.org - February 13, 2024

Unlock insights on FedRAMP baseline transition to OSCAL tools and learn to navigate cloud security compliance effortlessly.

The Practicalities of Open Sourcing - DevOps.com

- devops.com - February 13, 2024

If you're contemplating the daring act of open sourcing your projects, here are some things to know before you set out.

Breaking down code reviews into more manageable portions can yield great benefits including efficiency, security and accuracy.

Password spraying, OAuth hijacking, and nation-state attacks – the cybersecurity world is under siege. Learn how to protect your organization.

DevSecOps: 5 Tips for Developing Better, Safer Apps | CSA

- cloudsecurityalliance.org - February 13, 2024

DevSecOps helps developers find vulnerabilities earlier in the app development process and ensures stronger software security.

Threat actors exploit Ivanti security flaw to deploy a stealthy backdoor! Learn how CVE-2024-21893 puts your devices at risk.

CISA has identified a medium-severity security flaw affecting Roundcube email software, categorized as CVE-2023-43770.

During AWS re:Invent 2023, we announced the general availability of Knowledge Bases for Amazon Bedrock. With a knowledge base, you can securely connect foundation models (FMs) in Amazon Bedrock to your company data for Retrieval Augmented Generation (RAG). In my previous post, I described how Knowledge Bases for Amazon Bedrock manages the end-to-end RAG workflow […]

Given the ubiquity of digital payments, cutting-edge fintech solutions hinge on seamless and highly available real-time transaction processing. Invariably, this needs the support of a performant, reliable, and secure datastore. And after considering technical requirements, fintech companies know that regulatory and compliance auditing never takes a back seat. Enterprise AWS customer Marqeta needed all of […]

Happy Lunar New Year! Wishing you a year filled with joy, success, and endless opportunities! May the Year of the Dragon bring uninterrupted connections and limitless growth 🐉 ☁️ In case you missed it, here's outstanding news you need to know as you plan your year in early 2024. AWS was named as a Leader […]

This post is co-written with Conor Teer, Senior Software Engineer, at EverQuote, David Kelly, Principal Software Engineer at EverQuote, and Mark O'Connell, SVP of Engineering at EverQuote. EverQuote is a leading online insurance marketplace that helps protect life's most important assets- family, property, and future by simplifying the experience of shopping for insurance, making it […]

A survey found the vast majority of respondents' organizations experienced a software supply chain incident in the past 12 months.

The Future Is AI, but AI Has a Software Delivery Problem

- thenewstack.io ci-cd - February 12, 2024

While the potential is staggering, AI development confronts a significant challenge: actually getting it into products.

Amazon Inspector is an automated vulnerability management service that continually scans Amazon Web Services (AWS) workloads for software vulnerabilities and unintended network exposure. Amazon Inspector currently supports vulnerability reporting for Amazon Elastic Compute Cloud (Amazon EC2) instances, container images stored in Amazon Elastic Container Registry (Amazon ECR), and AWS Lambda. Java archive files (JAR, WAR, […]

Quiz #19 was: One morning, you receive an alert about unusual activity within your cloud environment. Upon investigation, you discover that a malicious

PromQL-based alerting policies and our command-line tool for importing dashboards from Grafana are now available in Cloud Monitoring.

Co-chairs: Zack Butcher, Iris Ding Istio Day is the biannual community event for the industry's most widely adopted and feature rich service mesh, where attendees will find lessons learned from…

Member post originally published on Aserto's blog by Omri Gazitt, CEO, Aserto Fine-grained authorization is the process of verifying that a subject (typically a user) has permission to perform an…

Get a Handle on Your Crypto Assets to Prepare for PQC | CSA

- cloudsecurityalliance.org - February 12, 2024

Companies aren't ready for quantum computing. If your organization deals with cryptographic assets, here's how to transition to PQC.

Addressing the Developer Skills Gap - DevOps.com

- devops.com - February 12, 2024

Cloud architecture investments are rising, but the developer and database market is experiencing a severe skills shortage.

Rhysida Ransomware Cracked, Free Decryption Tool Released

- thehackernews.com - February 12, 2024

Researchers found a vulnerability in Rhysida ransomware, enabling them to create a decryption tool for Rhysida-encrypted files.

Five Great DevOps Job Opportunities - DevOps.com

- devops.com - February 12, 2024

Looking for a great new DevOps job? Check out these available opportunities at JP Morgan Chase, The Pokémon Company and more!

4 Ways Hackers use Social Engineering to Bypass MFA

- thehackernews.com - February 12, 2024

Understand how hackers exploit social engineering to circumvent MFA and fortify your cybersecurity defenses accordingly.

Feeding from Trust: Social Engineering Fraud | CSA

- cloudsecurityalliance.org - February 12, 2024

Explore social engineering, including why threat actors value professional identities and how they manipulate human nature.

CISA teams up with OpenSSF to introduce a framework called "Principles for Package Repository Security," aimed at fortifying open-source software.

Discover how Silverfort's Unified Identity Protection Platform revolutionizes Incident Response by swiftly detecting compromised accounts and bolsteri

Microsoft is introducing Sudo for Windows 11, a new feature that allows users to run commands with administrator privileges.

U.S. Department of State is offering up to $10 million for information on Hive ransomware operators.

U.S. shut down Warzone RAT, a tool used for data theft and remote control. Two individuals face charges.

DEVOPS WEEKLY ISSUE #684 - 11th February 2024

- devopsweeklyarchive.com - February 11, 2024

Incident management, recent vulnerability disclosures, build and release engineering and more this week. Enjoy.

Book Review: Trust in Numbers

- surfingcomplexity.blog - February 11, 2024

Trust in Numbers: The Pursuit of Objectivity in Science and Public Life by Theodore Porter, Distinguished Professor Emeritus of History, UCLA. There are two general approaches to decision-making. O…

SRE Weekly Issue #411 – SRE WEEKLY

- sreweekly.com - February 11, 2024

How to Exit the Complexity of Kubernetes with Kamal

- thenewstack.io devops - February 10, 2024

We take a look at Kamal, a Capistrano for containers via Docker. It represents a simpler alternative to Kubernetes or Docker Swarm.

Linux: Manage chroot Environments with Atoms

- thenewstack.io operations - February 10, 2024

The chroot command creates virtualized copies of a software system, and Atom allows you to do so within a GUI.

A new backdoor called RustDoor is targeting macOS systems. This Rust-based malware, linked to ransomware families, steals sensitive data.

Amazon CloudWatch Internet Monitor provides near-continuous internet measurements for your internet traffic, including availability and performance metrics, tailored to your specific workload footprint on AWS. With Internet Monitor, you can get insights into average internet performance metrics over time, as well as get alerts for issues (health events). You're notified about events that impact your […]

AWS CodePipeline is a managed continuous delivery service that automates your release pipelines for application and infrastructure updates. Today, CodePipeline adds triggers and new execution modes to support teams with various delivery strategies. These features give customers more choice in the pipelines they build. In this post, I am going to show you how to […]

GitGuardian has allied with CyberArk to streamline secrets detection and management by making it easier to share insights.

An AWS Identity and Access Management (IAM) role is an IAM identity that you create in your AWS account that has specific permissions. An IAM role is similar to an IAM user because it's an AWS identity with permission policies that determine what the identity can and cannot do on AWS. However, as outlined in […]

Entrepreneurship for Engineers: Open Source Company Ethics

- thenewstack.io operations - February 09, 2024

Is it ethical to make an open source product commercial? Your first ethical obligation is to yourself and your employees, say founders.

Secure Your Future in 2024: Grab a Piece of the K8s Security Pie

- thenewstack.io kubernetes - February 09, 2024

Now is the time for security practitioners to work on their future.

Raspberry Robin malware has been spotted using new exploits and is now spreading via Discord for wider infection.

Introduction Application modernization involves discovery, analysis, extraction, containerization and deployment of an application migrated to AWS. The AWS Application Migration Service (AWS MGN) simplifies and expedites your migration to AWS by automatically converting your source servers from physical, virtual, or other cloud infrastructure to run natively on AWS. In this post, I use post-launch actions […]

Member post originally published on Nirmata's blog by Jim Bugwadia and Khaled Emara Kyverno is a policy engine designed for Kubernetes and cloud native workloads. Policies can be managed as Kubernetes…

Co-chairs: Sebastian Stadil + TBD OpenTofu Day is the single most concentrated event focused on networking and learning from OpenTofu contributors and community members. Discuss the roadmap…

Juniper Support Portal Exposed Customer Device Info

- krebsonsecurity.com - February 09, 2024

Until earlier this week, the support website for networking equipment vendor Juniper Networks was exposing potentially sensitive information tied to customer products, including the exact devices each customer bought, as well as each device's warranty status, service contracts and serial…

Defining 12 Cybersecurity Research Topics | CSA

- cloudsecurityalliance.org - February 09, 2024

Define AI, telehealth, DevSecOps, blockchain, Internet of Things, microservices, and other cybersecurity research topics.

Flox Gears up Nix for the Enterprise

- thenewstack.io ci-cd - February 09, 2024

An alternative to Docker, Nix offers cross-platform reproducibility to app deployment, and Flox will offer some much needed management, security and collaboration features.

Enterprise users are looking for a scalable and resilient network-attached storage (NAS) solution with high throughput performance on AWS to support distributed systems running Windows and Linux workloads. Moreover, users like to have flexible deployment models so that storage over the network can be consolidated and managed by the infrastructure account for cost optimization and […]

A new variant of MoqHao Android malware silently auto-executes upon installation, snatching data, and hijacking Wi-Fi.

The Biggest Cloud Security Threats to Watch Out for in 2024 | CSA

- cloudsecurityalliance.org - February 09, 2024

Orca Research forecasts 2024 cloud security threats: AI platform attacks, supply chain risks, and cloud-native malware. Prioritize these areas for enhanced protection.

Cisco this week expanded the scope of its observability platform by adding predictive and generative AI capabilities and log analytics.

Using a SaaS solution where data is stored on the vendor's infrastructure is like playing a football game at your opponent's home field.

DevOps can use insights from customer intelligence data in addition to its use in business strategy, product development and marketing.

What Are AWS Service Control Policies (SCP)? | CSA

- cloudsecurityalliance.org - February 09, 2024

Define what an AWS Service Control Policy (SCP) is, its functionality in a larger governance strategy, and associated challenges.

New banking trojan Coyote targets 61 Brazilian banks. It uses Nim and Node.js for evasion and the Squirrel installer framework for distribution.

Myrror Security offers a way out of vulnerability hell with its reachability-based prioritization. Discover more

eBPF: Meaner Hooks, More WebAssembly and Observability Due

- thenewstack.io observability - February 09, 2024

While most enterprises lack the expertise to directly utilize eBPF and should opt for tools configured with eBPF and extended layers of functionality, help is on the way this year.

Data privacy and compliance are paramount in the cloud era! Explore how businesses can ensure regulatory adherence while leveraging the benefits.

Stealthy cyber espionage campaign targets Islamic non-profit in Saudi Arabia! Learn how attackers maintained long-term access without detection.

Fortinet has unveiled a critical security flaw in its SSL VPN, CVE-2024-21762, allowing hackers to execute arbitrary code.

Ivanti's latest security advisory unveils a high-severity flaw (CVE-2024-22024) affecting Connect Secure, Policy Secure, and ZTA.

Customers are increasingly seeking an efficient solution to manage their expanding AWS resources, spanning AWS accounts and Regions, amidst changes like mergers, acquisitions, and cloud migrations. AWS Tags offer an effective solution for organizing, identifying, and filtering resources by categorizing them based on criteria such as purpose, owner, or environment. AWS customers would like to […]

Co-Chairs: Liam Randall, Divya Mohan Cloud Native Wasm Day is one of the very first co-located events to bring enthusiasts, practitioners, and subject matter experts to the intersection of two…

Traditional API management strategies fall short for modern environments. Here's what it takes to manage APIs in a better way.

Community post by Michel Murabito (@akelity on GitHub) In a world increasingly dominated by technology, it's crucial to think about how it can coexist in harmony with our planet.

Strimzi joins the CNCF Incubator

- cncf.io - February 08, 2024

The CNCF Technical Oversight Committee (TOC) has voted to accept Strimzi as a CNCF incubating project. Strimzi is focused on deploying and running Apache Kafka clusters on Kubernetes.

Migrations are complex and involve many teams from all levels of an organization. A 2020 Accenture Cloud Value Study found the top barriers to cloud value realization outlined by 700+ IT leaders were misalignment, legacy infrastructure, and lack of skills. Organizations want to keep their applications secure and compliant as they move to the cloud, […]

Respond to Cloud Attacks with Intelligence-Driven IR | CSA

- cloudsecurityalliance.org - February 08, 2024

Final part of a series on hybrid cloud attacks, showcasing a real-world case & focusing on intelligence-driven responses to sophisticated threats.

IT leaders must give developers and DevOps teams a simplified, trustworthy data architecture if they want modernization efforts to thrive.

Chinese state-sponsored hacking group, Volt Typhoon, infiltrates U.S. critical infrastructure for over five years.

AWS constantly innovates on its customers' behalf and strives to improve customer experience by reducing complexity. With AWS, customers look to spend their time solving business problems without worrying about operating their infrastructure. Amazon Elastic Kubernetes Service (Amazon EKS) on AWS Fargate allows customers to run Kubernetes pods without worrying about creating and managing the lifecycle […]

F5 announced a SaaS edition of its NGINX application networking portfolio, which are now all available under a single enterprise license.

Bill Doerrfeld explores how GitHub approaches DX and instills these traits into its software development culture.

Implement Role-Based Security Awareness Training | CSA

- cloudsecurityalliance.org - February 08, 2024

Implement a role-based security training program at your organization so everyone knows their specific roles in maintaining security and compliance.

Unified Identity – look for the meaning behind the hype!

- thehackernews.com - February 08, 2024

'Unified' is the buzzword in identity management. Unified identity platforms reduce complexity and accelerate time to value, reshaping the security la

HijackLoader, a loader malware, has undergone updates to its defense evasion techniques, making it stealthier and more complex.

Google starts blocking sideloaded apps in Singapore: This pilot program targets apps that abuse permissions to steal one-time passwords and sensitive

Kobiton is open sourcing a script generation tool for the Appium automation framework that automates the running of test scripts.

North Korean APT Kimsuky caught using new Golang-based info stealer "Troll Stealer" and malware "GoBear," both signed with stolen certificates.

Kubernetes Objects Vs Resources Vs Custom Resource

- devopscube.com - February 08, 2024

In this blog you will learn about Kubernetes objects, resources, custom resources and their differences in detail. While

Cisco, Fortinet, and VMware have released patches for new critical vulnerabilities in their products. Patch immediately to prevent device takeover.

Moving large volumes of data across your hybrid cloud environments can seem like a daunting task, especially when dealing with a litany of requirements that arise when working within the technical limits of network, storage, compute, and operating system layers, both on-premises and in the cloud. Users face additional challenges when balancing their Recovery Time […]

Customers from around the world often tell me that digital sovereignty is a top priority as they look to meet new compliance and industry regulations. In fact, 82% of global organizations are either currently using, planning to use, or considering sovereign cloud solutions in the next two years, according to the International Data Corporation (IDC). […]

While most software developers are using agile development methodologies in the SDLC, less than half said it is working well.

We're excited to announce that Amazon Web Services (AWS) has completed the 2023 South Korea Cloud Service Providers (CSP) Safety Assessment Program, also known as the Regulation on Supervision on Electronic Financial Transactions (RSEFT) Audit Program. The financial sector in South Korea is required to abide by a variety of cybersecurity standards and regulations. Key […]

AWS Verified Access (AVA) provides secure access to applications from anywhere. AVA removes the need for a VPN, which simplifies the remote connectivity experience for end users and reduces the management complexity for IT administrators. But does the application need to be running in AWS to use AVA? The answer is No. If you have […]

From Cybercrime Saul Goodman to the Russian GRU

- krebsonsecurity.com - February 07, 2024

In 2021, the exclusive Russian cybercrime forum Mazafaka was hacked. The leaked user database shows one of the forum's founders was an attorney who advised Russia's top hackers on the legal risks of their work, and what to do if…

Welcome StrimziCon 2024!

- cncf.io - February 07, 2024

Project post originally published on Paolo Patierno We are very pleased to announce the first StrimziCon, scheduled later this year! This is going to be the first conference focused on our beloved…

Docker Basics: How to Use Dockerfiles

- thenewstack.io containers - February 07, 2024

This tutorial will walk you through the process of crafting a Dockerfile. This will be a fairly basic Dockerfile, but one you can easily build upon.

Learn how to network in the cloud

- GCP networking blogs - February 07, 2024

Google Cloud provides a suite of powerful networking tools. The "Tour of Cloud Networking" lab introduces the core services with options to learn more.

Understanding Kubernetes dynamic resource scaling and CPU Boost

- GCP containers blogs - February 07, 2024

When an application's resource needs change, in-place resource resize in Kubernetes 1.27 resizes Pod resources without restarting the container.

Proactive Cybersecurity is a Humanitarian Imperative | CSA

- cloudsecurityalliance.org - February 07, 2024

For non-technical leaders, demystify the process of championing cloud security at non-profits and non-governmental organizations.

U.S. Government shuts down the KV-botnet network, but the operators bounce back by restructuring their operations.

A critical vulnerability (CVE-2023-40547) has been found in the shim bootloader, leaving millions of Linux systems vulnerable to attack.

Starting Zero Trust Without Spending a Dime | CSA

- cloudsecurityalliance.org - February 07, 2024

Explore cost-effective strategies for implementing zero trust in IT. Utilize policy changes and administration tactics to enhance security against malware threats.

DevOps Guide to Java Profiling - DevOps.com

- devops.com - February 07, 2024

By using a Java profiler, developers can gain understanding of the app's performance characteristics and identify areas for optimization.

We Will Control the World! - DevOps.com

- devops.com - February 07, 2024

Don MacVittie asks vendors: Don't tell us how you can control other vendors' tools; tell us how you're making it easier to manage yours.

10 CSPM Best Practices to Follow This Year | CSA

- cloudsecurityalliance.org - February 07, 2024

Discover CSPM best practices for cloud security and compliance. Manage risks, ensure data integrity, and maximize tool efficiency for a resilient cloud infrastructure.

New Webinar: 5 Steps to vCISO Success for MSPs and MSSPs

- thehackernews.com - February 07, 2024

Discover the 5-phase action plan to success as a vCISO. From research to reporting, learn how to navigate the complexities of organizational security

Governments and tech giants such as France, the U.K., the U.S., Google, Meta, and Microsoft have joined forces to combat the misuse of spyware.

Dutch military network hacked by Chinese spies! Hackers exploited a known Fortinet flaw, raising concerns about cyberespionage

Critical Flaw in JetBrains TeamCity On-Premises (CVE-2024-23917) Allows Attackers to Take Over Servers

This post was coauthored by Ben Duffield and Eric Silverberg at Perry Street Software, with contributions from Adam Tucker, Piotr Wald, and Cristian Constantinescu of PSS Introduction You just finished deploying that important change you spent weeks preparing, when you see this email subject in your inbox: Alarm: HTTPCode_Target_5XX_Count. Ugh. The code you have just […]

In June 2023, Amazon Web Services (AWS) introduced a new capability to AWS Key Management Service (AWS KMS): you can now import asymmetric key materials such as RSA or elliptic-curve cryptography (ECC) private keys for your signing workflow into AWS KMS. This means that you can move your asymmetric keys that are managed outside of […]

OpenText updated a static analysis code auditing tool using machine learning to provide deeper insights into on-premises IT environments.

Alexis Richardson, CEO and co-founder of Weaveworks, took to LinkedIn to share the somber news of the company's closing.

Customers host their SAP HANA environments on AWS to run their business-critical processes, such as financial planning, data analytics, and supply chain management. Reliably backing up data in SAP HANA is paramount for users to restore the database in the event of disruptions and urgent business needs. To reliably back up SAP HANA, SAP documentation […]

Digital Evolution from Cloud Migration to Cloud Native Development

- thenewstack.io operations - February 06, 2024

Legacy monolithic structures, with their rigid scalability, have often caused businesses like Blockbuster to be left behind. Now, businesses can provision resources on-demand, and reduce overheads associated with data center management.

Google Cloud is committed to supporting our customers' compliance with EU DORA. Here's the latest on our DORA support.

Researchers run Uncertainty Quantification models on GKE

- GCP containers blogs - February 06, 2024

Researchers chose GKE for their UM-bridge framework for its ability to orchestrate UQ workloads and distribute tasks with load balancing.

Want to use open-source LLM models from Hugging Face on your local development environment? With localllm and Cloud Workstations, you can.

Tackling AI Together, Part One

- cncf.io - February 06, 2024

By Constance Caramanolis, principal software engineer, Splunk, and KubeCon + CloudNativeCon co-chair This is part one of our series on Tackling AI Together. We're looking at this new challenge/

What's happening to standard RIs?

- cncf.io - February 06, 2024

Member post originally published on Zesty's blog by Pini Ben-Nahum When it comes to AWS discount plans, management approaches vary greatly. The often overlooked (Standard Reserved Instance) SRI has a…

Researchers found three security vulnerabilities in Azure HDInsight's Apache Hadoop, Kafka, and Spark services that allow for root access and system d

Cybercriminals use fake Facebook job ads to spread Ov3r_Stealer, a Windows malware. It steals sensitive information.

Part 2: How Attackers Exploit OAuth | CSA

- cloudsecurityalliance.org - February 06, 2024

With non-human access like API keys, OAuth tokens, and service accounts, lack of visibility and governance is everywhere. Dive into the non-human identities attack surface.

Can Enterprise DevOps Ever Measure Up?

- thenewstack.io operations - February 06, 2024

It's been 15 years since DevOps came on the scene. But for more traditional enterprises, why does their DevOps transformation seem never-ending?

Here are 10 key features to look for when choosing an AI coding assistant to help automate the tedious aspects of software development.

The Combined Power of Chronosphere and Calyptia

- thenewstack.io observability - February 06, 2024

This merger is particularly significant in its potential to streamline developer workflows and optimize data pipeline management, underpinned by the robust capabilities of Fluent Bit and OpenTelemetry.

Salesforce added the ability to customize API security policies to the Mulesoft Anypoint API management platform.

AI assistants are changing the way code gets made, and much of this is for the better. But what's the impact on code quality?

IBM made its most aggressive move yet in its quest to make Linux mainframes more affordable, with an entry-level platform for $135,000.

4 Key Factors for Protecting Your Cloud Workloads | CSA

- cloudsecurityalliance.org - February 06, 2024

Take a closer look at the four key factors to keep in mind when evaluating a CNAPP's cloud workload protection capability.

Protecting your data in the cloud is crucial. Learn how a $10B media firm achieved a 201% ROI with SaaS Security Posture Management.

A new cybercriminal group, ResumeLooters, targets job search platforms in APAC, stealing millions of resumes and personal data.

This post is written by Dennis Kieselhorst, Principal Solutions Architect. The combination of portability, efficiency, community, and breadth of features has made Java a popular choice for businesses to build their applications for over 25 years. The introduction of serverless functions, pioneered by AWS Lambda, changed what you need in a programming language and runtime […]

A recently disclosed SSRF vulnerability (CVE-2024-21893) in Ivanti Connect Secure and Policy Secure products is now under mass exploitation.

U.S. imposes visa restrictions on those involved in illegal surveillance through commercial spyware.

We're excited to announce that Amazon Web Services (AWS) has successfully renewed certification under the Korea Information Security Management System (K-ISMS) standard (effective from December 16, 2023, to December 15, 2026). The certification assessment covered the operation of infrastructure (including compute, storage, networking, databases, and security) in the AWS Asia Pacific (Seoul) Region. AWS was […]

With all the generative AI announcements at AWS re:invent 2023, I've committed to dive deep into this technology and learn as much as I can. If you are too, I'm happy that among other resources available, the AWS community also has a space that I can access for generative AI tools and guides. Last week's […]

We continue to expand the scope of our assurance programs at Amazon Web Services (AWS), and we're pleased to announce that AWS has successfully completed the 2023 Cloud Computing Compliance Controls Catalogue (C5) attestation cycle with 170 services in scope. This alignment with C5 requirements demonstrates our ongoing commitment to adhere to the heightened expectations […]

Introduction AWS Cloud WAN is a managed wide-area networking (WAN) service for building, managing, and monitoring a unified global network, as well as connecting resources running across your cloud and on-premises environments. With AWS Cloud WAN, you have a central place to create and manage your global routing configuration by creating a policy and achieving […]

Former operator of defunct crypto exchange BTC-e faces 25 years in prison for alleged $4 billion money laundering scheme.

Salk Institute brain mapping on Google Cloud with SkyPilot

- GCP storage blogs - February 05, 2024

Running on Google Cloud lets Salk Institute process and analyze complex biological data at scale, and SkyPilot optimizes the computation.

On December 4, 2023, AWS was named as a Leader in the 2023 Magic Quadrant for Strategic Cloud Platform Services (SCPS). AWS is the longest-running Magic Quadrant Leader, with Gartner naming AWS a Leader for the thirteenth consecutive year. AWS is placed highest on the Ability to Execute axis. SCPS, previously known as Magic Quadrant […]

Member post originally published on Devtron's blog by Kamal Acharya TL;DR: In containerized environments where application are broken down into smaller, manageable components autoscaling plays the…

Generative AI Meets AWS Security | Amazon Web Services

- AWS devops blogs - February 05, 2024

A Case Study Presented by CodeWhisperer Customizations Amazon CodeWhisperer is an AI-powered coding assistant that is trained on a wide variety of data, including Amazon and open-source code. With the launch of CodeWhisperer Customizations, customers can create a customization resource. The customization is produced by augmenting CodeWhisperer using a customer's private code repositories. This enables […]

WASI Preview 2: What WebAssembly Can and Can't Do Yet

- thenewstack.io cloud-native - February 05, 2024

The new WebAssembly System Interface (WASI) standard is a step in the right direction, potentially paving the way for WebAssembly to fulfill its hype and promise.

Business-critical applications frequently require high availability to meet Service Level Agreements (SLAs). In addition, users are challenged by compliance requirements and disaster recovery plans to assure workload availability. In many cases, workloads needing high availability also need highly performant, low-latency file storage. Customers who are considering the migration of business-critical application to AWS want to […]

What to Do After an Account Takeover | CSA

- cloudsecurityalliance.org - February 05, 2024

Learn why account takeovers are successful, how to detect and remediate them, and how to protect yourself in the future.

The ever-increasing importance of cloud services plus the lack of available talent means cloud careers will see huge growth in 2024.

Threat actor "Patchwork" uses romance scams to spread espionage apps in India and Pakistan! Learn how they infiltrated Android devices with VajraSpy.

Hands-On Review: SASE-based XDR from Cato Networks

- thehackernews.com - February 05, 2024

Discover how Cato Networks is revolutionizing cybersecurity with their SASE-based XDR platform! Learn how they simplify threat detection and response.

Five Great DevOps Job Opportunities - DevOps.com

- devops.com - February 05, 2024

Looking for a great new DevOps job? Check out these available opportunities at Cognizant, IBM, Workday and more!

Modernizing FedRAMP through Automation for Efficiency | CSA

- cloudsecurityalliance.org - February 05, 2024

The OMB's latest memorandum “Modernizing FedRAMP” emphasizes the need for rapid authorization processes to meet the demands of modern cloud services.

Learn how SecurityHQ's innovative SHQ Response Platform is revolutionizing risk management, with insights from Deodatta Wandhekar.

NSO Group's Pegasus spyware targeted nearly 3 dozen journalists, activists, and lawyers in Jordan.

Arvato Systems makes picture production with 3D assets

- GCP compute blogs - February 05, 2024

Arvato Systems developed imagejet, a new cloud-based 3D picture production solution, to offer high-quality mass picture production.

Cybercriminals are targeting Mexican users with a new variant of the Mispadu banking malware, exploiting a patched Windows SmartScreen bypass flaw

Golang Co-Creator Rob Pike: 'What Go Got Right and Wrong'

- thenewstack.io operations - February 04, 2024

An excellent standard library and packaging system, first-class concurrency support and a focus on readability are among the traits that keep Golang devs happy.

DEVOPS WEEKLY ISSUE #683 - 4th February 2024

- devopsweeklyarchive.com - February 04, 2024

Several posts this week covering developer experience and the impact of generative AI tooling, along with a few posts more generally devops in 2024.

SRE Weekly Issue #410 – SRE WEEKLY

- sreweekly.com - February 04, 2024

Linux: Hide Your Shell Passwords with sshpass

- thenewstack.io operations - February 03, 2024

Hard-coding is never the answer. Instead, use sshpass when you need to put a password in your Bash script.

U.S. Treasury Department has just imposed sanctions on Iranian officials linked to cyberattacks on critical infrastructure.

Decentralized social network Mastodon has disclosed a critical security flaw that allows malicious actors to impersonate and take over any account.

Discover the details of the recent AnyDesk cyber attack, including the company's swift response to secure its production systems and the steps users s

Watch my pup grow up - Digi Hunch

- digihunch.com - February 03, 2024

Deep Dive into IT

Introduction Sustainable cloud design requires understanding and minimizing the impacts of architectural decisions. With conscientious cloud architecture, we can innovate rapidly while treading lightly on our shared environment. As cloud computing becomes ubiquitous, it's imperative that we build sustainable cloud architectures that minimize environmental impacts. While cloud economies of scale improve efficiency, our design choices […]

Complete Guide to Non-Human Identity Security: Part 1 | CSA

- cloudsecurityalliance.org - February 02, 2024

Dive into the non-human identities attack surface, how it's created, how attackers exploit it, and what you can do to minimize your exposure.

SOC 2 Reports and Penetration Tests | CSA

- cloudsecurityalliance.org - February 02, 2024

A penetration test isn't required to complete a SOC 2 report, but it helps grow your compliance security program.

3 Considerations of the Key Management Lifecycle | CSA

- cloudsecurityalliance.org - February 02, 2024

To implement key management solutions (KMS), organizations must take measures to ensure sensitive information is kept safe. Here are three areas to consider.

Introduction The purpose of this blog post is to show the steps on how to change the lifecycle status of a source server from "Ready for testing" to "Ready for cutover" to bypass the testing steps when using the AWS Application Migration Service (MGN). This approach can be used for specific scenarios where you want […]

February 2, 2024: We've updated this post to fix broken links and added a note on migrating passwords. Customers often ask us how to migrate their on-premises Active Directory (AD) domain to AWS so they can be free of the operational management of their AD infrastructure. Frequently they are unsure how to make the migration […]

Today we're excited to announce the general availability of CDK Migrate, a component of the AWS Cloud Development Kit (CDK). This feature enables users to migrate AWS CloudFormation templates, previously deployed CloudFormation stacks, or resources created outside of Infrastructure as Code (IaC) into a CDK application. This feature is being launched in tandem with the […]

AWS Infrastructure as Code (IaC) enables customers to manage, model, and provision infrastructure at scale. You can declare your infrastructure as code in YAML or JSON by using AWS CloudFormation, in a general purpose programming language using the AWS Cloud Development Kit (CDK), or visually using Application Composer. IaC configurations can then be audited and […]

Using Filestore as an accelerator for AI/ML workloads on GKE

- GCP containers blogs - February 02, 2024

Using Filestore as an accelerator can accelerate load times for AI/ML workloads running on GKE, improving performance and training time.

By Jorge Castro and Shah Ahmadzai Great news for CNCF projects today! Oracle has donated $3M in Oracle Cloud Infrastructure (OCI) credits for Ampere-ARM based workloads. We are happy to announce that…

KCD post by Sergio Méndez, CNCF Ambassador Cloud Native Guatemala started in 2019 with the goal of rebirthing the spirit of open source communities in the USAC university in Guatemala. It started on a…

Member post originally published on Facets.cloud's blog Speed is critical in the tech world. Organizations want to ship code quickly to gain a competitive edge. However, developers often need more…

Complete Guide to Non-Human Identity Security: Part 1 | CSA

- cloudsecurityalliance.org - February 02, 2024

Dive into the non-human identities attack surface, how it's created, how attackers exploit it, and what you can do to minimize your exposure.

Russian state-sponsored hackers (APT28) have been conducting sophisticated cyberattacks for over a year, targeting high-value organizations worldwide.

3 Considerations of the Key Management Lifecycle | CSA

- cloudsecurityalliance.org - February 02, 2024

To implement key management solutions (KMS), organizations must take measures to ensure sensitive information is kept safe. Here are three areas to consider.

Introduction Business and technology teams often measure Digital Transformation and use a financial metric as the yardstick of success. This is an output focused approach, for example – if you migrate applications as-is to the cloud and reduce costs, businesses will approve more similar migrations. However, organizations need to take a comprehensive approach and include […]

A free version of Graylog's API security platform is intended to encourage developers to adopt best practices to secure APIs.

Low-code/no-code (LCNC) allows non-technical people to build complex apps without needing to be familiar with traditional software logic.

Over 2,000 Ukrainian computers infected with DirtyMoe malware: This malware is capable of stealing cryptocurrency and launching denial-of-service atta

Getting platform engineering right helps organizations create an environment that drives their teams to develop solutions more efficiently.

SOC 2 Reports and Penetration Tests | CSA

- cloudsecurityalliance.org - February 02, 2024

A penetration test isn't required to complete a SOC 2 report, but it helps grow your compliance security program.

Cloudzy, cloud infrastructure provider, partnered with Recorded Future for real-time threat intel, proactively shutting down malware and ransomware.

A former CIA software engineer named Joshua Adam Schulte has been sentenced to 40 years in prison for transmitting classified documents to WikiLeaks.

An INTERPOL-led operation named "Synergia" targeted phishing, banking malware, and ransomware attacks.

Cloudflare suffered nation-state attack. Hackers accessed documentation, source code, and attempted data center breach. Read full story for details.

Arrests in $400M SIM-Swap Tied to Heist at FTX?

- krebsonsecurity.com - February 01, 2024

Three Americans were charged this week with stealing more than $400 million in a November 2022 SIM-swapping attack. The U.S. government did not name the victim organization, but there is every indication that the money was stolen from the now-defunct…

Q&A: HashiCorp CTO Armon Dadgar on IDPs and IaC

- thenewstack.io operations - February 01, 2024

HashiCorp is working on an Internal Developer Platform, called Waypoint, which could help developers roll out deployments built on Infrastructure as Code patterns.

Enabling mTLS with ALB in Amazon EKS | Amazon Web Services

- AWS containers blogs - February 01, 2024

Introduction In today's interconnected world, communication faces evolving security threats. From sensitive financial transactions in online banking to secure data transmissions in the automobile industry, ensuring trust and authenticity between businesses is becoming more and more critical. This is where Mutual Transport Layer Security (mTLS) can be an option to offer enhanced security through advanced […]

Why a Cloud Operating Model? | Amazon Web Services

- AWS cloudops blogs - February 01, 2024

A thought leadership blog highlighting an "innovative approach" to Cloud Operations excellence and Well-Architected goals. This blog walks you through MuleSoft carrying out this new approach including their: Challenge Innovation Journey Implementation of the Cloud Operating Model Challenge Whether companies are migrating to the cloud, or cloud-native, executives are faced with controlling costs and continuous […]

OX Security updated its ASPM platform to enable DevSecOps teams to instantly identify applications with vulnerable code.

Leaky Vessels Vulnerability Sinks Container Security

- thenewstack.io containers - February 01, 2024

Attackers could use a security hole in the open source runc container runtime engine — used by Docker and others — to gain control of the host machine.

Learn how Synthesized uses generative AI to create privacy-preserving snapshots of BigQuery datasets.

Using the Cloud Storage FUSE CSI driver with Kubernetes

- GCP containers blogs - February 01, 2024

Cloud Storage FUSE CSI driver lets you use the Kubernetes API to consume pre-existing Cloud Storage buckets as persistent volumes.

KCD post by Matteo Bianchi, Marcel Kerker and Carlos Mestre del Pino Less than a year ago some of us attended our first Kubernetes Community Day ever, in Amsterdam and we would never have guessed that…

Community post originally published on DZone by Nigel Douglas In highly dynamic cloud-native environments, the traditional Threat Detection and Response (TDR) approaches are increasingly showing their…

FritzFrog Malware Returns with Log4Shell Twist, Targeting Your Internal Systems Patch now & avoid becoming the next victim

Cycode discovered a command injection vulnerability in the way GitHub Actions updated Google's open source Bazel project.

A cryptojacking campaign called Commando Cat is exploiting exposed APIs

CVE-2023-4911: Local Privilege Escalation Vulnerability | CSA

- cloudsecurityalliance.org - February 01, 2024

Dive into a critical vulnerability, dubbed 'Looney Tunables,' affecting the popular GLIBC ecosystems to see why it happened and how to detect and mitigate it.

Here's how companies can keep multi-cloud challenges like complexity and unexpected costs at a minimum and fuel innovation in the cloud.

Azure cost management helps you gain insights into your Azure spending and offers personalized recommendations for cost optimization.

Measuring the right things can help you prioritize, fix, and report with confidence. Learn the 5 key metrics for effective vulnerability management.

New HeadCrab 2.0 malware is using fileless techniques to turn Redis servers into a botnet for illegal cryptocurrency mining.

U.S. government took down a China-linked 'KV-botnet' malware network that hijacked hundreds of SOHO routers to target critical infrastructure.

Security Chaos Engineering: Improved Stress Testing | CSA

- cloudsecurityalliance.org - February 01, 2024

In security chaos engineering, experiments are introduced intentionally to ensure cybersecurity systems and processes work correctly.

Chinese hackers are exploiting zero-days in Ivanti VPNs, stealing sensitive data

Critical Apple kernel bug in iOS, macOS, and more exploited in the wild. CISA urges FCEB agencies to patch by February 21st.

CVE-2023-4911: Local Privilege Escalation Vulnerability | CSA

- cloudsecurityalliance.org - February 01, 2024

Dive into a critical vulnerability, dubbed 'Looney Tunables,' affecting the popular GLIBC ecosystems to see why it happened and how to detect and mitigate it.

Security Chaos Engineering: Improved Stress Testing | CSA

- cloudsecurityalliance.org - February 01, 2024

In security chaos engineering, experiments are introduced intentionally to ensure cybersecurity systems and processes work correctly.

The telecommunications industry has undergone major technological changes in recent years, and the extensive data generated by telecom operations demands strategic handling. According to a McKinsey survey, over 50% of telecom companies said they were moving more assets to the cloud, including many business-critical applications such as business support systems (BSS). Telecom companies must prioritize […]

Recently, we launched a new AWS Cloud Development Kit (CDK) construct for Amazon DynamoDB tables, known as TableV2. This construct provides a number of new features in addition to what the original construct offered, enabling CDK authors to create global tables, simplifying the configuration of global secondary indexes and auto scaling, as well as supporting […]

Chronosphere's Calyptia Buy Completes Observability Trinity

- thenewstack.io operations - January 31, 2024

Calyptia not only had expertise of Fluentd, but also a razor-sharp focus on the top-end of the market for observability.

Announced by Werner Vogels in his 2023 re:Invent Keynote, Generative AI CDK Constructs, an open-source extension of the AWS Cloud Development Kit (AWS CDK), provides well-architected multi-service patterns to quickly and efficiently create repeatable infrastructure required for generative AI projects on AWS. Our initial release includes five CDK constructs enabling key generative AI capabilities like […]

Generative AI Infrastructure at AWS | Amazon Web Services

- AWS compute blogs - January 31, 2024

Building and training generative artificial intelligence (AI) models, as well as predicting and providing accurate and insightful outputs requires a significant amount of infrastructure. There's a lot of data that goes into generating the high-quality synthetic text, images, and other media outputs that large-language models (LLMs), as well as foundational models (FMs), create. To start, […]

Critical Container Exploits Found in runC. These flaws allow attackers to break out of containers and access sensitive data or launch further attacks.

Dynatrace unfurled a Dynatrace OpenPipeline that makes it possible to apply analytics to multiple types of data sources in real time.

Use a FinOps Model to Control Hybrid Cloud Costs

- thenewstack.io operations - January 31, 2024

Deeper financial analysis and earlier strategic thinking will result in a hybrid cloud deployment that delivers clearer ROI.

Reflecting on 2023—Azure Storage | Microsoft Azure Blog

- Azure storage blogs - January 31, 2024

In 2023, storage advancements and investments were made aligning with customer workload patterns, cloud computing trends, and the evolution of AI. Learn more.

Konveyor 0.3.0 release announcement

- cncf.io - January 31, 2024

Ambassador post by Savitha Raghunathan We are excited to announce the release of Konveyor 0.3.0! This version introduces significant features like the Multi-Language Analyzer, Custom Assessment Module…

In this newsletter, guest columnist Yousif Hussin, from our Vulnerability Coordination Center, explores executive lessons from our response to critical zero-day vulnerabilities like Reptar.

The Evolution of Check Payments | CSA

- cloudsecurityalliance.org - January 31, 2024

Financial institutions need to prioritize payment solutions that minimize disruption to existing IT infrastructure.

Two high-severity vulnerabilities found in Ivanti's Connect Secure, Policy Secure, and Neurons for ZTA.

Shadow AI and Why Evolution Might Kill it Dead | CSA

- cloudsecurityalliance.org - January 31, 2024

Improve your cybersecurity strategy in the age of AI with our insights. Discover why GenAI risk requires an evolutionary, not revolutionary, response.

The more you can upskill and empower existing in-house development efforts, the more value you will bring to the business.

Threat actors can launch mass phishing attacks for as low as $230 using Telegram's dark marketplace of tools and victims' data.

Security Across the SDLC - DevOps.com

- devops.com - January 31, 2024

Don MacVittie believes we've made progress integrating security across the SDLC, but there's still a ways to go.

DORA Directive: Resilience in the European Economic System | CSA

- cloudsecurityalliance.org - January 31, 2024

In the context of a persistent and evolving cyber threat, the EU aims to strengthen the defense lines of the financial sector with the Digital Operational Resilience Act (DORA).

CNCF CloudEvents: A Li'l Message Envelope That Travels Far

- thenewstack.io cloud-native - January 31, 2024

The Cloud Native Computing Foundation has anointed CloudEvents as a graduated project, but Microsoft and others are already using the technology in large event-driven architectures.

UNC4990 is using weaponized USB devices as an initial infection method to target organizations in Italy.

Heads up, CISOs! The SEC just dropped new cybersecurity regulations for SaaS. Data breaches in the cloud now matter – big time.

New Google Cloud region now open in Johannesburg

- GCP infra blogs - January 31, 2024

The first on the African continent, the Johannesburg Google Cloud region provides low-latency cloud services to accelerate digital transformation.

Chinese nation-state hacker group UTA0178 weaponized Ivanti VPN vulnerabilities to deploy the Rust-based KrustyLoader, cryptocurrency miners.

A recently disclosed flaw in the GNU C library can give hackers full root access to Linux machines.

Introduction The "Elastic" in Amazon Elastic Kubernetes Service (Amazon EKS) refers to the ability to "acquire resources as you need them and release resources when you no longer need them". Amazon EKS should scale to handle almost all workloads but we often hear questions from Amazon EKS customers like: "What is the maximum number of […]

How Amazon EKS approaches Scalability | Amazon Web Services

- AWS containers blogs - January 31, 2024

Introduction The "Elastic" in Amazon Elastic Kubernetes Service (Amazon EKS) refers to the ability to "acquire resources as you need them and release resources when you no longer need them". Amazon EKS should scale to handle almost all workloads but we often hear questions from Amazon EKS customers like: "What is the maximum number of […]

DORA Directive: Resilience in the European Economic System | CSA

- cloudsecurityalliance.org - January 31, 2024

In the context of a persistent and evolving cyber threat, the EU aims to strengthen the defense lines of the financial sector with the Digital Operational Resilience Act (DORA).

Shadow AI and Why Evolution Might Kill it Dead | CSA

- cloudsecurityalliance.org - January 31, 2024

Improve your cybersecurity strategy in the age of AI with our insights. Discover why GenAI risk requires an evolutionary, not revolutionary, response.

The Evolution of Check Payments | CSA

- cloudsecurityalliance.org - January 31, 2024

Financial institutions need to prioritize payment solutions that minimize disruption to existing IT infrastructure.

Companies from different industries use data to help their Artificial Intelligence (AI) and Machine Learning (ML) systems make intelligent decisions. For ML systems to work well, it is crucial to make sure that the massive datasets used for training ML models are of the highest quality, minimizing noise that can contribute to less-than-optimal performance. Processing […]

ISO to Release ISO 42001 for the Trustworthy Use of AI | CSA

- cloudsecurityalliance.org - January 30, 2024

A look into ISO 42001's AI risk management features, unique safeguards, and structure.

On Jan. 9, 2024, U.S. authorities arrested a 19-year-old Florida man charged with wire fraud, aggravated identity theft, and conspiring with others to use SIM-swapping to steal cryptocurrency. Sources close to the investigation tell KrebsOnSecurity the accused was a key…

Introduction With this release, Amazon Elastic Container Service (Amazon ECS) integrates with AWS Private Certificate Authority (CA) and automates the process of issuing, distributing, and rotating certificates, which makes it simple for customers to secure traffic between services without adding extra operational workload. Now Amazon ECS Service Connect customers can encrypt service-to-service communication using Transport […]

Introduction In the software development sphere, immediate evaluation of every code adjustment and deploying pull requests to active environments for immediate preview and feedback is essential. This practice is instrumental in reducing post-deployment issues and operational disruptions, underscoring the urgency for dedicated preview environments. Without these environments, the risk of merging unassessed features into the […]

Figure 1 – Break free from analysis paralysis In today's dynamic landscape, companies are seeking faster time-to-value for their business initiatives through cloud adoption. As businesses evolve and embrace digital transformation, application modernization becomes a critical aspect of their cloud journey and an imperative for value creation. Modernizing your applications helps you reduce costs, gain […]

ANima added an ability to personalize the code its generative AI platform creates based on how an app is described.

As part of our commitment to transparency within the cloud native community, we are providing an inside look into the work that goes on behind the scenes to bring the KubeCon + CloudNativeCon schedule…

Hackers could write ANY file on your GitLab server while creating a workspace. This critical flaw (CVE-2024-0402) affects all versions.

Brazilian law enforcement has taken down a major cybercrime ring behind the notorious Grandoreiro banking trojan

Today we're previewing a new chat experience for AWS Glue that will let you use natural language to author and troubleshoot data integration jobs. Amazon Q data integration in AWS Glue will reduce the time and effort you need to learn, build, and run data integration jobs using AWS Glue data integration engines. You can […]

Directly invoking AWS AppSync GraphQL API targets from EventBridge simplifies and streamlines integration between these two services, ideal for notifying a variety of subscribers of data changes in event-driven workloads. You can also take advantage of other features available from the two services.

Sustainability matters - take our survey!

- cncf.io - January 30, 2024

Did you know that demand for electricity from data centers and artificial intelligence applications could more than double over the next three years? It's true. Apparently there's a lot more we need…

Eight Cybersecurity Predictions for 2024 | CSA

- cloudsecurityalliance.org - January 30, 2024

The ever-changing digital environment is driving the evolution of cybersecurity threats. Here are eight notable trends that will be top-of-mind in 2024.

Over the coming year, CloudBolt plans to infuse AI into the FinOps capabilities it provides via its IT management platform.

Silver Spring, Maryland, January 30th, 2024, Cyberwire Aembit Becomes the First Workload IAM Platform to Integrate with the Industry-Leading CrowdStrike

Chinese hackers Mustang Panda caught red-handed targeting Myanmar's Ministry of Defence and Foreign Affairs

Accessing on-premises resources with workers controlled via Step Functions using MQTT and AWS IoT Core is a secure, reactive, and cost effective way to run on-premises jobs. Consider updating your hybrid workloads from using inefficient polling or schedulers to the reactive approach described in this post.

Jenkins and JenkinsX in 2024 - DevOps.com

- devops.com - January 30, 2024

Jenkins remains a powerful CI/CD tool in 2024.

Using LLMs to migrate from Jenkins, GitLab or Azure pipelines to Tekton pipelines can be a strategic DevOps choice.

CNAPP: How to Protect Cloud Workloads | CSA

- cloudsecurityalliance.org - January 30, 2024

CNAPP helps orgs evaluate cyber risk across multiple cloud technologies & providers, informing security and compliance measures.

Top Security Posture Vulnerabilities Revealed

- thehackernews.com - January 30, 2024

Cybersecurity is a continuous battle. Discover the top 6 vulnerabilities organizations should address

Italy's data watchdog accuses ChatGPT of violating EU privacy laws by collecting sensitive data and exposing children to inappropriate content.

ZLoader malware resurfaces after 2 years, targeting Windows systems with ransomware.

Patch your Juniper firewalls now! 2 critical vulnerabilities (CVE-2024-21619, CVE-2024-21620) could let attackers steal data or even take control.

Eight Cybersecurity Predictions for 2024 | CSA

- cloudsecurityalliance.org - January 30, 2024

The ever-changing digital environment is driving the evolution of cybersecurity threats. Here are eight notable trends that will be top-of-mind in 2024.

ISO to Release ISO 42001 for the Trustworthy Use of AI | CSA

- cloudsecurityalliance.org - January 30, 2024

A look into ISO 42001's AI risk management features, unique safeguards, and structure.

CNAPP: How to Protect Cloud Workloads | CSA

- cloudsecurityalliance.org - January 30, 2024

CNAPP helps orgs evaluate cyber risk across multiple cloud technologies & providers, informing security and compliance measures.

Toronto, Canada, January 29th, 2024, Cyberwire In an era where online threats no longer discriminate by business size, Control D, powered by Windscribe

Introduction Generative AI is not only transforming the way businesses function but also accelerating the pace of innovation within the broader AI field. This transformative force is redefining how businesses use technology, equipping them with capabilities to create human-like text, images, code, and audio, which were once considered beyond reach. Generative AI offers a range […]

This past week our service teams continue to innovate on your behalf, and a lot has happened in the Amazon Web Services (AWS) universe. I'll also share about all the AWS Community events and initiatives that are happening around the world. Let's dive in! Last week's launches Here are some launches that got my attention: […]

AWS Config assesses, audits, and evaluates the configurations and relationships of your resources in your AWS account. Why might we want to use this service for cost optimization? Well consider a scenario where we can be alerted if a specific Amazon Relational Database Service (Amazon RDS) instance is deployed in the account. If a larger […]

Through the Helios acquisition, Snyk plans to add an ability to capture app runtime data to extend the capabilities of its ASPM platform.

Docker Build Cloud Promises to Speed Docker Builds

- thenewstack.io containers - January 29, 2024

This spinoff from the Docker Build remote build service, Docker Build Cloud, is a fully managed service that can speed build times by up to 39 times.

Community post originally published on Medium by Sagar Parmar Backstage is an open-source platform for constructing Internal Developer Portals (IDPs). Internal Developer Portals serve as a one-stop…

TAG post by Michel Murabito, Marta Paciorkowska, Kristina Devochko, and Leonard Pahlke For the first time, during the week 9th-15th October 2023, CNCF TAG Environmental Sustainability organized a…

The Essential Traits of a Successful CISO | CSA

- cloudsecurityalliance.org - January 29, 2024

Unlock the path to CISO success by delving into the critical traits and challenges faced in the dynamic world of cybersecurity leadership.

Companies have been collecting user data to offer new products, recommend options more relevant to the user's profile, or, in the case of financial institutions, to be able to facilitate access to higher credit lines or lower interest rates. However, personal data is sensitive as its use enables identification of the person using a specific […]

Amazon VPC IP Address Manager (IPAM) is a VPC feature that allows you to plan, track, and monitor IP addresses for your AWS workloads. Until now, VPC IPAM allowed you to allocate CIDR blocks and monitor them at the VPC level. With a recent feature enhancement in VPC IPAM, you can now manage CIDR allocations […]

Although mainframe platforms still release new capabilities, customers are dealing with core-business application stacks that have accumulated substantial technical debt over decades. Applications use outdated technical components, interfaces, patterns, and data formats. This technical debt is the main factor causing negative impacts on release cycles, maintenance costs, and business outcomes. This critical issue can be […]

Hackers can remotely steal your Windows login NTLM passwords through a vulnerability in Outlook's calendar feature.

The Impacts of Quantum Computers on the Finance Sector | CSA

- cloudsecurityalliance.org - January 29, 2024

Quantum finance holds great potential. However, quantum computing also poses a threat to traditional cryptographic systems which banks rely on.

DX promises a more satisfied workforce, reduced burnout and lower employee churn. But can improving developer experience also reduce costs?

Looking for a great new DevOps job? Check out these available opportunities at Rackner, Cogility Software and more!

Uncover the latest findings in SaaS security, informed by Wing's extensive data analysis and AI insights.

Empowering Security: SOAR to Help Secure the Future | CSA

- cloudsecurityalliance.org - January 29, 2024

As the threat landscape and the incidence of costly cyber attacks evolves, adopt advanced Security Orchestration and Automated Response.

AI arms race in cybersecurity: From spam filters to spear phishing, AI is both defender and weapon. Learn how Cylance AI is staying ahead of the game,

Faust, the untargeted ransomware variant, highlights the need for comprehensive protection.

NSA admits purchasing Americans' internet data from shadowy brokers, bypassing court orders.

Malicious code hiding in seemingly innocent PyPI packages steals your passwords, crypto & more

We're excited to announce that Amazon Web Services (AWS) has completed its fifth annual Collaborative Cloud Audit Group (CCAG) pooled audit with European financial services institutions under regulatory supervision. At AWS, security is the highest priority. As customers embrace the scalability and flexibility of AWS, we're helping them evolve security and compliance into key business […]

Empowering Security: SOAR to Help Secure the Future | CSA

- cloudsecurityalliance.org - January 29, 2024

As the threat landscape and the incidence of costly cyber attacks evolves, adopt advanced Security Orchestration and Automated Response.

The Essential Traits of a Successful CISO | CSA

- cloudsecurityalliance.org - January 29, 2024

Unlock the path to CISO success by delving into the critical traits and challenges faced in the dynamic world of cybersecurity leadership.

The Impacts of Quantum Computers on the Finance Sector | CSA

- cloudsecurityalliance.org - January 29, 2024

Quantum finance holds great potential. However, quantum computing also poses a threat to traditional cryptographic systems which banks rely on.

DEVOPS WEEKLY ISSUE #682 - 28th January 2024

- devopsweeklyarchive.com - January 28, 2024

Posts on addressing the fear of automation, continuous integration and what 2024 has in store for Devops, plus tools for managing repos at scale, synthetic monitoring and API definition.

SRE Weekly Issue #409 – SRE WEEKLY

- sreweekly.com - January 28, 2024

I've occasionally wondered what's behind Slack's

Linux: Create Encrypted Tunnels with SSH Port Forwarding

- thenewstack.io operations - January 27, 2024

If you are looking to create a encrypted tunnel from one Linux instance to another, the bet choice is SSH port forwarding.

Mexican banks under attack! Spear-phishing campaign using modified AllaKore RAT targets large companies.

Amazon Inspector is an automated vulnerability management service that continually scans Amazon Web Services (AWS) workloads for software vulnerabilities and unintended network exposure. Amazon Inspector has expanded capability that allows customers to export a consolidated Software Bill of Materials (SBOM) for supported Amazon Inspector monitored resources, excluding Windows EC2 instances. Customers have asked us to […]

Scalable database management for the digital enterprise

- GCP devops/sre blogs - January 26, 2024

Step-by-step instructions on how to set up a backup environment, create a backup job, and restore a database from a backup.

Tips and tricks to reduce cold start latency on GKE

- GCP containers blogs - January 26, 2024

Google Kubernetes Engine supports multiple techniques to reduce cold start latency, so you can deliver responsive services - even while autoscaling.

Member post originally published on Fairwinds' blog by Joe Pelletier Kubernetes adoption continues to grow, enabling organizations to automate the deployment, management, and scaling of containerized…

In this post, we share the key announcements related to security, identity, and compliance at AWS re:Invent 2023, and offer details on how you can learn more through on-demand video of sessions and relevant blog posts. AWS re:Invent returned to Las Vegas in November 2023. The conference featured over 2,250 sessions and hands-on labs, with […]

For DevOps teams, serverless computing brings a paradigm shift in how applications are built, deployed and managed.

Remediation Improves Readiness for SEC Disclosures | CSA

- cloudsecurityalliance.org - January 26, 2024

With the new SEC disclosures rule, material cybersecurity incidents need to be disclosed in 4 days. It's time to strengthen your cybersecurity processes.

SmartBear acquired Reflect, a provider of a no-code web app testing platform that leverages generative AI to create and execute tests.

Top 3 Identity Risks In Enterprise Clouds | CSA

- cloudsecurityalliance.org - January 26, 2024

Uncover the truth about cloud security knowledge gaps. Discover the top 3 identity risks.

Perfecting the Defense-in-Depth Strategy with Automation

- thehackernews.com - January 26, 2024

Castle walls for the digital age: Defense-in-Depth is the medieval fortress of cybersecurity. But even fortresses fall.

Infrastructure as Code: The Ultimate Guide

- thenewstack.io operations - January 26, 2024

IaC allows for the deployment, management and scaling of infrastructure through machine or direct-to-machine code.

Malicious Google ads for banned messaging apps like Telegram are dropping RATs on devices.

Russian national Vladimir Dunaev sentenced to 5 years and 4 months for TrickBot malware involvement.

Microsoft confirms Russian hackers who breached them in November are now targeting more organizations.

Cisco's Unified & Contact Center solutions have a CRITICAL flaw (CVE-2024-20253) allowing remote attackers to take control.

It is often challenging to consistently apply resource tags that deliver organizational benefits such as accurate cost allocation and granular access controls. Organizations often face issues with cleaning up resources in lower environments created by developers during early stages of development and testing. Without proper tagging, it can be difficult to identify experimental resources created […]

It is often challenging to consistently apply resource tags that deliver organizational benefits such as accurate cost allocation and granular access controls. Organizations often face issues with cleaning up resources in lower environments created by developers during early stages of development and testing. Without proper tagging, it can be difficult to identify experimental resources created […]

Who is Alleged Medibank Hacker Aleksandr Ermakov?

- krebsonsecurity.com - January 26, 2024

Authorities in Australia, the United Kingdom and the United States this week levied financial sanctions against a Russian man accused of stealing data on nearly 10 million customers of the Australian health insurance giant Medibank. 33-year-old Aleksandr Ermakov allegedly stole…

Remediation Improves Readiness for SEC Disclosures | CSA

- cloudsecurityalliance.org - January 26, 2024

With the new SEC disclosures rule, material cybersecurity incidents need to be disclosed in 4 days. It's time to strengthen your cybersecurity processes.

Top 3 Identity Risks In Enterprise Clouds | CSA

- cloudsecurityalliance.org - January 26, 2024

Uncover the truth about cloud security knowledge gaps. Discover the top 3 identity risks.

Amazon Lightsail is the easiest way to get started on AWS, allowing you to get your application running on your own virtual server in a matter of minutes. Lightsail bundles all the resources you need like memory, vCPU, solid-state drive (SSD), and data transfer allowance into a predictable monthly price, so budgeting is easy and […]

Amazon Web Services (AWS) is pleased to announce the issuance of the Criteria to Assess the Information Security of Cloud Services (PiTuKri) International Standard on Assurance Engagements (ISAE) 3000 Type II attestation report. The scope of the report covers a total of 171 services and 29 global AWS Regions. The Finnish Transport and Communications Agency […]

Quiz #17 was: You're working in a GitOps environment where developers use Helm charts to manage Kubernetes deployments. One day, a developer makes a

Diffblue has integrated its automated unit testing platform for Java with the DevSecOps platform from GitLab.

This year's trends in DDoS attacks reveal a complex and evolving threat landscape. Learn more.

New Relic Pathpoint enables DevOps teams to better understand the potential business impact of any change to an IT environment.

Custom Organization Policies is now generally available. The powerful new extension to Org Policies can create granular resource policies to address cloud governance requirements.

Platform engineers can enable developers to build better APIs

- GCP devops/sre blogs - January 25, 2024

Platform engineers can influence API development by following best practices and implementing DevOps design patterns.

CNCF is delighted to announce the finalized schedule for KubeCon + CloudNativeCon Europe 2024 in Paris, France from 19 to 22 March. From AI to WASM, eBPF, and environmental sustainability, KubeCon +…

Edge Native Design Behaviors Explained

- cncf.io - January 25, 2024

Community post by Brandon Wick View the full Edge Native Application Design Behaviors Whitepaper Cloud native application design best practices have been well established, with a notable example being…

GRC and Continuous Controls Monitoring | CSA

- cloudsecurityalliance.org - January 25, 2024

Continuous Controls Monitoring provides real-time insights via automation, data-driven governance, and proactive risk mitigation.

Member Community post originally published on Humanitec's blog by Kaspar von Grünberg, CEO at Humanitec Platform Orchestration might be a relatively new concept, but it is going to radically transform…

Cybersecurity experts reveal the inner workings of SystemBC's command-and-control (C2) server, a dangerous malware available on the dark web.

DevOps security (DevSecOps) is about breaking down silos and promoting open collaboration across teams with the ultimate goal being security.

What is the Shared Responsibility Model in the Cloud? | CSA

- cloudsecurityalliance.org - January 25, 2024

Learn how the shared responsibility model is applied to security, governance, compliance, and BC/DR in cloud computing.

The Evolution of DevOps - DevOps.com

- devops.com - January 25, 2024

Success as a DevOps engineer requires understanding how the field evolved and what are the best practices and skills needed today.

The explosion of new AI APIs, libraries and frameworks has the potential to increase technical debt and overwhelm DevOps teams.

APT10, a Chinese nation-state hacking group, has updated its LODEINFO backdoor to target Japanese organizations with fileless malware.

Critical Jenkins RCE vulnerability (CVE-2024-23897) discovered. Hackers can remotely control your CI/CD pipelines.

A Hybrid Cloud Attack & Intelligence-Driven Incident Response | CSA

- cloudsecurityalliance.org - January 25, 2024

Discover intelligence-driven incident response strategies to outsmart cloud attackers. Real-world insights for effective defense.

Get the Axur report's comprehensive analysis & actionable insights to navigate the evolving cyber threat landscape

China-linked group called Blackwood is hijacking updates for popular apps like Tencent QQ & WPS Office to inject their sophisticated "NSPX30" spyware

New Go-based CherryLoader Malware Mimics Note-Taking App, using a spooky fileless technique called process ghosting to run exploits.

Major Tech Giant HP Enterprise Hacked by Russian Intelligence Group Linked to DNC Breach

Using Google Search to Find Software Can Be Risky

- krebsonsecurity.com - January 25, 2024

Google continues to struggle with cybercriminals running malicious ads on its search platform to trick people into downloading booby-trapped copies of popular free software applications. The malicious ads, which appear above organic search results and often precede links to legitimate…

GRC and Continuous Controls Monitoring | CSA

- cloudsecurityalliance.org - January 25, 2024

Continuous Controls Monitoring provides real-time insights via automation, data-driven governance, and proactive risk mitigation.

A Hybrid Cloud Attack & Intelligence-Driven Incident Response | CSA

- cloudsecurityalliance.org - January 25, 2024

Discover intelligence-driven incident response strategies to outsmart cloud attackers. Real-world insights for effective defense.

What is the Shared Responsibility Model in the Cloud? | CSA

- cloudsecurityalliance.org - January 25, 2024

Learn how the shared responsibility model is applied to security, governance, compliance, and BC/DR in cloud computing.

IDC determined that Google Cloud's SecOps platform delivers ROI of 407% over three years, with a payback period under 7 months.

Today, we are delighted to announce the launch of the AWS Well-Architected Migration Lens White Paper. The Migration Lens extends the Well-Architected Framework to include best practices and implementation guidance that you can apply to your migration program across the three migration phases: Assess, Mobilize, and Migrate. Since 2015, the AWS Well-Architected Framework has been […]

A survey found only 20% of IT and security professionals are confident in their ability to detect a vulnerability before an app is released.

Community post originally published on Ash Sharma's personal blog On the wall across from my desk, I've got badges from all the conferences I've been to. The collection has grown quite a bit over the…

At KubeCon + CloudNativeCon Europe, we will be holding our first-ever hackathon, CloudNativeHacks. The Paris edition is focused on hacking for a more sustainable future. CNCF is collaborating with the…

FBot: Python-Based Malware Targeting Cloud & Payment Services | CSA

- cloudsecurityalliance.org - January 24, 2024

FBot: A unique Python-based hacking tool targeting web servers, cloud services, AWS, Office365, PayPal, Sendgrid, and Twilio.

Time to Get the Garbage out of WebAssembly

- thenewstack.io operations - January 24, 2024

Garbage collection has become a standard feature for WebAssembly in its development, showing progress on many fronts. But what is

Cybersecurity researchers have discovered a critical loophole in Google Kubernetes Engine (GKE) that could potentially be exploited by threat actors

What to Know About the New EU AI Act | CSA

- cloudsecurityalliance.org - January 24, 2024

Policymakers in the European Union have reached a provisional agreement on new rules to govern AI models. Here are 10 things to know about the new EU AI Act.

Configuration-as-code allows for a version-controlled, reproducible and automated method of managing environments.

Venafi added an ability to prevent unauthorized code from running in IT environments that use its machine identity management platform.

Agile is no Excuse - DevOps.com

- devops.com - January 24, 2024

Agile doesn't excuse bad communications, and DevOps is not short for 'random change on a whim.' Don MacVittie explains.

Kasseika, the latest ransomware kid on the block, is using a sneaky trick called BYOVD to disarm your defenses before encrypting your files! It even

What is Nudge Security and How Does it Work?

- thehackernews.com - January 24, 2024

Learn how you can regain control of SaaS security and governance with a scalable solution purpose-built for the modern workforce.

Whole-of-State Cybersecurity: Why it Matters | CSA

- cloudsecurityalliance.org - January 24, 2024

A “whole-of-state” security strategy fosters collaboration across the entire state, in a way that spans every geographical region and level of government.

Open Source Boon or Bane? Your Code's Hidden Vulnerabilities Exposed! Traditional SCAs fall short against stealthy supply chain attacks.

Governments from Australia, the U.K., and the U.S. have imposed financial sanctions on a Russian hacker tied to Medibank attack, data of 9.7M exposed.

GoAnywhere users, listen up! Critical bug (CVE-2024-0204) lets anyone become admin. Update to 7.4.1 immediately.

Negotiability is non-negotiable

- surfingcomplexity.blog - January 24, 2024

I've just started reading Trust in Numbers: The Pursuit of Objectivity in Science and Public Life by the historian of science Theodore Porter, and so far it's fantastic. The first chapt…

FBot: Python-Based Malware Targeting Cloud & Payment Services | CSA

- cloudsecurityalliance.org - January 24, 2024

FBot: A unique Python-based hacking tool targeting web servers, cloud services, AWS, Office365, PayPal, Sendgrid, and Twilio.

Introduction The Amazon Elastic Kubernetes Service (Amazon EKS) team is pleased to announce support for Kubernetes version 1.29 in Amazon EKS, Amazon EKS Distro, and Amazon EKS Anywhere (v0.19.0). The theme for this version was chosen for the beautiful art form that is Mandala—a symbol of the universe in its perfection. Hence, the fitting release […]

Mobb added an ability to instantly surface patches for vulnerabilities at the time when code is being committed during a DevSecOps workflow.

Why Broadcom Is Killing off VMware's Standalone Products

- thenewstack.io operations - January 23, 2024

VMware's roots are everywhere, and pulling them up is going to unearth a lot of dirt. The acquisition seriously changes the relationship customers will have with the new version of the company going forward.

Legit Security expanded the scope of its ASPM platform to make use of AI to discover vulnerable application secrets more accurately.

GitOps for Databases on Kubernetes

- thenewstack.io operations - January 23, 2024

The case for applying the Operator Pattern to database migrations.

IDPs Give Developers More Freedom to Write Code

- thenewstack.io operations - January 23, 2024

Red Hat's Markus Eisele says that in an IT world of AI, security concerns, and regulations, internal developer platforms lift many of the mundane tasks.

Community post by Danielle Cook and Simon Forster, CNCF Ambassadors and members of the Cartografos Working Group The last year has seen cloud native projects put on hold, layoffs announced…

Member post originally published on DZone's blog by Sameer Danave In this article, learn about the influence of AI, key tech predictions, and the evolving landscape in cloud infrastructure.

Farewell to the Internet's Master Timekeeper: David Mills

- thenewstack.io networking - January 23, 2024

Dr. David L. Mills, the visionary behind the Network Time Protocol (NTP) that synchronizes time across billions of devices globally, has died.

Massive "Criminal Affiliate Program" Exposed: VexTrio Brokers Traffic for 60+ Cybercriminals, Including ClearFake & SocGholish.

This is a guest post co-written with Roshan Raj, Cloud Network Specialist at ZS Associates In this blog post, we will highlight challenges faced by ZS to keep cost under control while managing a large, complex global network infrastructure which spans across multiple AWS Regions. We will show how ZS used Network Orchestration for AWS […]

This post explores ways to provide mutual TLS authentication for private API Gateway endpoints. A previous post shows how to achieve this using a self-managed NGINX proxy. This post simplifies the architecture by using the native mTLS support now available for Application Load Balancers.

From the death of the modern data stack sprawl to the birth of generative AI, 2024 is the beginning of a new era in infrastructure tech.

Did you download Warbeast2000 or Kodiak2k from npm? If so, your SSH keys might be compromised! These packages steal keys & upload them to GitHub.

CISO's Checklist: Train Employees on SaaS Security | CSA

- cloudsecurityalliance.org - January 23, 2024

End-user behaviors are the primary cause behind SaaS security incidents. Help your end-users avoid falling for these common SaaS threats.

Network APIs can open up innovations for industrial robots, real-time streaming of immersive video using multiple cameras and much more.

Malicious "Activator" booby-traps DMG files on macOS, tricking users into granting admin access. It then steals crypto wallet data and system info.

DDoS Attacks Doubled in Size in Just 2 Years! 46% of DDoS attacks target the gaming industry, disrupting gameplay and costing companies millions.

Segregate Dev, Testing, and Production Environments | CSA

- cloudsecurityalliance.org - January 23, 2024

As organizations move data to the cloud, a key challenge is segregating their cloud environments. Explore the importance of segregation in the cloud.

Works Commences on the Observability Query Language Standard

- thenewstack.io operations - January 23, 2024

The Observability Query Language Standard working group seeks to establish a unified standard for observability languages.

Cyber Crime Marketplace Mastermind, 21, Walks Free (Mostly). Fitzpatrick, creator of BreachForums, avoids prison but faces strict monitoring.

In this comprehensive ingress guide, you will learn how to setup Nginx ingress controller on Kubernetes and configure

Hackers are actively exploiting a critical Atlassian Confluence flaw (CVE-2023-22527) within days of its reveal.

Apple fixes first "in-the-wild" zero-day of 2024. Update iPhones, iPads, and Macs NOW!

Introduction Since its first appearance on AWS in 2015, Red Hat OpenShift service on AWS (ROSA) has had a similar architecture. Regardless of it being OpenShift 3 or OpenShift 4, self-managed OpenShift Container Platform (OCP), or managed ROSA. All this time customers query the Control Plane existing within their AWS account and explore getting the […]

Chronosphere has acquired Calyptia to add additional pipeline management capabilities to its observability platform.

New York, U.S.A., January 22nd, 2024, Cyberwire Memcyco will showcase its solutions at Deloitte's annual Cyber iCON event, demonstrating how organizations

Enterprises often have an identity provider (IdP) for their employees and another for their customers. Using multiple IdPs allows you to apply different access controls and policies for employees and for customers. However, managing multiple identity systems can be complex. A unified authorization layer can ease administration by centralizing access policies for APIs regardless of […]

This post was co-authored with Thiru Bhat, Director CSO-CM, Office of the CTO, VMware VMware has been developing virtualization software since 1998. Headquartered in Palo Alto, California, the company is known for its application modernization, cloud, networking, security, and digital workspace offerings. They require a thorough and all-encompassing approach to ensure that corporate controls and […]

As usual, a lot has happened in the Amazon Web Services (AWS) universe this past week. I'm also excited about all the AWS Community events and initiatives that are happening around the world. Let's take a look together! Last week's launches Here are some launches that got my attention: Amazon Elastic Container Service (Amazon ECS) […]

Java & Android Libraries Vulnerable: New "MavenGate" Attack Hijacks Apps! Hackers exploit abandoned libraries to inject malicious code

North Korea's ScarCruft targeting media & experts! A new attack campaign using fake threat reports & infected ZIPs aimed at gathering intel on North

CISO Phil Venables explains in his newsletter how new breach disclosure rules from the SEC can help business leaders achieve a more mature security posture.

Cloud Run now supports Managed Service for Prometheus

- GCP devops/sre blogs - January 22, 2024

Managed Service for Prometheus now lets you instrument an application with metrics once, and deploy it on Compute Engine, GKE, or Cloud Run.

We're excited to announce that Amazon Web Services (AWS) has completed the first cloud service provider (CSP) audit by the Ingelheim Kreis (IK) Initiative Joint Audits group. The audit group represents quality and compliance professionals from some of our largest pharmaceutical and life sciences customers who collectively perform audits on their key suppliers. As customers […]

Ambassador post originally published on Logz.io's blog by Dotan Horovits With 2023 drawing to a close, the final OpenObservability Talks of the year focused on what happened this year in open source…

State of Zero Trust Across Industries | CSA

- cloudsecurityalliance.org - January 22, 2024

Okta's State of Zero Trust report shows how healthcare, the public sector, financial services, and software companies fared in 2023.

The New U.S. Policy for Artificial Intelligence | CSA

- cloudsecurityalliance.org - January 22, 2024

The Executive Order on the Safe, Secure, and Trustworthy Development and Use of AI informs genAI best practices. Here are a few key topics it covers.

Looking for a great new DevOps job? Check out these available opportunities at Tesla, University of Wisconsin and more!

PCI DSS 3.2 vs. 4.0-Understanding the Difference | CSA

- cloudsecurityalliance.org - January 22, 2024

Take a look at PCI DSS 4.0 and how the updated version can help your organization strengthen its security program.

A global survey of site reliability engineers (SREs) found diagnosing issues is the most difficult aspect of incident management.

52% of Serious Vulnerabilities We Find are Related to Windows 10 | Read more hacking news on The Hacker News cybersecurity news website and learn how to protect against cyberattacks and software vulnerabilities.

Alert! New Java malware "NS-STEALER" uses bots to steal your logins and wallet data from popular browsers and exfiltrates secrets via Discord.

FTC clamps down on InMarket for selling precise location data without consent

alert! Critical vulnerability still being exploited for ransomware, rootkits, and more.

DEVOPS WEEKLY ISSUE #681 - 21st January 2024

- devopsweeklyarchive.com - January 21, 2024

A great excerpt from the new book Deming's Journey to Profound Knowledge to kick things off this week, alongside posts on user centred IT, measuring developer productivity, environment provisioning, DSL geekery and more. Enjoy.

SRE Weekly Issue #408 – SRE WEEKLY

- sreweekly.com - January 21, 2024

This is either a set of SRE interview topics or the squares for the SRE bingo card.

Secure Remote Linux Server Logins with SSH Key Authentication

- thenewstack.io operations - January 20, 2024

If you do any remote Linux work with the Secure Shell, you shouldn't assume that it's locked down by default. Here is how to set up key authentication.

A China-linked cyber espionage group called UNC3886 has been exploiting a zero-day vulnerability in VMware vCenter Server (CVE-2023-34048).

CISA issues emergency directive against two major zero-day actively exploited flaws in Ivanti products.

Microsoft discloses Russian APT infiltrated its systems through a test account, stealing emails and attachments of senior executives.

TA866 is back with thousands of invoice-themed, booby-trapped emails targeting users with WasabiSeed and Screenshotter malware.

Amazon Elastic Container Service (ECS) deploys and manages your containerized tasks on AWS infrastructure. Customers can avoid the need to maintain compute instances by using Amazon ECS to deploy tasks on serverless AWS Fargate capacity. But some customers prefer to use Amazon ECS with Amazon Elastic Compute Cloud (Amazon EC2) as capacity. Using Amazon EC2 […]

Amazon Web Services is pleased to announce that eight additional AWS services have been added to the scope of our Payment Card Industry Data Security Standard (PCI DSS) v4.0 certification: AWS AppFabric Amazon Bedrock AWS Clean Rooms AWS HealthImaging AWS IoT Device Defender AWS IoT TwinMaker AWS Resilience Hub AWS User Notifications Coalfire, a third-party […]

Canadian Man Stuck in Triangle of E-Commerce Fraud

- krebsonsecurity.com - January 19, 2024

A Canadian man who says he's been falsely charged with orchestrating a complex e-commerce scam is seeking to clear his name. His case appears to involve "triangulation fraud," which occurs when a consumer purchases something online -- from a seller…

Get AI help in creating microservices and kubernetes

- GCP devops/sre blogs - January 19, 2024

Kubernetes is great for deploying microservices, but tracking them once deployed can be a challenge. Get information from logs faster with Duet AI.

Ambassador post by Saim Safdar Implementing Multi-tenancy patterns is becoming increasingly prominent helping drive maximizing resource utilization, reducing operational overhead…

Member post by DatenLord Why is deduplication of commands necessary? In a system that receives external commands, it is common for a command to be executed at least once, which we refer to as at-least…

GitOpsCon Europe 2023 and beyond!

- cncf.io - January 19, 2024

Community post by Christian Hernandez, head of community, Akuity GitOpsCon Europe 2023 took place, virtually, on December 5th and 6th. It took place as multiple tracks, spread over two half days.

Clarifying 10 Cybersecurity Terms | CSA

- cloudsecurityalliance.org - January 19, 2024

Clarify the definitions of 10 cybersecurity terms and take your first steps toward a more robust security posture.

Grafana Seeks to Correct Observability's Historic 'Terrible Job'

- thenewstack.io operations - January 19, 2024

New Grafana tools like Adaptive Metrics and the Cost Management Hub help organizations better deal with the deluge of observability data.

Demo: Use WebAssembly to Run LLMS on Your Own Device with WasmEdge

- thenewstack.io operations - January 19, 2024

In this demo of WasmEdge, Second State's Michael Yuan shows how to create a lightweight execution environment for the operation of large language models.

Decoding GenAI's Cybersecurity Trends of 2023 | CSA

- cloudsecurityalliance.org - January 19, 2024

It was almost a year ago when ChatGPT brought generative AI to the masses. Here are 5 key observations that will determine the direction cybersecurity takes this next year.

Real-time app monitoring is about fundamentally shifting your mindset toward a culture of accountability and continuous improvement.

Thinking of downloading a pirated copy of that software? Think again. A new backdoor malware has been discovered in pirated macOS apps.

Cyber threats are on the rise! Learn how ransomware attacks and vulnerabilities like ProxyLogon are causing data loss in Exchange Servers

Predicting Monthly CVE Disclosure Trends with SARIMAX | CSA

- cloudsecurityalliance.org - January 19, 2024

The number of CVEs is a good indicator of the threat landscape. Learn how a time series approach (SARIMAX model) can be used to predict 2024 CVE counts.

Port Knocking Ubuntu Servers (or Containers) for More Secure SSH

- thenewstack.io operations - January 19, 2024

Port knocking works by closing off all ports and only opening them 'on demand,' according to a pre-determined sequence of pings.

Malicious "oscompatible" package on npm deployed a sophisticated trojan on Windows machines. Keep your software up-to-date.

A critical flaw (CVE-2023-35082) in Ivanti EPMM is being exploited in the wild, giving attackers access to your data.

Today's applications collect a lot of data from customers. The data often includes personally identifiable information (PII), that must be protected in compliance with data privacy laws such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). Modern business applications require fast and reliable access to customer data, and Amazon […]

This post demonstrates using AWS CloudFormation StackSets to deploy CloudFormation Hooks from a centralized delegated administrator account to all accounts within an Organization Unit(OU). It provides step-by-step guidance to deploy controls at scale to your AWS Organization as Hooks using StackSets. By following this post, you will learn how to deploy a hook to hundreds […]

For decades, we've watched energy companies attempt to bring off-the-shelf information technology (IT) systems into operations technology (OT) environments. These attempts have had varying degrees of success. While converging OT and IT brings new efficiencies, it also brings new risks. There are many moving parts to convergence, and there are several questions that you must […]

We are proud to announce the DevOps Dozen² 2023 honorees, celebrating the greatest leaders and innovators in the DevOps space.

A new attack targets Docker servers and uses a combo of cryptocurrency mining and website traffic generation for profit.

Personalized Service Health shows emerging incidents

- GCP networking blogs - January 18, 2024

Personalized Service Health now alerts on emerging incidents, providing speedy, personalized notification of incidents to impacted customers.

New Cloud Monitoring metrics in BigQuery let you combine billing data with resource utilization metrics, to perform detailed analyses in BigQuery.

Weekly.tf Issue #156

- weekly.tf - January 18, 2024

Steps to Building Terragrunt Orchestrator, ChatGPT by Azure Terraformer, Managing AWS Security Groups

Member post originally published on Nirmata's blog by Jim Bugwadia Do policies that mutate or generate resources violate GitOps principles? In this blog post, I will show you how policy-based resource…

By Christophe Sauthier, Cloud Native Training and Certification Lead, CNCF A recent CNCF micro-survey focused on training and certification revealed that the vast majority of IT professionals are…

AWS Network Manager is a great tool that lets you monitor changes in your network and create automations. In this post, we cover how to leverage events in Network Manager to get notified about network changes and how to use AWS Serverless technologies to enrich the information provided by these events. Let's start with a simple question: What is Network […]

Introduction This blog post is for customers who want to implement automated tagging controls and strategy for cost allocation. Customers want to centralize and maintain consistency for tags across AWS Organizations so they are available outside their AWS environment (e.g. in build scripts, etc.) or enforce centralized conditional tagging on existing and new AWS resources […]

The Russia-linked threat actor known as COLDRIVER has been observed evolving its tradecraft to go beyond credential harvesting to deliver its first-ev

Why You Need a Vulnerability Disclosure Program (VDP) | CSA

- cloudsecurityalliance.org - January 18, 2024

A Vulnerability Disclosure Program/Responsible Disclosure Program is a publicly accessible framework for responding to cybersecurity threats.

Cisco Gets Cilium: What It Means for Developers

- thenewstack.io cloud-native - January 18, 2024

Cisco's acquisition of Isovalent means Cisco gets Cilium, which leverages eBPF (Extended Berkeley Packet Filter) for kernel-level networking and security.

Hybrid clouds cater to the strategic shift toward more agile, responsive and cost-effective IT operations.

Vulnerabilities found in TensorFlow CI/CD pipeline allow malware upload and token theft.

Experts offer insight into the trends, transformations and breakthroughs that will redefine the DevOps landscape in 2024.

MFA Spamming and Fatigue: When Security Measures Go Wrong

- thehackernews.com - January 18, 2024

MFA spamming attacks! Hackers are now targeting users with overwhelming MFA prompts, risking security.

Creating an Incident Response Plan for Email Attacks | CSA

- cloudsecurityalliance.org - January 18, 2024

With threats continuously evolving and appearing, you must be prepared to respond quickly to a business email compromise attack.

Multiple vulnerabilities, known as PixieFail, have been discovered in widely used UEFI firmware, putting modern computers at risk.

"Mind Sandstorm," an Iranian cyber espionage group, has targeted experts in Middle Eastern affairs across several countries.

The Bulikula and Halaihai subsea cables will connect Guam with Fiji and French Polynesia to increase central Pacific connectivity.

Introduction Scaling Kubernetes networking is key to addressing the growth of services and future-proofing infrastructure as the digital landscape continues to evolve. The need for a unique IP address per pod intersects with the challenges of limited IPv4 address space. The finite pool of available IPv4 addresses often forces Kubernetes cluster administrators to use alternatives […]

Introduction In Part 1 of this blog series we covered the foundation of Amazon Elastic Kubernetes Service (Amazon EKS) IPv6 clusters and the deep integration into the underlying Amazon Virtual Private Cloud (Amazon VPC) dual-stack IP mode. As customers evaluate their migration strategies to IPv6 to harness the benefits of scale and simplicity, they need […]

Introduction So far, in Part 1 and Part 2 of this blog series we covered the foundational aspects of Amazon Elastic Kubernetes Service (Amazon EKS) IPv6 clusters and highlighted key patterns for implementing IPv6 to future-proof your networks. Besides configuring your IPv6 Amazon EKS clusters, migration to the world of IPv6 involves careful infrastructure planning […]

In this guide, we will look at Prometheus architecture in detail. Prometheus is an open-source monitoring and alerting

Cloud migrations and modernization are a lengthy, intricate, and continually evolving processes. Despite this, McKinsey studies indicate that customers are increasing cloud budgets and the number of applications that they plan to migrate. One of the primary complexities of migration and modernization projects are that collaboration with stakeholders can be cumbersome, relying on random ad-hoc […]

Red Hat Developer Hub: An Enterprise-Ready IDP

- thenewstack.io operations - January 17, 2024

Based on Backstage, Red Hat Developer Hub, an Internal Developer Platform, provides a suite of tools and features to streamline and enhance the development process.

E-Crime Rapper 'Punchmade Dev' Debuts Card Shop

- krebsonsecurity.com - January 17, 2024

The rapper and social media personality Punchmade Dev is perhaps best known for his flashy videos singing the praises of a cybercrime lifestyle. With memorable hits such as "Internet Swiping" and "Million Dollar Criminal" earning millions of views, Punchmade has…

Swimm has added a chat tool that enables developers to use natural language to surface insights into code.

Personalized Service Health is now generally available

- GCP devops/sre blogs - January 17, 2024

Personalized Service Health provides visibility into incidents relevant to your environment, allowing you to evaluate their impact and track updates.

Prompt engineering became a thing in 2023 and will stop being a thing in 2024. Don MacVittie explains why.

By Chris Aniszczyk We have been tracking open source project velocity over the last several years and wanted to share the latest update highlighting open source project velocity over the last 12…

Member post originally published on Medium by Greptime WebAssembly is a new instruction format that offers cross-platform compatibility and execution speeds close to native machine code.

What Got Us Here: A CISO's Perspective | CSA

- cloudsecurityalliance.org - January 17, 2024

Discover key takeaways from 'What Got You Here Won't Get You There' by Marshall Goldsmith, and how they apply to cybersecurity.

DataStax GAs 'Data API' for GenAI Application Development

- thenewstack.io operations - January 17, 2024

The new API is aimed squarely at JavaScript and Python developers building vector-first RAG/LLM generative AI applications.

Amazon CSO Stephen Schmidt AWS re:Invent drew 52,000 attendees from across the globe to Las Vegas, Nevada, November 27 to December 1, 2023. Now in its 12th year, the conference featured 5 keynotes, 17 innovation talks, and over 2,250 sessions and hands-on labs offering immersive learning and networking opportunities. With dozens of service and feature […]

Popular PAX PoS systems used in countless stores worldwide are vulnerable to crippling attacks.

Wing Security now offers unparalleled control over AI and AI-powered SaaS applications, safeguarding your company's valuable IP and data.

SaaS and Compliance | CSA

- cloudsecurityalliance.org - January 17, 2024

Explore how to keep your Software-as-a-Service (SaaS) applications in compliance with relevant regulations and standards.

CISA & FBI warn of a growing AndroxGh0st botnet targeting AWS, Microsoft Office 365, SendGrid, and Twilio credentials.

Is a SOC 2 Auditor There to Find Gaps in Our System? | CSA

- cloudsecurityalliance.org - January 17, 2024

During the SOC 2 audit process, the auditor might identify gaps or control exceptions, but their role encompasses much more than that.

Discover how a simple 'Shutdown.log' file on your iPhone could be the key to identifying the presence of notorious spyware.

Hackers can scale from basic user to network kingpin. Learn their secret weapon & how to stop them in "Art of Privilege Escalation."

A high-severity bug (CVE-2024-0200) could've allowed attackers to access credentials in production containers on GitHub.

Citrix Patches Critical RCE Vulnerabilities (CVE-2023-6548, CVE-2023-6549) Exploited in Wild.

Chrome Zero-Day Alert! Update NOW to patch a critical flaw exploited by hackers. This memory leak bug lets attackers steal your secrets.

In part 1, we discussed how to use Amazon SageMaker Studio to analyze time-series data in Amazon Security Lake to identify critical areas and prioritize efforts to help increase your security posture. Security Lake provides additional visibility into your environment by consolidating and normalizing security data from both AWS and non-AWS sources. Security teams can […]

OpenTofu 1.7 General Availability: Open Source Infrastructure-as-Code

- thenewstack.io operations - January 16, 2024

Moving forward, the plan is for OpenTofu to maintain compatibility with Terraform while introducing significant new features.

We are launching three new modules for AWS Supply Chain today. These modules are designed to help you collaborate with your suppliers across all tiers of your supply chain, with the goal of helping you to maintain optimum inventory levels at each site in the chain. Here's an overview: Supply Planning – This module helps […]

AI assisted cloud reliability engineering

- GCP devops/sre blogs - January 16, 2024

Improve your SRE practices with Duet AI assistive development, logs analysis and infrastructure advice.

Community post originally published on DEV.to by Sunny Bhambhani In this article we will be talking about i.e. how to get multiple helm charts installed using helmfile. If you haven't read the…

Demystifying Cloud Security: Why the CCZT Matters | CSA

- cloudsecurityalliance.org - January 16, 2024

Delve into the benefits of CSA's Certificate of Competence in Zero Trust (CCZT), a comprehensive cloud security course and certificate.

This post is written by Anna Spysz, Frontend Engineer, AWS Application Composer AWS Application Composer launched in the AWS Management Console one year ago, and has now expanded to the VS Code IDE as part of the AWS Toolkit. This includes access to a generative AI partner that helps you write infrastructure as code (IaC) […]

Over 178,000 SonicWall firewalls are vulnerable to security flaws. These flaws could lead to denial-of-service (DoS) conditions and RCE attacks

Top 5 Non-Human Access Attacks of 2023 | CSA

- cloudsecurityalliance.org - January 16, 2024

The top 5 high profile non-human access attacks in 2023 and what we can learn from them.

Multi-cloud environments involve businesses using services from multiple cloud providers to meet diverse operational needs.

reaking News: Remcos RAT, a stealthy remote access trojan, is now spreading in South Korea disguised as adult-themed games via webhards

The dynamic nature of data analytics workloads, coupled with data transfer expenses between multiple clouds, contributes to complexity.

AWS Threat: AMBERSQUID Cloud-Native Cryptojacking | CSA

- cloudsecurityalliance.org - January 16, 2024

AMBERSQUID tactically exploits less-known AWS services (Amplify, Fargate, SageMaker), costing victims $10,000+/day.

OpenTofu 1.6 General Availability: Open Source Infrastructure as Code

- thenewstack.io operations - January 16, 2024

Moving forward, the plan is for OpenTofu to maintain compatibility with Terraform while introducing significant new features.

Did you know a simple cookie misconfiguration can cost millions in fines? See how a major retailer's overlooked issue nearly led to a privacy disaster

Over 137,000 people lost crypto to Inferno Drainer, a malware-as-a-service scam operating for a year.

Cybercriminals are weaponizing the CVE-2023-36025 Windows vulnerability to deploy Phemedrone Stealer, an open-source information stealer

Introduction On October 4, 2023, Amazon Elastic Kubernetes Service (Amazon EKS) announced the public preview of extended support for Kubernetes versions, which gives you an additional 12 months of support for Kubernetes minor versions. Today, we are announcing the pricing for extended support. Amazon EKS clusters running on a Kubernetes version in the extended support […]

If you run Windows workloads on Amazon Elastic Compute Cloud (Amazon EC2), monitoring the health and performance of your Windows Services is essential for reliable systems administration. It's not just about ensuring uptime; it's about having a pulse on your system's health and performance. With a variety of services operating in the background, each playing […]

Project post by Wenbo Qi of Dragonfly Git LFS (Large File Storage) is an open-source extension for Git that enables users to handle large files more efficiently in Git repositories. Git is a version…

We are in January, the start of a new year, and I imagine many of you have made a new year resolution to learn something new. If you want to learn something new and get a free Amazon Web Services (AWS) Learning Badge, check out the new Events and Workflows Learning Path. This learning path […]

Critical security flaw found in Opera Browsers. MyFlow sync feature lets attackers take over your Windows and macOS systems.

3 Ransomware Group Newcomers to Watch in 2024

- thehackernews.com - January 15, 2024

2023 witnessed a shocking 55.5% increase in ransomware victims! Over 4,368 cases reported globally. Stay ahead in the cybersecurity game.

This skills gap prevents companies from leveraging the power of quantum computing and also leads to expensive competition for talent.

Looking for a great new DevOps job? Check out these available opportunities at Booz Allen Hamilton, Pozent and more!

Over 7,100 WordPress sites have been hit by the 'Balada Injector' malware, which exploits sites using a vulnerable version of the Popup Builder plugin

Bosch's smart devices have high-severity vulnerabilities, posing a risk to your thermostat and smart nutrunners

Environmental services face an unprecedented 61,839% surge in cyber attacks! Discover why this industry is the new hotspot for hackers.

DEVOPS WEEKLY ISSUE #680 - 14th January 2024

- devopsweeklyarchive.com - January 14, 2024

Posts and tools on alert fatigue, scaling infrastructure management, developer portals, OpenTelemetry and package managers this week. Enjoy.

Surprise twist in Denmark cyber attacks - Not the work of Russia's Sandworm. New evidence shifts the narrative. Discover more

SRE Weekly Issue #407 – SRE WEEKLY

- sreweekly.com - January 14, 2024

Juniper Networks addresses a major 9.8-rated RCE vulnerability in SRX Series firewalls & EX Series switches.

29-year-old Ukrainian arrested for a major cryptojacking scheme, netting over $2M in profits.

Many organizations generate large quantities of data locally, including digital imagery, sensor data, and more. Customers require local compute and storage to ingest and enable real-time predications based on their data, and often preprocess this data locally before transferring to the cloud to unlock additional business value such analysis, reporting, and archiving. Automating transfers to […]

This post is an extension of our Container Image Signing blog series. In our first post, we discussed the motivations and fundamental concepts behind cryptographic signing for containers. Introduction Organizations today are adding additional security measures to their software development lifecycles (SDLC) due to compliance, governance, or executive requirements. For containerized applications, one such security […]

Introduction The AWS Load Balancer Controller is a Kubernetes Special Interest Group (SIG) project, which enables organizations reduce their Kubernetes compute costs and the complexity of their application routing configuration. As you deploy workloads on Amazon Elastic Kubernetes Service (Amazon EKS), the controller simplifies exposing those applications by automating the provisioning and management and configuration […]

Introduction Apache Kafka, a distributed streaming platform, has become a popular choice for building real-time data pipelines, streaming applications, and event-driven architectures. It is horizontally scalable, fault-tolerant, and performant. However, managing and scaling Kafka clusters can be challenging and often time-consuming. This is where Kubernetes, an open-source platform for automating deployment, scaling, and management of […]

This blog post was co-written by William Ho, Software Engineer, Airtable. Introduction Airtable is a connected applications platform that lets teams and enterprises build flexible interfaces and compose automations on top of their key data. Airtable provides so much flexibility that customers use Airtable for the most critical workflows across their organization. Today, half of […]

Demo: Rapid Vulnerability Remediation with Slim.ai

- thenewstack.io observability - January 12, 2024

In this demo, Slim.ai's Ian Riopel shows how the platform, now in beta, offers users a shared workspace for coordinating vulnerability fixes with software vendors.

Disaster recovery (DR) and business continuity planning (BCP) are critical activities for any organization. During DR operations, after workloads are restored in the DR site, there are a series of steps and activities, such as application configurations and validations, that must be properly orchestrated and coordinated among many teams and functions in order to ensure […]

Using Cloud Trace and Cloud Logging for root cause analysis

- GCP devops/sre blogs - January 12, 2024

When troubleshooting distributed applications, you can use Cloud Trace and Cloud Logging together to perform root cause analysis.

Data, the lifeblood of any modern organization, is rarely static. For high-performance applications and workloads, enterprises need the ability to run operations on massive amounts of data, including modifying the data as is necessary for each use case, to further accelerate processing. This could include modifying uploaded images with a watermark, changing the bitrate of […]

Community post by Caleb Woodbine ([email protected]) (ii.nz) The Kubernetes conformance project by CNCF ensures consistency in Kubernetes' stable APIs and core functionalities across…

Root cause chronicles: connection collapse

- cncf.io - January 12, 2024

Member post originally published on InfraCloud's blog by Joy Bhattacherjee On a usual Friday evening, Robin had just wrapped up their work, wished their colleagues a happy weekend…

Nation-state hackers weaponizing Ivanti Connect Secure VPN zero-days to deploy five malware families in a targeted cyber espionage campaign.

Medusa ransomware is on the rise. With a new data leak site on the dark web, they're pressuring victims by publishing sensitive data.

2024 Security Predictions | CSA

- cloudsecurityalliance.org - January 12, 2024

AI and quantum computing are the two hot-button issues most poised to transform cybersecurity strategies in 2024. Here's what else is in store.

Many organizations are opting to run MongoDB in the AWS cloud to gain improved scalability and reliability for their MongoDB deployment.

GitLab patches critical vulnerabilities! CVE-2023-7028 scores a perfect 10 on severity.

As organizations embrace digital transformation, the need for robust, scalable and cost-effective observability solutions becomes paramount.

Cybersecurity's harsh reality: Only 59% of attacks are prevented. Is your defense ready for the real test?" Discover how BAS can change the game.

3 Breaches and the Role of Cloud Permissions | CSA

- cloudsecurityalliance.org - January 12, 2024

Securing high-value cloud permissions should be the priority after perimeter defense. If attackers are getting in, a plan is needed for when they're in.

New cyberattack targets Apache Hadoop & Flink using misconfigurations to deploy crypto miners

CISA warns of a critical flaw in Microsoft SharePoint Server! CVE-2023-29357 poses a serious risk with a 9.8 CVSS score.

Today we are announcing that Amazon Elastic Container Service (Amazon ECS) supports an integration with Amazon Elastic Block Store (Amazon EBS), making it easier to run a wider range of data processing workloads. You can provision Amazon EBS storage for your ECS tasks running on AWS Fargate and Amazon Elastic Compute Cloud (Amazon EC2) without […]

5 Steps to Debug Development and Operations Teams

- thenewstack.io operations - January 11, 2024

Poor team performance doesn't reflect well on any team member. Here's how to find out what's wrong and work on resolving the issues.

With Amazon Cognito, you can implement customer identity and access management (CIAM) into your web and mobile applications. You can add user authentication and access control to your applications in minutes. In this post, I introduce you to the new access token customization feature for Amazon Cognito user pools and show you how to use […]

Harness acquired the assets of Armory, a CD platform based on Spinnaker and a cloud service based on a proprietary platform.

When managing a large volume of data in a storage system, it is common for data duplication to happen. Data duplication in data management refers to the presence of multiple copies of the same data within your system, leading to additional storage usage as well as extra overhead when handling multiple copies of the same […]

How to become a platform engineer

- GCP devops/sre blogs - January 11, 2024

A career in platform engineering means becoming part of a product team focused on delivering software, tools, and services.

TAG post originally published on Cloud Native sustainability's blog by Joe Kutner Container builds can be very wasteful. Every operating system update, new dependency version…

Cybercriminals are increasingly using GitHub for malicious activities like payload delivery and command-and-control operations.

Cybersecurity 101: 10 Types of Cyber Attacks to Know | CSA

- cloudsecurityalliance.org - January 11, 2024

The definitions of 10 different types of cyber attacks that you should know about, including clickjacking, DDoS, phishing, and ransomware.

Customers discontinuing their use of Google Cloud can move their data without incurring any network data transfer fees.

Humboldt will be the first subsea cable route to link South America with Asia-Pacific.

New Python-based hacking tool FBot targets web servers & cloud services like AWS & Microsoft 365.

Researchers expose critical flaw in Apache OFBiz, CVE-2023-51467, enabling stealthy memory-resident attacks

Zero Trust in the Cloud: Total Context Matters | CSA

- cloudsecurityalliance.org - January 11, 2024

The shift to cloud has exposed organizations to new SaaS security challenges. Traditional security is no longer sufficient. We need Zero Trust.

If used to aggregate various data sources and APIs into a unified graph, GraphQL could become 'one schema to rule them all' for enterprises.

Atomic Stealer malware for macOS gets a scary upgrade! Now evading detection with advanced encryption.

There is a Ransomware Armageddon Coming for Us All

- thehackernews.com - January 11, 2024

Generative AI will enable anyone to launch sophisticated phishing attacks that only Next-generation MFA devices can stop

How Malicious Insiders Use Known Vulnerabilities | CSA

- cloudsecurityalliance.org - January 11, 2024

Internal users can exploit known vulnerabilities. Therefore, methods that mitigate targeted intrusion are also applicable to insider threats.

Ivanti Connect Secure hit by two zero-day flaws, exploited by suspected China-linked hackers to breach under 10 customers.

Mandiant's X Account Was Hacked Using Brute-Force Attack

- thehackernews.com - January 11, 2024

Mandiant's X account hacked! A brute-force attack by a DaaS group exploited a 2FA policy gap.

Cisco patches a serious flaw in Unity Connection (CVE-2024-20272, CVSS 7.3). Don't let attackers compromise your system

Business continuity and disaster recovery plans include having a backup strategy for application workloads, whether on-premises or in Cloud. Furthermore, organizations need efficient methods to actively monitor their data protection posture and detect any failure for remediation while meeting the required recovery time objective (RTO) and recovery point objective (RPO) for the business. One efficient […]

This post was co-authored with Nicolas Fournier, Platform Engineer at Unitary. Every day, over 80 years' worth of video content is uploaded online. Some of this content can also be harmful. Unitary knows that human moderators are the current gold standard for moderation, but this manual approach does not scale. While automated systems can scale, […]

Here's Some Bitcoin: Oh, and You've Been Served!

- krebsonsecurity.com - January 10, 2024

A California man who lost $100,000 in a 2021 SIM-swapping attack is suing the unknown holder of a cryptocurrency wallet that harbors his stolen funds. The case is thought to be the first in which a federal court has recognized…

In this blog post, we delve into using Amazon Web Services (AWS) data protection services such as Amazon Secrets Manager, AWS Key Management Service (AWS KMS), and AWS Certificate Manager (ACM) to help fortify both the security of the pipeline and security in the pipeline. We explore how these services contribute to the overall security […]

In this guest blog post, Nauman Noor (Managing Director), Fabio Dias (Cloud Developer), and Dylan Alibay (Cloud Developer) from the platform engineering team at State Street discuss their use of Amazon Managed Prometheus and AWS Distro for OpenTelemetry to enable monitoring in a multi-tenant, multi-account, and multi-region environment. In the ever-evolving financial services landscape, State […]

When developing a disaster recovery strategy, it is important to manage synchronizing the network configuration between your primary and recovery site, including, but not limited to, things like your access control lists (ACLs) and internet gateways. In many cases, a configuration change in your primary site should be applied to your recovery site. Managing these […]

HPE eyes a networking future with AI and its GreenLake platform at the core with its proposed $14 billion acquisition of Juniper Networks.

Investment in security-aware developers and collaboration between them and AppSec teams should be a driving force in 2024.

Why the Latest Advances in OpenTelemetry Are Significant

- thenewstack.io operations - January 10, 2024

With all the hype around AI/ML in observability, it's more likely than ever that companies benefit from storing and viewing data in one system and training ML models in another.

New custom target types in Cloud Deploy

- GCP devops/sre blogs - January 10, 2024

New custom target types in Cloud Deploy let you perform deployments to non-container-based runtimes.

LambdaTest, a leading omnichannel test orchestration and execution cloud platform was looking to scale their multi-Region and hybrid networks. LambdaTest's existing hybrid global network used AWS Site-to-Site VPN to connect their locations and Amazon Virtual Private Clouds (VPCs) across multiple AWS Regions. LambdaTest is growing rapidly, helping over 2 million developers run over 500 million […]

This post was co-authored by James Fogel, Staff Software Engineer on the Cloud Architecture Team at Pinterest Part 1: Design process for Amazon EKS networking at scale Introduction Pinterest is a platform that helps inspire people to live a life they love. Big data and machine learning (ML) are core to Pinterest's platform and product, […]

This post was co-authored by James Fogel, Staff Software Engineer on the Cloud Architecture Team at Pinterest Part 2: Spark on EKS network design at scale Introduction In this two-part series, my counterpart, James Fogel (Staff Cloud Architect at Pinterest), and I share Pinterest's journey designing and implementing their networking topology for running large-scale Spark […]

Cedar is an open-source language that you can use to authorize policies and make authorization decisions based on those policies. AWS security services including AWS Verified Access and Amazon Verified Permissions use Cedar to define policies. Cedar supports schema declaration for the structure of entity types in those policies and policy validation with that schema. […]

Container platforms: why and how?

- cncf.io - January 10, 2024

Member post originally published on Elastisys's blog by Lars Larsson This article is all about demystifying container platforms and showing what value they bring on several levels: business…

Weekly.tf Issue #155

- weekly.tf - January 10, 2024

Deploying LLM Apps to AWS, Creating EKS Cluster with CDKTF, "Hello World" Lambda with Rust

NoaBot, a Mirai-based botnet, is targeting SSH servers for crypto mining since early 2023

Amazon Web Services (AWS) customers can use the AWS global infrastructure to deploy workloads to multiple AWS Regions. They can create global networks that span multiple AWS Regions to connect these workloads to each other and to on-premises networks. A common design pattern is to use a central networking AWS account to own shared network resources, such as AWS Transit […]

Data Privacy Dilemmas & the Need for Comprehensive DLP | CSA

- cloudsecurityalliance.org - January 10, 2024

Is your organization protected against third parties misusing data and putting you at risk?

New Year, New 'Tude - DevOps.com

- devops.com - January 10, 2024

Don MacVittie starts the year with advice about understanding the difference between what you can and cannot change.

Tackling the ever-expanding enterprise attack surface is a daunting task for IT pros. From servers to apps, the challenge is real.

Address Speedy Attacks with Intelligence-Driven IR | CSA

- cloudsecurityalliance.org - January 10, 2024

Effectively responding to an increasingly high volume of sophisticated cyber attacks can be uniquely challenging.

Researchers have released decryptors for both the Tortilla variant of Babuk ransomware and Black Basta ransomware

FTC bans Outlogic from selling sensitive location data! A landmark move for digital privacy.

Microsoft's latest update tackles a whopping 48 security vulnerabilities! Stay protected with their January 2024 Patch Tuesday fixes

CISA adds six new flaws to its KEV catalog, highlighting urgent need for network security upgrades!

Amazon Web Services (AWS) is named as a Leader in the 2023 ISG Provider Lens Quadrant Report for Multi Public Cloud Services – Sovereign Cloud Infrastructure Services (EU), published on January 8, 2024. This first-ever Information Services Group (ISG) report evaluates providers of sovereign cloud infrastructure services in the multi public cloud environment and examines […]

AWS Certificate Manager (ACM) is a managed service that you can use to provision, manage, and deploy public and private TLS certificates for use with Amazon Web Services (AWS) and your internal connected resources. Today, we're announcing that ACM will be discontinuing the use of WHOIS lookup for validating domain ownership when you request email-validated […]

A Broadcom survey found islands of automation that operate independently can cause organizations to fail to meet SLAs.

In November 2022, Amazon Web Services (AWS) announced the launch of Amazon CloudFront continuous deployment, extending the functionality of your existing CloudFront distributions by allowing you to test and validate configuration changes to a percentage of live traffic before extending to your wider audience. Previously, customers had to do the heavy lifting of changing DNS […]

NIST SP 800-171 R3: An Overview of the Changes | CSA

- cloudsecurityalliance.org - January 09, 2024

Though there were only a handful of changes in NIST SP 800-171 R3, there were some significant ones regarding assessment practices.

OAuth Token: What It Is and Its Vulnerabilities | CSA

- cloudsecurityalliance.org - January 09, 2024

Organizations need SaaS app security tooling that can detect and respond to OAuth token grants that suggest unusual suspicious activity.

Putting AI to Work: Systems of Intelligence and Actionable Agency

- thenewstack.io operations - January 09, 2024

Leaders in every sector of society, including business, education, and government, should be thinking about the changes that are happening now, and how best to position their organizations for the future.

In this post, we show you how to apply attribute-based access control (ABAC) while you store and manage your Amazon Elastic Kubernetes Services (Amazon EKS) workload secrets in AWS Secrets Manager, and then retrieve them by integrating Secrets Manager with Amazon EKS using External Secrets Operator to define more fine-grained and dynamic AWS Identity and […]

Unlock significant savings with GKE discounts in Kubernetes with cost management strategies such as Spot VMs and Committed Use Discounts (CUD).

New solution template simplifies Jupyterhub on GKE setup

- GCP containers blogs - January 09, 2024

A new solution template helps you get started with Jupyterhub on GKE, providing a pre-configured GKE cluster, Jupyterhub config, and custom features.

Community post by Christophe Sauthier, Flavien Hardy, Ludovic Logiou, Stéphane Este-Gracias, and Guillaume Bernard The Cloud Native Glossary is a project led by the CNCF Business Value Subcommittee.

Beware of Water Curupira! This threat actor is spreading PikaBot, more than a malware loader – it's a gateway to ransomware attacks.

Celebrating 20+ Years of Domain Driven Design (DDD) and EIP

- thenewstack.io microservices - January 09, 2024

After 20 years, the design patterns, principles, and practices in two classic books on Demand Driven Design (DDD) and Enterprise Integration Patterns (EIP) are still very relevant.

Turkish hackers targeting poorly secured MS SQL servers across the U.S., European Union, and Latin America.

Serverless ICYMI Q4 2023 | Amazon Web Services

- AWS compute blogs - January 09, 2024

Welcome to the 24th edition of the AWS Serverless ICYMI (in case you missed it) quarterly recap. Every quarter, we share all the most recent product launches, feature enhancements, blog posts, webinars, live streams, and other interesting things that you might have missed! In case you missed our last ICYMI, check out what happened last […]

The coming decade will be defined by platform engineering, laying a firm foundation for AI-driven innovation in enterprises.

Nerd/Noir is partnering with DX to help identify areas where organizations can improve developer experience.

Have internal developer portals (IDPs) successfully enhanced productivity without sacrificing developer experience or developer satisfaction?

Why Public Links Expose Your SaaS Attack Surface

- thehackernews.com - January 09, 2024

Collaboration is key in SaaS, but did you know 58% of security incidents involve data leaks? Discover the balance between sharing and security.

Kyocera and QNAP users, beware! High-severity vulnerabilities are lurking. Update now to prevent attacks.

Beware of YouTube videos offering cracked software! They might be a gateway to the Lumma malware, stealing your sensitive information

Learning Kubernetes can seem overwhelming. It's a complex container orchestration system that has a steep learning curve. But

Code coverage is a code quality metric leveraging unit tests. Coming up with test cases with every combination of parameters requires developer's time, which is already scarce. Developers' focus is (mis)directed at just meeting the coverage threshold. In doing so, quality of code may be compromised and resulting code may still result in unexpected outcomes. […]

Happy New Year! Cloud technologies, machine learning, and generative AI have become more accessible, impacting nearly every aspect of our lives. Amazon CTO Dr. Werner Vogels offers four tech predictions for 2024 and beyond: Generative AI becomes culturally aware FemTech finally takes off AI assistants redefine developer productivity Education evolves to match the speed of […]

LinkedIn Shares Its Developer Productivity Framework

- thenewstack.io devops - January 08, 2024

LinkedIn's new open source software development framework mixes hard data with the importance of the human element.

Mastering Kubernetes Optimization: A Strategic Approach

- thenewstack.io kubernetes - January 08, 2024

By embracing a strategic and structured approach to Kubernetes management, organizations can unlock its full potential, transforming it into a key driver for business efficiency and innovation.

CubeFS completes security audit!

- cncf.io - January 08, 2024

Community post from the team at OSTIF OSTIF and the CNCF are proud to announce the completion of a security audit of CubeFS. The project, which provides cloud-native storage across a variety of access…

Ambassador post by Zou Nengren Two months ago, we were thrilled to share insights in the article "Best Practices for Migrating VM Clusters to KubeVirt 1.0." As previously mentioned…

Anonymous Arabic releases Silver RAT, a trojan that slips past security and takes hidden control

Gain Business Support for Your Zero Trust Initiative | CSA

- cloudsecurityalliance.org - January 08, 2024

A new CSA research paper helps security professionals clearly communicate the business value a Zero Trust strategy can bring.

DevOps professionals have several common hurdles to successful implementation. Here are five technologies that can help.

Looking for a great new DevOps job? Check out these available opportunities at Fox Tech, Caresoft and more!

Why should SecOps, risk management, and strategy work together? Find out how a unified approach can fortify your digital defenses.

How Container Security Benefits Cybersecurity & DevOps | CSA

- cloudsecurityalliance.org - January 08, 2024

Securing containers across the entire software development life cycle is a huge win for cybersecurity teams and DevOps.

Explore how Zero Trust Security can minimize your attack surface and safeguard against sophisticated attacks.

NIST raises an alarm on AI's privacy & security risks. Discover how AI systems like ChatGPT face new threats.

The DoJ cracks down on xDedic Marketplace, charging 19 in a $68M cybercrime saga.

North Korean hackers have stolen over $600M in crypto in 2023! A significant threat to global financial security.

How workload identity on EKS (AWS Kubernetes) works to access cloud resources and how EKS Pod Identity is helpful

Meet Ika & Sal: The Bulletproof Hosting Duo from Hell

- krebsonsecurity.com - January 08, 2024

In 2020, the United States brought charges against four men accused of building a bulletproof hosting empire that once dominated the Russian cybercrime industry and supported multiple organized cybercrime groups. All four pleaded guilty to conspiracy and racketeering charges. But…

DEVOPS WEEKLY ISSUE #679 - 7th January 2024

- devopsweeklyarchive.com - January 07, 2024

The first newsletter of the year, with posts on the evolution of DAST, the struggles with adopting automated testing and team topologies, as well as technical posts on the new version of Go, Tekton pipelines and PostgreSQL.

You should've known how to build a non-causal system

- surfingcomplexity.blog - January 07, 2024

Reporting an outcome's occurrence consistently increases its perceived likelihood and alters the judged relevance of data describing the situation preceding the event. Baruch Fischhoff, Hinds…

SRE Weekly Issue #406 – SRE WEEKLY

- sreweekly.com - January 07, 2024

A new cyber espionage campaign targets the Netherlands' telecom and IT sectors. The Türkiye-linked Sea Turtle group is behind these politically motiva

A new wave of cyber attacks in Albania, orchestrated by an Iranian group, uses a destructive malware named No-Justice.

A Broadcom survey found well over half of respondents have adopted some form of value stream management (VSM), but most are in early stages.

Member post by Tal Yitzhak, Solution Architect at Lightrun As we bid farewell to a remarkably productive year in 2023, the dedicated members of the Cloud Native Computing Foundation (CNCF) community…

Community post by the TM Forum's WebAssembly Canvas Catalyst team: CSPs: Orange, Vodafone, Etisalat by e&, nbnCo ISVs: SigScale, Wavenet, Comviva CNCF Technology: CNCF wasmCloud…

Cybersecurity experts unveil SpectralBlur, a new macOS backdoor with ties to North Korean malware.

Practical Ways to Combat Generative AI Risks | CSA

- cloudsecurityalliance.org - January 05, 2024

Generative AI risks are high. Knowing how to combat the risks AI tools pose will keep your organization gleaming.

5 Ways Tech Decision-Makers Can Streamline DevOps | CSA

- cloudsecurityalliance.org - January 05, 2024

The fast-paced nature of DevOps can leave security teams struggling to keep up. Explore five simple ways to streamline DevOps security.

A Checkmarx report details an 'Everything' package distributed via the NPM registry that cripples any machine used to download it.

(Manual Add) A new npm package named everything would prevent any existing npm package from ever being removed, per npm terms of service.

How the GenAI Revolution Reminds Us of 1990s Computing

- thenewstack.io operations - January 05, 2024

The 2020s will witness the infusion of GenAI into almost every aspect of computing, both personal and enterprise. But the AI revolution bears some intriguing parallels to the computing world of the 1990s.

Gauge Your Observability Agent Overhead to Save Costs

- thenewstack.io observability - January 05, 2024

Observability agents can consume many resources. To address this, they are or can be monitored themselves to ensure they do not excessively consume resources, thus preventing unnecessary costs.

Ivanti releases updates for a critical remote code execution security flaw in Endpoint Manager.

Exposed Secrets are Everywhere. Here's How to Tackle Them

- thehackernews.com - January 05, 2024

Discovered a hidden secret in your company's code? Understanding its impact is just the beginning. Find out how to manage these risks effectively.

New Bandook Trojan variant targets Windows users! Disguised in phishing emails as PDFs.

range Spain hit by major internet outage due to cyberattack. Find out how a simple malware breach led to massive service disruption.

Ukraine's cybersecurity team reveals Russian hackers, Sandworm, infiltrated Kyivstar telecom since May 2023.

Enhancing Access Control by Combining IGA and PAM | CSA

- cloudsecurityalliance.org - January 05, 2024

What would happen if Identity Governance & Administration and Privileged Access Management were integrated? Explore the advantages of such a synergy.

Member post originally published on ARMO's blog by Oshrat Nir, Developer Advocate at ARMO While Kubernetes adoption continues to soar, it has become a prime target for cyberattacks. Unfortunately…

Weekly.tf Issue #154

- weekly.tf - January 04, 2024

Backstage, Open-source alternatives to Terraform Enterprise/Cloud, EKS, ML

Serverless Computing In 2024: GenAI Influence, Security, 5G

- thenewstack.io devops - January 04, 2024

Serverless enables developers to focus on writing code and building applications, while the cloud provider takes care of the underlying infrastructure.

In Part 1 of this series, you learned about Blue/Green testing and deployment on AWS, a key strategy that increases application availability and reduces deployment risk by simplifying the rollback process if a deployment fails. We explored live replication using AWS Application Migration Service (AWS MGN) and introduced prebuilt post-launch actions with AWS Systems Manager […]

Balancing developer freedom and governance controls is a key challenge faced by organizations that are adopting cloud. On one hand, developers need the freedom to innovate and develop new applications and services quickly and on the other, organizations need to maintain control over the resources used and the data processed in order to ensure compliance […]

Customers are becoming more aware of the benefits of migrating to AWS in a world increasingly pivoting towards cloud adoption. A recent whitepaper by IDC found that customers who migrate to AWS can experience a 51% reduction in the cost of operations, a 62% increase in IT staff productivity, and a 94% reduction in downtime. […]

Microsoft leadership unveiled new capabilities in Azure AI Studio that will empower individual developers to create copilots of their own.

This post is written by Alejandro Gil, Solutions Architect and Joseba Echevarría, Solutions Architect. Introduction The purpose of this blog post is to compare video encoding performance between CPUs and Nvidia GPUs to determine the price/performance ratio in different scenarios while highlighting where it would be best to use a GPU. Video encoding plays a […]

Beware of hidden dangers in open-source libraries. Three new malicious PyPI packages found deploying cryptocurrency miners.

Mandiant's Twitter account, a Google Cloud subsidiary, was hacked for over six hours. The attacker promoted a cryptocurrency scam.

Don't miss our tips on using Software Composition Analysis tools to manage dependencies and vulnerabilities effectively.

The threat actor UAC-0050 is using phishing attacks to distribute the Remcos RAT while employing new strategies to avoid detection.

The dust has settled after another re:Invent. I once again had the privilege of organizing the DevOps and Developer Productivity (DOP) track along with Jessie VanderVeen, Anubhav Rao and countless others. For 2022, the DOP track included 59 sessions. If you weren't able to attend, I have compiled a list of the on-demand sessions for […]

As we kick off 2024, I wanted to take a moment to highlight the top posts from 2023. Without further ado, here are the top 10 AWS DevOps blog posts of 2023. Unit Testing AWS Lambda with Python and Mock AWS Services – When building serverless event-driven applications using AWS Lambda, it is best practice to […]

Amazon Web Services (AWS) Verified Access (AVA) is a secure remote access service that eliminates the need for VPNs. AVA reduces management complexity and improves security with real-time evaluations of requests based on factors such as identity and device posture. With Verified Access, you can define access policies written in Cedar using end user context, […]

Traffic Mirroring is an Amazon Virtual Private Cloud (VPC) feature you can use to copy network traffic from an elastic network interface of an Amazon Elastic Compute Cloud (EC2) instance and send it to a target storage service for analysis. You can use it for content inspection, threat monitoring, network performance monitoring, and troubleshooting. Through […]

Assistive vs Automatic Remediation: What to Consider | CSA

- cloudsecurityalliance.org - January 04, 2024

Two primary remediation approaches can help security teams respond faster: assistive and automatic remediation. Here's how they differ.

Defensive AI and Deepfakes: Cybersecurity in 2024 | CSA

- cloudsecurityalliance.org - January 04, 2024

In 2024, AI will make cybercrime more sophisticated. Here are some expert opinions on how AI and cybersecurity will change in the coming year.

Administrators may need to monitor and audit actions, like uploads, updates, and deletes, taken on files and other data to comply with regulations or company policies. A scalable and reliable method of tracking and saving actions taken on files can reduce manual work and operational overhead while helping to ensure compliance. An event-based fanout architectures […]

Highly regulated industries, such as finance, healthcare and government, need to exchange business to business files securely. Common protocols like SFTP provide a broadly-supported, standard method for moving files securely across public networks. For some customers, compliance requirements drive a higher bar for their SFTP authentication. To meet more stringent compliance requirements, aside from controlling […]

Ambassador post originally published on Medium by Mathieu Benoit Platform Engineering was a huge theme at KubeCon NA 2023 in Chicago. More than ever before. More and more companies have initiatives to…

Rethinking Observability

- thenewstack.io observability - January 03, 2024

Two best practices to better align observability practices with the goal of delivering exceptional user experiences.

ScaleOps Dynamically Right-Sizes Containers at Runtime

- thenewstack.io kubernetes - January 03, 2024

With continuous automation, startup aims to eliminate having to manually tune workloads and adjust Kubernetes resource allocation, saving companies money.

(Manual Submission - Added for relevancy) Google is planning a significant restructuring that might lead to layoffs of around 30,000 employees within its ad sales division due to the integration of AI technology.

Developer Productivity in 2024: New Metrics, More GenAI

- thenewstack.io operations - January 03, 2024

Reflecting on the past year, we look where developer productivity is headed in 2024, including platform engineering, AI assistance and measuring it all.

Observability in 2024: More OpenTelemetry, Less Confusion

- thenewstack.io ci-cd - January 03, 2024

Observability has arguably emerged as crucial for navigating the chaos from an explosion in data. Yet the surge in data has created its own chaos.

Building and maintaining a secure, compliant managed file transfer (MFT) solution to securely send and receive files inside and outside of your organization can be challenging. Working with a competent, vigilant, and diligent MFT vendor to help you protect the security of your file transfers can help you address this challenge. In this blog post, […]

In software engineering, selecting a programming language is a pivotal decision for any organization. Here's what you need to know.

What methodology (and metrics) should you use to accurately assess the impact on productivity and value delivery of a tool like GitHub Copilot?

I found myself needing to make a cronjob using AWS Lambda but it turned out to be a bit more complex than I had hoped.

5 Ways to Reduce SaaS Security Risks

- thehackernews.com - January 03, 2024

80% of breaches involve compromised identities. Discover how Nudge Security offers practical SaaS security solutions to safeguard your data.

XCast, a VoIP provider, faces a $10 million penalty for facilitating illegal robocalls and deceptive telemarketing campaigns since 2018.

Information-stealing malware is exploiting an undocumented Google OAuth endpoint called MultiLogin to hijack user sessions.

SMTP Smuggling can let cybercriminals send fake emails with forged sender addresses, bypassing security checks.

Generative AI coding tools are changing the way developers accomplish day-to-day development tasks. From generating functions to creating unit tests, these tools have helped customers accelerate software development. Amazon CodeWhisperer is an AI-powered productivity tools for the IDE and command line that helps improve developer productivity by providing code recommendations based on developers' natural language […]

Enterprises are constantly seeking ways to accelerate their journey to the cloud. Infrastructure as code (IaC) is crucial for automating and managing cloud resources efficiently. The AWS Cloud Development Kit (AWS CDK) lets you define your cloud infrastructure as code in your favorite programming language and deploy it using AWS CloudFormation. In this post, we […]

How Do I Communicate My New SOC 2 Report? | CSA

- cloudsecurityalliance.org - January 03, 2024

When announcing a new SOC 2 report, don't use the phrase “SOC 2 Certified.” Instead, focus on how it helps the company prioritize security.

AIOps: Revolutionize Enterprise Security Management | CSA

- cloudsecurityalliance.org - January 03, 2024

Artificial Intelligence for IT Operations (AIOps) is a transformative solution that redefines the way we safeguard networks.

The Top 5 Third-Party Integration Risks | CSA

- cloudsecurityalliance.org - January 03, 2024

Consider the potential impacts that a malicious SaaS plugin could have on a business. Here are the top five risks.

Customers expect database solutions to be both scalable and equipped with robust recovery mechanisms to address unexpected data disruptions. Unintentional transactions or system failures can impact the business. Recovering to a specific point-in-time with point-in-time-recovery (PITR) is indispensable for some customers with critical workloads or compliance requirements AWS Backup simplifies protecting Amazon Aurora databases with […]

CURP state machine engine

- cncf.io - January 02, 2024

Member post by DatenLord In the previous article on code interpretation, we briefly explained how the CurpServer of Xline is implemented. Now, let's delve deeper into some core data structures in the…

Free Kubernetes Courses from kubecampus.io

- kubecampus.io - January 02, 2024

(devops-scanner admin note - Manually added from a suggestion as it seems to be a useful resource) -Hands-on labs. Kubernetes experts. Your own pace.

AI Engineering: What Developers Need to Think About in 2024

- thenewstack.io operations - January 02, 2024

For another year, at least, AI will continue to grab the headlines. Here are some aspects of AI engineering that might affect developers in 2024.

Understanding and applying these five key microservices design patterns can help you design more scalable, reliable and maintainable applications.

Looking for a great new DevOps job? Check out these available opportunities at VyncaCare, L3Harris and more!

More organizations than ever will need to invest in IT training as advances in AI transform roles and responsibilities in the coming year.

Google settles a $5 billion class-action lawsuit over tracking in 'incognito mode.'

The Definitive Enterprise Browser Buyer's Guide

- thehackernews.com - January 02, 2024

Browsers play a crucial role in the corporate world, but their security is now a top concern. Find out how purpose-built enterprise browsers are the a

New SEC Rules Push Cybersecurity to the Top | CSA

- cloudsecurityalliance.org - January 02, 2024

Through its new cybersecurity disclosure requirements, the SEC is pushing US companies to focus on cyber risk management.

Scarleteel 2.0 and the MITRE ATT&CK Framework | CSA

- cloudsecurityalliance.org - January 02, 2024

An in-depth analysis of the SCARLETEEL cyber attack using the MITRE ATT&CK framework.

Shared IT infrastructure resources and pay-as-you-go price models have become common across industries, with the typical use case being the cloud multi-tenant concept. As resources are managed in an increasingly granular fashion, the billing granularity for resources also needs to be carefully considered to achieve the most accurate billing possible. For multi-tenant product vendors, measuring […]

A new malware loader called JinxLoader is being used by threat actors to deliver payloads such as Formbook and XLoader.

Researchers uncover a critical SSH protocol vulnerability, "Terrapin" (CVE-2023-48795), allowing attackers to compromise secure connections.

Security researchers uncover a novel DLL search order hijacking technique that threatens Windows 10 and 11 systems.

DEVOPS WEEKLY ISSUE #678 - 31st December 2023

- devopsweeklyarchive.com - December 31, 2023

For the last day of 2023 I've pulled together a list of the best posts from the last 3 months or so. An interesting set, covering incident management, LLMs, observability, build engineering and more. Here's to a fruitful 2024.

Consistency

- surfingcomplexity.blog - December 31, 2023

"Welcome aboard to BigCo!" "Thanks! I'm excited to be here. This is my first tech job, even if it is just an internship." "We're going to start you off wit…

SRE Weekly Issue #405 – SRE WEEKLY

- sreweekly.com - December 31, 2023

Using the Swedish word "Lagom" as a jumping-off point, this article explains the importance of choosing an SLO that is just right: not too lax and not too strict.

When it comes to managing your code changes in Azure DevOps, there are various scenarios where you might need to abandon a pull request without merging.

The rapid pace of digital transformation is creating huge demands for DevOps skills across industries. This has put the spotlight on credentials like the AWS

Scam-as-a-service are targeting cryptocurrency wallets, draining them of digital assets.

Member post by Abhilash A, Product Marketing at Ozone Today, Platform engineers find themselves at the forefront of transformative changes, steering the ship toward cloud-first and Kubernetes-centric…

Simulate Kubernetes Cluster Behavior with SimKube

- thenewstack.io ci-cd - December 29, 2023

SimKube can replay a trace from a Kubernetes production cluster in a simulated or development cluster. Good for troubleshooting, parameter testing.

How BumbleBee Eases eBPF Observability with OCI

- thenewstack.io containers - December 29, 2023

BumbleBee simplifies the process of building and running distributed eBPF programs, encapsulating them as OCI images and publishes them into an OCI-compliant registry.

Amazon Web Services is pleased to announce that the AWS US East (Ohio) and Europe (Paris) Regions have been recertified through October 2024 by the GSM Association (GSMA) under its Security Accreditation Scheme for Subscription Management (SAS-SM) with scope Data Centre Operations and Management (DCOM). The US East (Ohio) Region first obtained GSMA certification in […]

In this week's #TheLongView: Scrum sucks, sources say; and here comes the Linux 6.5 kernel.

The inherent weirdness of system behavior

- surfingcomplexity.blog - December 29, 2023

All implementations of mutable state in a geographically distributed system are either slow (require coordination when updating data) or weird (provide weak consistency only). Sebastian Burckhardt,…

Happy 14th Birthday, KrebsOnSecurity!

- krebsonsecurity.com - December 29, 2023

KrebsOnSecurity celebrates its 14th year of existence today! I promised myself this post wouldn't devolve into yet another Cybersecurity Year in Review. Nor do I wish to hold forth about whatever cyber horrors may await us in 2024. But I…

Albanian Parliament and telecom company One Albania have both fallen victim to cyber attacks

Ukraine's CERT warns of a new phishing campaign by Russia-linked APT28. They're deploying stealthy malware like MASEPIE and STEELHOOK.

North Korean nation-state actors are using spear-phishing attacks to seize control of computers, deploying tools like AppleSeed and Meterpreter.

Microsoft takes action against malware threat: disables ms-appinstaller protocol handler by default.

AWS - t4g.small instances free trial for ONE YEAR!

- aws.amazon.com - December 29, 2023

Try Amazon EC2 t4g.small instances powered by AWS Graviton2 processors free for up to 750 hours / month until Dec 31st 2024. Refer to the FAQ for additional details.

2024: A Critical Year for the Cloud Security Teenager | CSA

- cloudsecurityalliance.org - December 29, 2023

In 2024, CSA will be focusing on AI safety and assurance, Zero Trust training, and the next version of the CCSK.

Member post originally published on Fairwinds's blog by Andy Suderman Kubernetes rightsizing is the process you use to ensure that your Kubernetes cluster has the right amount of resources to run your…

Community post by Amir Montazery, OSTIF We at OSTIF are excited to announce the 2023 Cloud Native Computing Foundation Audit Impact Report. This is the second year of the program between the two…

The Terrapin Attack: A New Threat to SSH Integrity

- thenewstack.io networking - December 28, 2023

Researchers at Ruhr University have found a significant vulnerability that targets the SSH protocol by manipulating the handshake process.

Best of 2023: The End of Programming Is Nigh

- thenewstack.io operations - December 28, 2023

Matt Welsh shares his perspectives about the future of computer science, distributed computing, and if ChatGPT and GitHub Copilot represent the beginning of the end of programming.

Year-in-Review: Platform Engineering Still Run By Spreadsheet

- thenewstack.io devops - December 28, 2023

Do you need an internal developer platform (IDP) or a developer portal? It depends on who you talk with — and how far along you are in your platform engineering journey.

Introduction At AWS we are constantly striving to improve customer experience. For instance, we launched IAM Roles for Service Accounts (IRSA) in 2019 that allows customers to configure Kubernetes (k8s) applications running on AWS with fine-grained AWS Identity and Access Management (AWS IAM) permissions to access other AWS resources such as Amazon Simple Storage Service […]

Containerization technologies such as Docker and orchestration solutions such as Amazon Elastic Container Service (Amazon ECS) are popular with customers due to their portability and scalability advantages. Container runtime monitoring is essential for customers to monitor the health, performance, and security of containers. AWS services such as Amazon GuardDuty, Amazon Inspector, and AWS Security Hub […]

In this week's #TheLongView: Amazon Prime Video has ditched its use of microservices-cum-serverless, reverting to a traditional, monolithic architecture. It vastly improved the workload's cost and scalability.

Google Cloud addresses medium-severity security flaw! Attackers with Kubernetes cluster access could escalate privileges.

Kaspersky discovers the "most sophisticated attack chain" targeting Apple iOS devices.

Threat actors are using a new malware loader to distribute various information stealers, including Lumma Stealer, Vidar, RecordBreaker, and Rescoms.

Weekly.tf Issue #153

- weekly.tf - December 28, 2023

Testing with Terraform (Cloud), CI/CD with Amazon CodeCatalyst

WinRAR CVE-2023-38831 Vulnerability Draws Attention | CSA

- cloudsecurityalliance.org - December 28, 2023

CVE-2023-38831 has been spread globally by threat actors including DarkMe, APT40, and SandWorm. Learn how each group has exploited this vulnerability.

Mentorship post originally published on dev.to by Magnim Thibaut Freedisch Batale The Linux Foundation Mentorship Program offers a dynamic three-month internship where participants engage in hands-on…

Why People Should Be at the Heart of Operational Resilience

- thenewstack.io operations - December 27, 2023

It can be all too easy to let a subset of your IT organization "handle" resiliency. If resilience is about an ability to adapt and respond to change, then it needs broad buy-in.

Both roles of Aws Solutions Architect and DevOps Engineer are crucial in modern tech environments, with Solutions Architects focusing on designing robust

It's not likely that ChatGPT will replace programmers and developers, but it can help with more mundane tasks and reduce toil.

Chinese threat actors exploited a new zero-day vulnerability in Barracuda's Email Security Gateway (ESG) appliances.

A zero-day security flaw discovered in Apache OfBiz ERP system could allow unauthorized access.

Xamalicious Android backdoor malware disguises itself as legit apps, infecting over 327,000 devices.

Poorly secured Linux SSH servers are under attack! Threat actors are installing tools to guess credentials, co-opt other servers.

Securing Cloud Infrastructure: Cloud Security Training | CSA

- cloudsecurityalliance.org - December 27, 2023

CSA's Cloud Infrastructure Security Training Bundle offers 13 courses that serve as a reliable guide in your cloud security journey.

Member post originally published on Katalyst's blog by Pengcheng Tang The resource usage of web applications tends to fluctuate with changes in the number of visitors…

Member post originally published on the Amplication blog by Levi Van Noort Over the last decade, there have been notable shifts in the process of delivering source code. One of the more recent…

Community post originally published on dev.to Sunny Bhambhani Helm is really a very powerful tool for managing objects and is widely adopted across various organizations. It is truly a game changer on…

'Merchants of Complexity': Why 37Signals Abandoned the Cloud

- thenewstack.io operations - December 26, 2023

Provisioning a fleet of servers in 30 minutes is magic, but it is not a requirement that comes up that often for most businesses, David Heinemeier Hansson argues.

Spanish version » We continue to listen to our customers, regulators, and stakeholders to understand their needs regarding audit, assurance, certification, and attestation programs at Amazon Web Services (AWS). We're pleased to announce that the Fall 2023 System and Organization Controls (SOC) 1, SOC 2, and SOC 3 reports are now available in Spanish. These […]

DevOps is far from 'dead'! There's plenty to come in 2024, Techstrong Group's Alan Shimel reports. Stay tuned!

Teams that embrace loose coupling are better equipped to respond to challenges, gain a competitive advantage and adapt to a constantly changing tech landscape.

Carbanak malware is back, and it's using new tactics in ransomware attacks. Learn how it's impersonating business software to infiltrate systems.

Cloud Atlas spear-phishing attacks hit an agro-industrial enterprise and a state-owned research company.

I while back I built a number of pipelines using the docker-build-push action here. This uses buildx and buildkit to do its build/push stuff, and allows if needed for things like multi-arch builds. However what I quickly discovered was that you could not use ECR for the caching part of…

Tell me about a time…

- surfingcomplexity.blog - December 24, 2023

Here are some proposed questions for interviewing someone for an SRE role. Really, these are just conversation starters to get them reflecting and discussing specific incident details. The question…

Two British teens, part of the LAPSUS$ cybercrime gang, sentenced for orchestrating high-profile attacks against companies.

SRE Weekly Issue #404 – SRE WEEKLY

- sreweekly.com - December 24, 2023

On chains and complex systems

- surfingcomplexity.blog - December 23, 2023

Photo by Matthew Lancaster We know that not all of the services in our system are critical. For example, some of our internal services provide support functions (e.g., observability, analytics), wh…

Deep Dive into IT

Year-in-Review: 2023 Was a Turning Point for Microservices

- thenewstack.io microservices - December 22, 2023

Long considered the de facto approach to application architecture for cloud native services, microservices is starting to be refactored by cloud giants such as Amazon and Google.

Introduction We have observed a growing adoption of container services among both startups and established companies. This trend is driven by the ease of deploying applications and migrating from on-premises environments to the cloud. One platform of choice for many of our customers is Amazon Elastic Container Service (Amazon ECS). The powerful simplicity of Amazon […]

Introduction Organizations across financial services and other industries have business processes that require executing the same business logic across billions of records for their machine learning and compliance needs. Many organizations rely on internal custom orchestration systems or big data frameworks to coordinate the parallel processing of their business logic across many parallel compute nodes. […]

Organizations undergoing cloud migrations and business transformations often find themselves managing IT operations in hybrid or multicloud environments. This can make it more complex to safeguard workloads, applications, and data, and to securely handle identities and permissions across Amazon Web Services (AWS), hybrid, and multicloud setups. In this post, we show you how to assume […]

AWS Signer is a fully managed code-signing service to help ensure the trust and integrity of your code. It helps you verify that the code comes from a trusted source and that an unauthorized party has not accessed it. AWS Signer manages code signing certificates and public and private keys, which can reduce the overhead […]

They say the best gifts are the ones you can't wrap. That holds true for IT teams, too. So give 'em what they want: A break!

There's some speculation that we're seeing a decline in the open source space. But that's not necessarily true.

At AWS re:Invent 2023, Shira Rubinoff talks with Rob Whiteley about Coder's cloud development environment.

Techstrong Group CEO and Editor-in-Chief Alan Shimel takes a peek in the rearview mirror to revisit 2023 through the lens of DevOps.

The courage to imagine other failures

- surfingcomplexity.blog - December 22, 2023

All other things being equal, what's more expensive for your business: a fifteen-minute outage or an eight-hour outage? If you had to pick one, which would you pick? Hold that thought. Imagin…

A new phishing campaign is using Microsoft Word docs as bait to deliver Nim-based malware.

Iranian threat actor targets Defense Industrial Base sector with a new backdoor called FalseFont.

Indian government and defense entities under attack! A phishing campaign dubbed "Operation RusticWeb" deploys Rust-based malware for intel gathering

Watch out for WordPress plugin that can create fake administrator users and inject malicious JavaScript code to steal credit card information

Threat actor UAC-0099 continues to target Ukraine with cyberattacks. They exploit a critical WinRAR flaw to deliver the dangerous LONEPAGE malware.

Today we announce the availability of Amazon CloudWatch Network Monitor, a feature of CloudWatch that makes it easy to gain visibility of your hybrid network connectivity with AWS. CloudWatch Network monitor currently supports hybrid monitors for networking built with AWS Direct Connect and AWS Site-to-Site VPN. You can find Amazon CloudWatch Network Monitor in the Amazon CloudWatch […]

2024 SaaS Security Predictions | SaaS Threat Landscape | CSA

- cloudsecurityalliance.org - December 22, 2023

2023 showed that no SaaS application is immune from being compromised. Here are 2024 predictions from 5 cybersecurity thought leaders.

Application & Interface Security and Generative AI | CSA

- cloudsecurityalliance.org - December 22, 2023

Apply the Application & Interface Security domain of the Cloud Controls Matrix (CCM) to Generative AI (GenAI).

Container Security: How to Achieve it in Three Steps | CSA

- cloudsecurityalliance.org - December 22, 2023

How do you effectively protect your containers? Here are three concrete steps needed to build a robust container security strategy.

ityAs you design your Amazon API Gateway applications to rely on mutual certificate authentication (mTLS), you need to consider how your application will verify the revocation status of a client certificate. In your design, you should account for the performance and availability of your verification mechanism to make sure that your application endpoints perform reliably. […]

Have you wondered what are the best practices in safeguarding your infrastructure from unintended release of Elastic IP addresses? In this blog, we are providing a few proactive self-service solutions to streamline IP handling and obtaining a robust environment for critical applications. Before diving into the solution, let us revisit some key concepts of AWS […]

Today, we are announcing that your MySQL 5.7 and PostgreSQL 11 database instances running on Amazon Aurora and Amazon Relational Database Service (Amazon RDS) will be automatically enrolled into Amazon RDS Extended Support starting on February 29, 2024. This will help avoid unplanned downtime and compatibility issues that can arise with automatically upgrading to a […]

For the final newsletter of the year, CISO Phil Venables and Nick Godfrey share a list of the security updates that most interested you in 2023, and present insights from our new Cybersecurity Forecast report for 2024.

Senser is extending the reach of its AIOps platform to include an ability to define and maintain SLAs and SLOs.

The IBM Cost of a Data Breach Report reveals record-high breach costs in 2023, averaging $4.45 million. Discover the financial impact of data breaches

German law enforcement takes down dark web giant "Kingdom Market," specializing in narcotics and malware sales to tens of thousands of users.

Beware of phishing emails with invoice-themed attachments! Attackers are using an old Office vulnerability (CVE-2017-11882) to spread the Agent Tesla

Predator spyware for Android and iOS devices can now survive reboots, with a licensing model that runs into millions of dollars

An evolved version of the Chameleon banking malware can bypass biometric authentication and displays HTML prompts.

New JavaScript malware alert! It's on a mission to steal your online banking credentials. Over 40 financial institutions worldwide are under attack.

Google releases urgent security updates for Chrome! A zero-day vulnerability (CVE-2023-7024) in WebRTC could lead to program crashes or code execution

Weekly.tf Issue #152

- weekly.tf - December 21, 2023

terraform-docs and Quick Tip regarding AWS SCP whitespaces

How to Build a Third-Party Risk Management Strategy | CSA

- cloudsecurityalliance.org - December 21, 2023

Highlighting the importance of managing risks in business relationships with vendors and partners. Focus on safeguarding data flow and security.

Securing CI/CD Pipelines: A Comprehensive Approach is Needed | CSA

- cloudsecurityalliance.org - December 21, 2023

Addressing the critical need for comprehensive security in Continuous Integration and Continuous Deployment pipelines. Effective solutions for enhanced pipeline security.

Modernize Access Management with 5 Advantages of JIT | CSA

- cloudsecurityalliance.org - December 21, 2023

Uncover the dynamic shift in Privileged Access Management through Just-In-Time cloud access. JIT systems revolutionize traditional methods in these 5 ways.

Get ai help on networking tasks

- GCP networking blogs - December 21, 2023

Set up a VPC, handle IP addressing, and complete many other tasks with AI created step-by-step instructions.

Introduction Amazon's Elastic Kubernetes Service (Amazon EKS) removes a lot of the heavy lifting that goes into managing Kubernetes. For example, AWS manages the Kubernetes control plane on your behalf, including patching, tuning, and updating it as necessary. Then there are features such as managed node groups that give you a mechanism for managing the […]

Notifications for critical AWS Support cases are essential to ensure that issues that affect your workloads are addressed quickly. AWS Support sends email notifications automatically when support cases are newly created or updated in your AWS accounts, and they can be viewed in AWS Support Center, or the AWS Managed Services (AMS) console for customers […]

Amazon CloudWatch is a foundational AWS service that provides you with actionable insights into your cloud resources and applications. With Amazon CloudWatch Metrics, you can gain better visibility into your infrastructure and large-scale application performance. You can set up alarms using Amazon CloudWatch Alarms for metrics emitted by AWS services or your applications. Identifying which metrics […]

Many customers rehost their environments to AWS using AWS Application Migration Service (MGN), and have to prepare future-state configuration for every server they are migrating within each migration wave. When a migration wave includes multiple servers, customers have to manually configure multiple EC2 Launch Templates in the AWS console. For each server migrated using AWS […]

Starting today, Amazon Route 53 Resolver supports using the DNS over HTTPS (DoH) protocol for both inbound and outbound Resolver endpoints. As the name suggests, DoH supports HTTP or HTTP/2 over TLS to encrypt the data exchanged for Domain Name System (DNS) resolutions. Using TLS encryption, DoH increases privacy and security by preventing eavesdropping and […]

Today, we are opening a new Region in Canada. AWS Canada West (Calgary), also known as ca-west-1, is the thirty-third AWS Region. It consists of three Availability Zones, for a new total of 105 Availability Zones globally. This second Canadian Region allows you to architect multi-Region infrastructures that meet five nines of availability while keeping […]

Digibee is leveraging AI to make it simpler to migrate to its iPaaS environment by converting code into a JSON format.

Hybrid cloud environments are becoming increasingly pivotal for DevOps teams, and the trend looks to continue in 2024.

Shared Responsibility? Yeah. - DevOps.com

- devops.com - December 20, 2023

The shared responsibility model reminds us that we still have to protect our apps, no matter where they're deployed.

International police operation HAECHI-IV has led to the arrest of 3,500 individuals and $300 million in seizures across 34 countries.

Chinese-speaking threat actors, known as the Smishing Triad, are posing as UAE authorities to gather sensitive information via malicious SMS messages.

A new malware called JaskaGO, based on the Go programming language, has been discovered.

Malicious actors are cloning legit sites to trick you into scams. Memcyco's digital watermark ensures site authenticity, so you can trust the web.

Ransomware groups are stepping up their game with remote encryption attacks. Just one vulnerable device can compromise an entire network.

5 Security Risks of Collaboration Tools | CSA

- cloudsecurityalliance.org - December 20, 2023

Business collaboration tools help employees with productivity and communication. But they can also present many cybersecurity risks.

The 2023 OMB Draft Memorandum on FedRAMP Explained | CSA

- cloudsecurityalliance.org - December 20, 2023

On October 27, 2023, the Office of Management and Budget released a draft memorandum 'Modernizing FedRAMP.' Here are 7 takeaways.

Securing Custom vs. Commercial Off-the-Shelf Software | CSA

- cloudsecurityalliance.org - December 20, 2023

Security teams must be familiar with custom-developed software and commercial off-the-shelf software. Learn how each type is secured.

Rumors of Tungsten Fabric's Death Are Greatly Exaggerated

- thenewstack.io networking - December 19, 2023

Despite being sidelined by the Linux Foundation, the open source Tungsten Fabric software-defined networking stack enjoys a thriving user base of cloud providers.

Today, AWS India customers can now securely save their credit or debit cards in their AWS accounts according to the Reserve Bank of India (RBI) guidelines. Customers can use their saved cards to make payments for their AWS invoices. Previously, customers needed to manually enter their card information in the payments console for each payment. […]

Today Google Cloud is launching - at no cost - a secret discovery tool in Sensitive Data Protection that can find and monitor for stored plaintext credentials.

Here are six distinct technology trends that are poised to be particularly influential for DevOps and software development in the new year.

At KubeCon NA 2023, Alan Shimel talks with David DeSanto from GitLab about the potential for generative AI in DevSecOps.

Opsera is leveraging a generative artificial intelligence (AI) model it built to enable DevOps teams to migrate from one platform to another.

What Will DevOps Look Like in 2024? - DevOps.com

- devops.com - December 19, 2023

As the technology industry prepares for 2024, it's clear that innovation and adaptation will be the keys to success in DevOps.

BlackCat Ransomware Raises Ante After FBI Disruption

- krebsonsecurity.com - December 19, 2023

The U.S. Federal Bureau of Investigation (FBI) disclosed today that it infiltrated the world's second most prolific ransomware gang, a Russia-based criminal group known as ALPHV and BlackCat. The FBI said it seized the gang's darknet website, and released a…

This blog post is written by Jose Guay, Technical Account Manger, Enterprise Support. A typical option to reduce costs associated with running Amazon Elastic Compute Cloud (Amazon EC2) instances is to stop them when they are idle. However, there are scenarios where stopping an idle instance is not practical. For example, instances with development environments […]

This post is written by Dominic Gagné, Senior Software Development Engineer, and Vinodh Kannan Sadayamuthu, Senior Solutions Architect Amazon MQ now supports cross-Region data replication for ActiveMQ brokers. This feature enables you to build regionally resilient messaging applications and makes it easier to set up cross-Region message replication between ActiveMQ brokers in Amazon MQ. This […]

The notorious 8220 Gang is exploiting a high-severity flaw (CVE-2020-14883) in Oracle WebLogic Server to spread malware.

Are We Ready to Give Up on Security Awareness Training?

- thehackernews.com - December 19, 2023

Budgeting for 2024? Don't forget to allocate funds for security awareness training. Discover why it's crucial for your organization.

Russian cybercriminal Mikhail Pavlovich Matveev, indicted by the U.S., led ransomware attacks worldwide, showing a disregard for ethics.

Play ransomware, impacting 300 entities worldwide, employs a double-extortion model by exfiltrating data before encryption.

U.S. Justice Department disrupts the BlackCat ransomware operation and releases a decryption tool

PyPI packages masquerading as network proxy libraries were found to contain malicious code.

Iranian cyber espionage group MuddyWater targets telecom sectors in Egypt, Sudan, and Tanzania using the MuddyC2Go framework.

PikaBot, a dangerous loader, is spreading via malvertising campaigns targeting users searching for legit software like AnyDesk

Why do programmers need private offices with doors?

- blobstreaming.org - December 19, 2023

It’s a common occurrence: You’re sitting at your desk, lost in thought, trying to solve a problem that’s been blocking your work all week...

Using authenticated logins for Docker Hub in Google Cloud

- GCP devops/sre blogs - December 19, 2023

Follow these best practices for public container images in Docker Hub to reduce security risks to your CI/CD pipeline.

Identifying SaaS App Risks | CSA

- cloudsecurityalliance.org - December 19, 2023

Uncovering the overlooked vulnerabilities in SaaS default settings and user misconfigurations, highlighting the critical need for strengthened security practices in the SaaS ecosystem.

What Controls are Required for SOC 2 Reports? | CSA

- cloudsecurityalliance.org - December 19, 2023

Unveil the truth about SOC 2's role as a reporting and control evaluation framework and the significance of customizing controls to meet business objectives.

Making the Most of Adverse Cyber Circumstances | CSA

- cloudsecurityalliance.org - December 19, 2023

Doing business with a recently breached company might be a strategic move. Explore the aftermath of data breaches and their transformative impact on organizations.

Kubernetes 1.29 'Mandala' Tests Mutable Pod Resources

- thenewstack.io kubernetes - December 18, 2023

Soon, you will be able to adjust the amount of memory or CPU that a container may have on the fly, without restarting. Also, in-tree cloud providers and iptables get the boot.

NetApp Cloud Volumes ONTAP Flash Cache for EDA workloads

- GCP storage blogs - December 18, 2023

How to use NetApp Cloud Volumes ONTAP (NetApp CVO) features to improve the performance of EDA workloads running on Google Cloud.

Introduction Since the initial Amazon Elastic Kubernetes Service (Amazon EKS) launch, it has supported AWS Identity and Access Management (AWS IAM) principals as entities that can authenticate against a cluster. This was done to remove the burden—from administrators—of having to maintain a separate identity provider. Using AWS IAM also allows AWS customers to use their […]

Amazon Web Services (AWS) provides a highly reliable, scalable, and low-cost cloud infrastructure platform in many Regions around the world. AWS has designed these Regions to be isolated from each other. This design enables applications to achieve a high level of fault tolerance and stability. Regions are further grouped into partitions such as aws, aws-gov, […]

Navigating Windows Workload Modernization without Active Directory AWS Customers often migrate Windows workloads to AWS using a lift-and-shift or modernization strategy. Modernizing is a popular choice due to the opportunity to use purpose-built cloud services and reduce TCO by lowering operational overhead and licensing costs. While modernizing, customers often need to evaluate whether they still […]

My memories of Amazon Web Services (AWS) re:Invent 2023 are still fresh even when I'm currently wrapping up my activities in Jakarta after participating in AWS Community Day Indonesia. It was a great experience, from delivering chalk talks and having thoughtful discussions with AWS service teams, to meeting with AWS Heroes, AWS Community Builders, and […]

Check out these examples of how Google's Sovereign Cloud solutions have helped accelerate the adoption of breakthrough technologies like generative AI and data analytics.

Five Great DevOps Job Opportunities - DevOps.com

- devops.com - December 18, 2023

Looking for a great new DevOps job? Check out these available opportunities at Northrop Grumman, Raytheon and more!

Alan Shimel talks with Alex Burkhardt about Observe, Inc. and the company's mission to elevate observability.

Alan Shimel talks with Mezmo's Tucker Callaway about observability, data management and the challenges of too much telemetry data.

Massdriver announced tools for tracking cloud costs and generating a cloud IBOM to IDPs to streamline platform engineering workflows.

Sonar has added a secrets detection capability to its portfolio of tools for analyzing code and DevOps workflows.

The rapid changes in technology, work patterns and demographics are ushering in a new era for the labor market known as the future workforce.

Attackers could achieve remote code execution on Outlook without any user interaction. Learn how these zero-click exploits were discovered and patched

CISA Warns: Default passwords on internet-exposed systems are a ticking time bomb.

Four U.S. nationals charged in $80 million cryptocurrency investment scam. 🚔 If convicted, they could face 20 years in prison.

QakBot malware returns, using sneaky phishing emails masquerading as IRS employees.

Rhadamanthys, a versatile info-stealer, introduces a plugin system, making it more customizable. Cybercriminals can now tailor it to their needs.

Top 7 Trends Shaping SaaS Security in 2024

- thehackernews.com - December 18, 2023

2024 brings new SaaS security challenges. Stay ahead of the curve with insights on democratization, ITDR, and compliance.

Unmasking the Dark Side of Low-Code/No-Code Applications

- thehackernews.com - December 18, 2023

LCNC apps and RPA can leave your business exposed to security risks similar to traditional development.

CCZT Developer Interview: Director Zenith Law | CSA

- cloudsecurityalliance.org - December 18, 2023

Hear from a CCZT Developer about why CSA's Zero Trust certificate program is considered a disruptive extension to other cybersecurity certificates.

eBPF Offensive Capabilities – Next-Gen Malware | CSA

- cloudsecurityalliance.org - December 18, 2023

Explore some of the offensive capabilities that Extended Berkeley Packet Filter (eBPF) provides to an attacker and how to defend against them.

What's Logs Got to Do With It: Visibility & Zero Trust | CSA

- cloudsecurityalliance.org - December 18, 2023

Visibility and analytics is a cross-cutting capability for Zero Trust. It's achieved with logging and monitoring.

Faced with increasing amounts of data and a tightening economic climate, enterprises are looking to save money on their storage costs by moving rarely needed data to archival storage options. The least costly options require your internal systems to support receiving data back in hours or days, often called asynchronous retrievals. With this time delay, […]

DEVOPS WEEKLY ISSUE #677 - 17th December 2023

- devopsweeklyarchive.com - December 17, 2023

Posts this week on developer portals and naming OpenTelemetry attributes, as well as several posts on people and teams, covering the role of engineering managers and devops in 2024.

Any change can break us, but we can't treat every change the same

- surfingcomplexity.blog - December 17, 2023

Here are some excerpts from an incident story told by John Allspaw about his time at Etsy (circa 2012), titled Learning Effectively From Incidents: The Messy Details. In this story, the site goes d…

MongoDB Suffers Security Breach, Exposing Customer Data

- thehackernews.com - December 17, 2023

A security incident at MongoDB has led to unauthorized access to corporate systems, compromising customer account info.

SRE Weekly Issue #403 – SRE WEEKLY

- sreweekly.com - December 17, 2023

A great overview of SLIs, covering event-based vs time-based SLIs, commonly used SLIs, and examples of things that don't make good SLIs.

The Problem: So I tend to get up very early in the morning, maybe 4-5am most days. 'Sleeping In' for me is ~6am or later, and that rarely happens. Lately, instead of adding more blog content, I've been working on a new site to attach to ShavingTheYak. Its an automated…

China's MIIT unveils a color-coded system to tackle data security incidents.

Microsoft warns of the growing threat from "Storm-0539," an emerging group orchestrating gift card fraud via sophisticated email and SMS phishing atta

Orkes to Maintain Conductor Project as Netflix Steps Back

- thenewstack.io cloud-native - December 15, 2023

'This strategic decision … is essential for realigning our resources to better serve our business objectives with our internal Conductor fork,' Netflix said.

Internal developer portals (IDPs) are becoming increasingly popular as organizations strive to improve their developer experience

VMware storage policy based management for GDC Virtual

- GCP storage blogs - December 15, 2023

GDCV (vSphere) version 1.16 supports SPBM, enabling customers to leverage a consistent way to declare datastore clusters and deploy workloads.

Introduction Intra-VPC Communication enables network communication between subnets in the same Amazon Virtual Private Cloud (Amazon VPC) across multiple physical AWS Outposts using the Outposts local gateways (LGW) via direct VPC routing. With this feature, you can leverage a single Amazon VPC architecture for communication between applications and services running on disparate AWS Outposts. You […]

AWS Security Profile series, I interview some of the humans who work in AWS Security and help keep our customers safe and secure. In this profile, I interviewed Arynn Crow, senior manager for AWS User AuthN in AWS Identity. How long have you been at AWS, and what do you do in your current role? […]

Amazon GuardDuty is a threat detection service that continuously monitors your Amazon Web Services (AWS) accounts and workloads for malicious activity and delivers detailed security findings for visibility and remediation. GuardDuty Malware Protection helps detect the presence of malware by performing agentless scans of the Amazon Elastic Block Store (Amazon EBS) volumes that are attached to […]

Today, customers operate tens, hundreds, or even thousands of applications arranged in complex distributed systems composed of many interdependent services. These applications need to be continuously available and performant to maintain end-user satisfaction and business growth. Amazon CloudWatch Application Signals (now in Preview) makes it easy to automatically instrument and operate applications on AWS to […]

Get ready for 2024 with Google Cloud Security Talks

- GCP security blogs - December 15, 2023

To help prepare you for 2024's security landscape, the final installment of this year's Google Cloud Security Talks is coming to you on Dec. 19.

The ScienceLogic SL1 platform incorporates predictive and generative AI tech the company gained with the acquisition of Zebrium in 2022.

The Future of Jenkins in 2024 - DevOps.com

- devops.com - December 15, 2023

Jenkins, the venerable automation server used by many DevOps teams, is adapting to the changing landscape of software development.

Web applications are everywhere in our digital lives, but they're also prime targets for attackers. Learn about the most common vulnerabilities and ho

Crypto hardware wallet maker Ledger faces a major software breach, resulting in the theft of $600,000+ worth of virtual assets.

Google's "Tracking Protection" will restrict them for 1% of Chrome users in early 2024, with plans for wider adoption later.

A powerful botnet, KV-botnet, is using compromised firewalls and routers to conduct covert data transfers.

A novel malware named NKAbuse has surfaced, utilizing blockchain technology for DDoS attacks.

Multiple security vulnerabilities have been found in the open-source pfSense firewall solution, potentially allowing attackers to execute arbitrary co

In the modern world of cloud computing, Infrastructure as Code (IaC) has become a vital practice for deploying and managing cloud resources. AWS Cloud Development Kit (AWS CDK) is a popular open-source framework that allows developers to define cloud resources using familiar programming languages. A related open source tool called Projen is a powerful project […]

AI: Both a Help and a Hindrance for the Public Sector | CSA

- cloudsecurityalliance.org - December 15, 2023

Review the advantages of AI. The industry's stance is shifting from AI being a novel thing to AI being brilliant tech that has massive risks and rewards.

Comments on NIST 800-92r1 | Log Management | CSA

- cloudsecurityalliance.org - December 15, 2023

Gigamon provides comments on the initial draft of NIST Special Publication 800-92r1 “Cybersecurity Log Management Planning Guide.”

CVE-2023-46214: A Dive into Splunk RCE Vulnerability | CSA

- cloudsecurityalliance.org - December 15, 2023

Dive into our expert analysis of the dangerous Remote Code Execution flaw in Splunk. Discover how attackers can exploit this vulnerability and why immediate action is essential.

Live streaming with Media CDN and Google Cloud Load Balancer

- GCP networking blogs - December 15, 2023

Learn how to use Media CDN infrastructure with Google Cloud External Application Load Balancer to render streams hosted in multiple clouds.

Istio Advisor Plus GPT: Expert System Meets AI for Service Mesh

- thenewstack.io service-mesh - December 14, 2023

This combination of AI with Istio's documents is very handy for working out what's what with this popular open source service mesh.

Post co-written by Shahar Azulay, CEO and Co-Founder at GroundCover Introduction The abstraction introduced by Kubernetes allows teams to easily run applications at varying scale without worrying about resource allocation, autoscaling, or self-healing. However, abstraction isn't without cost and adds complexity and difficulty tracking down the root cause of problems that Kubernetes users experience. To […]

Amazon Web Services (AWS) is excited to announce the availability of a new sponsored report from S&P Global Market Intelligence 451 Research, Centralized Trust for Decentralized Uses: Revisiting Private Certificate Authorities. We heard from customers actively seeking centralized management solutions for multi-cloud environments and worked with 451 Research, a technology research solution that provides a […]

Amazon CloudWatch lets customers collect monitoring and operational data in the form of logs, metrics, and events, providing an easy way to monitor and receive notifications regarding their workload health and often integrate directly with other systems, such as JIRA Service Desk and ServiceNow. The CloudWatch alarms feature lets you monitor CloudWatch metrics and receive […]

Artificial intelligence has emerged as the ninth cloud security megatrend. In the latest Cloud CISO Perspectives newsletter, Phil Venables explains why.

CloudBolt's Kyle Campos believes that, going forward, the cost to run an application will become the ultimate performance metric.

By implementing role-based access control (RBAC) in the CI/CD pipeline, DevOps teams can help ensure secure and efficient operations.

Sourcegraph's open source Cody tool leverages generative artificial intelligence (AI) tool to write and fix code.

Ten Years Later, New Clues in the Target Breach

- krebsonsecurity.com - December 14, 2023

On Dec. 18, 2013, KrebsOnSecurity broke the news that U.S. retail giant Target was battling a wide-ranging computer intrusion that compromised more than 40 million customer payment cards over the previous month. The malware used in the Target breach included…

Lambda now supports Python 3.12. This release uses the Amazon Linux 2023 OS, supports Unicode responses, and graceful shutdown for functions with external extensions, and Python 3.12 language features.

Cybersecurity researchers have identified a total of 116 malicious packages on the Python Package Index (PyPI) repository.

Iranian state-sponsored group OilRig deployed three new downloader malware in 2022 to maintain access to Israeli organizations.

Gaza Cyber Gang, a pro-Hamas threat actor, is using an updated backdoor malware called Pierogi++ to target Palestinian entities.

An Update on EU Cybersecurity | CSA

- cloudsecurityalliance.org - December 14, 2023

Explore the latest in EU cybersecurity regulations, including the NIS2 Directive, EU Cybersecurity Schemes, and the Cyber Resilience Act.

Integrate CSA STAR Level 2 Into Your Compliance | CSA

- cloudsecurityalliance.org - December 14, 2023

Take a detailed look at the benefits of CSA STAR Level 2 and how to integrate the framework into your compliance strategy.

IMPERIAL KITTEN Deploys Novel Malware Families | CSA

- cloudsecurityalliance.org - December 14, 2023

CrowdStrike has been investigating a series of cyber attacks that occurred in October 2023, which CrowdStrike attributes to the IMPERIAL KITTEN adversary.

How the OpenTelemetry Collector Scales Observability

- thenewstack.io observability - December 13, 2023

Two talks at KubeCon+CloudNativeCon 2023 showed the range of tools and services in the observability space.

AWS Identity and Access Management (IAM) policies are at the core of access control on AWS. They enable the bundling of permissions, helping to provide effective and modular access control for AWS services. Service control policies (SCPs) complement IAM policies by helping organizations enforce permission guardrails at scale across their AWS accounts. The use of access control […]

Amazon Web Services (AWS) is pleased to announce the successful renewal of the AWS CyberGRX cyber risk assessment report. This third-party validated report helps customers perform effective cloud supplier due diligence on AWS and enhances customers' third-party risk management process. With the increase in adoption of cloud products and services across multiple sectors and industries, AWS has become a critical […]

Duet AI for Developers and in Security Operations now GA

- GCP security blogs - December 13, 2023

Duet AI for Developers and Duet AI in Security Operations are now generally available.

Copado expanded a beta program that provides access to generative AI capabilities to teams building apps for the Salesforce SaaS platform.

We propose an approach that unlocks the power of DevOps engineers to own their databases and lets them self-serve deployments.

The majority of software developers have embraced platform engineering to manage DevOps workflows at scale in the last year.

Things To Do During Slow Times - DevOps.com

- devops.com - December 13, 2023

Don MacVittie offers suggestions on what to tackle during this slow, holiday-filled time of year when many folks may not be available.

In an earlier post, we discussed how the hub-and-spoke architecture introduced by Local Zones unlocks more choices than ever for geographies where lower latency access can be introduced. Through workload placement techniques offered by service mesh technology for "east-west traffic", inter-service communication within a customer's Virtual Private Cloud (VPC), customers can make sure that microservice […]

Weekly.tf Issue #151

- weekly.tf - December 13, 2023

AI with Terraform, Efficient Azure Infrastructure Management with GitLab

Container Security: Why You Need a Preventive Approach | CSA

- cloudsecurityalliance.org - December 13, 2023

Discover the importance of embedding preventive security into the container ecosystem as part of an exposure management strategy.

The Perils and Protections of Privileged Accounts | CSA

- cloudsecurityalliance.org - December 13, 2023

Learn the risks of privileged accounts, how attackers exploit them, and the role of Privileged Access Management (PAM) in protection.

Enterprises may want to customize their data sets for different requesting applications. For example, if you run an e-commerce website, you may want to mask Personally Identifiable Information (PII) when querying your data for analytics. Although you can create and store multiple customized copies of your data, that can increase your storage cost. You can […]

Karmada Finally Brings Multicloud Control to Kubernetes

- thenewstack.io kubernetes - December 12, 2023

Unhappy with KubeFed stagnation, an Asian-led group of businesses developed Karmada, an open source multicloud cluster management system that has just won approval from the CNCF.

Thinking about an Internal Developer Portal? Think Open Source

- thenewstack.io platform-engineering - December 12, 2023

Proprietary solutions can't come close to accommodating the range of functionality and support that open solutions naturally offer. And the speed of evolution with community-based software is typically hard to beat by a single vendor.

Docker Buys AtomicJar to Spur Dev-Led Integration Testing

- thenewstack.io containers - December 12, 2023

With the addition of Testcontainers, Docker augments a portfolio of tools for developers to strengthen an "inner-loop" of development before the code is handed over to sluggish CCI systems.

Today, we are excited to introduce the EKS Developers Workshop, a comprehensive and beginner-friendly workshop designed specifically for developers embarking on their Kubernetes and Amazon Elastic Kubernetes Service (Amazon EKS) journey. This new workshop augments the existing EKS Workshop for cluster operators by focusing on developers and the unique tools and processes they utilize in […]

Today we are announcing the general availability to connect and query your existing MySQL and PostgreSQL databases with support for AWS Cloud Development Kit (AWS CDK), a new feature to create a real-time, secure GraphQL API for your relational database within or outside Amazon Web Services (AWS). You can now generate the entire API for […]

One big thing that SRE and observability have in common is that they are both often erroneously equated with monitoring.

Data observability aims to alert you to your data's reliability and health while also delivering the insights required to resolve any issues.

Microsoft Patch Tuesday, December 2023 Edition

- krebsonsecurity.com - December 12, 2023

The final Patch Tuesday of 2023 is upon us, with Microsoft Corp. today releasing fixes for a relatively small number of security holes in its Windows operating systems and other software. Even more unusual, there are no known "zero-day" threats…

With 11 high-profile attacks in 13 months and a volatile, ungoverned attack surface, non-human identities are the new perimeter, and 2023 is only the

Hacking incidents in the healthcare sector have surged by more than threefold from 2018 to 2022. It's time for proactive cybersecurity measures.

AppLovin builds AI ad platform on Google Cloud G2 VMs

- GCP compute blogs - December 12, 2023

AppLovin modernized its AdTech platform on Google Cloud G2 VMs powered by NVIDIA L4 Tensor Core GPUs, and running on GKE.

How to decarbonize your Google Cloud carbon footprint

- GCP infra blogs - December 12, 2023

Google Cloud offers a suite of tools that helps organizations understand their carbon footprint and decarbonize their technical architecture.

How to Create AWS VPC Using Terraform

- devopscube.com - December 12, 2023

In this blog, you will learn to create AWS VPC using well structure terraform modules. It is a

AI at Work: Three Steps to Protect Your Business | CSA

- cloudsecurityalliance.org - December 12, 2023

Explore the impact of AI on data security with insights from a leading CEO. Learn why defenders need to conduct rigorous data risk assessments.

Embed Security from Code to Cloud with Unified CNAPPs | CSA

- cloudsecurityalliance.org - December 12, 2023

Learn how cloud native application protection platforms (CNAPPs) work with CSPM to embed best practices across the organization.

Why Your Public Partners Care About Your Cybersecurity | CSA

- cloudsecurityalliance.org - December 12, 2023

Enhance private company resilience and mitigate risks with robust cybersecurity aligned with ESG priorities.

Three new videos showcase Google Cloud's advanced networking capabilities: Cloud Firewall Plus, NCC VPC spoke support, and Network Function Optimizer.

With ransomware a top concern for customers, backups are essential to data recovery and business continuity. Customers want a simple method, preferably in a user console, for enabling immutability for backup vaults holding the encrypted data copy. The write-once, read-many (WORM) model applied to backup data provides immutability to recover from accidental or malicious deletions. […]

GitHub Developer Productivity at 30 Billion Messages per Day

- thenewstack.io platform-engineering - December 11, 2023

GitHub is uniquely positioned to impact developer experience at a global scale. So how does GitHub measure developer productivity? We chat with Akshaya Aradhya, senior director of engineering at GitHub, to learn how her team works to increase productivity across the tech company

For production applications, the Mean-Time-To-Recovery (MTTR) is critical. In line with this, AWS offers Business, Enterprise On-Ramp and Enterprise support plans where AWS customers can benefit from shorter response time for cases related to production and business critical workloads. However, without having an automated way to notify AWS support, creating a case is a manual […]

Introduction In today's digital era, migrating to the cloud is no longer a question of "Why," but rather "When." Beyond infrastructure cost savings, cloud migration offers a multitude of benefits, including enhanced flexibility, agility, and reliability. However, while cloud migration presents a wealth of opportunities, it also comes with the potential for unplanned expenses that […]

Overview Effective operation of cloud applications and services demands a strong focus on monitoring and observability. It's critical for your teams to define, capture, and analyze metrics, ensuring operational visibility and extracting actionable insights from logs. In many companies, technical teams share integrated systems to monitor the services or infrastructure they manage. Shared observability systems […]

Intro Migration involves a crucial step of validating that your applications perform as expected in the cloud, achieved through multiple checks or scripts run on migrated servers. Manual performance of these tasks is complex, time-consuming, and prone to errors, particularly when migrating servers or applications at scale. AWS Application Migration Services (AWS MGN) simplifies this […]

Atlassian's generative AI capabilities are now generally available across its Jira and Confluence suite of tools for managing IT and DevOps workflows.

Five Great DevOps Job Opportunities - DevOps.com

- devops.com - December 11, 2023

Looking for a great new DevOps job? Check out these available opportunities at Sony, Fiddler AI, Leidos and more!

A hackathon, when done right, reflects a belief in the symbiotic relationship between humans and AI, where innovation meets practicality.

Speaker 1: This is Techstrong TV. Alan Shimel: Hey, everyone, we're back. We're here in Chicago at KubeKon. We're wrapping up our day two coverage, our

Dude - Dell's been expanding community outreach and becoming more involved in the cloud-native community. Alan Shimel talks with Brad Maltz about the shift.

Amazon CodeCatalyst is a modern software development service that empowers teams to deliver software on AWS easily and quickly. Amazon CodeCatalyst provides one place where you can plan, code, and build, test, and deploy your container applications with continuous integration/continuous delivery (CI/CD) tools. In this post, we will walk-through how you can configure Blue/Green and […]

Natural Disasters: A Perfect Storm for Data Breaches | CSA

- cloudsecurityalliance.org - December 11, 2023

After a disaster, organizations must prioritize relief efforts over data security. However, people are more vulnerable to fraud during times of crisis.

Tech Teams Need to Abandon Traditional IAM and PAM | CSA

- cloudsecurityalliance.org - December 11, 2023

Forward-thinking organizations are moving away from conventional IAM and PAM solutions and migrating towards cloud-native access management solutions.

DEVOPS WEEKLY ISSUE #675 - 3rd December 2023

- devopsweeklyarchive.com - December 10, 2023

Posts on observability, large systems evolution, software supply chain security, architecture principles and AWS re:Invent this week.

"Human error" means they don't understand how the system worked

- surfingcomplexity.blog - December 10, 2023

One of the services that the Amazon cloud provides is called S3, which is a data storage service. Imagine a hypothetical scenario where S3 had a major outage, and Amazon's explanation of the …

SRE Weekly Issue #402 – SRE WEEKLY

- sreweekly.com - December 10, 2023

Wow, this interactive tool for choosing SLOs is fun to play with! Dragging the sliders really gives you a feel for the math involved, and then you get a formula that you can actually use.

OpenSpeedTest: Check the Speed of your LAN via Web Browser

- thenewstack.io networking - December 09, 2023

OpenSpeedTest is handy for testing basic LAN network speeds or helping you to troubleshoot to see if your LAN is responding as it should.

Let's recap the week at AWS re:Invent 2023 with a round-up of the AWS Observability launches across Amazon CloudWatch, Amazon Managed Grafana, and Amazon Managed Service for Prometheus. From automatic instrumentation and operation of applications in CloudWatch, to agentless scraping of Prometheus metrics in Managed Service for Prometheus, read on to learn about the features […]

Tame the Tiger: A Lighthearted Guide to Platform Teams

- thenewstack.io platform-engineering - December 08, 2023

A few lessons learned — often from mistakes — about scaling an organization and navigating the complexities of platform team development.

Modernizing Your Tech Stack in the Public Sector

- thenewstack.io operations - December 08, 2023

Many factors come into play when considering which parts of your tech stack to modernize within the parameters of your business goals.

30 Pull Requests Later, Prometheus Memory Use Is Cut in Half

- thenewstack.io observability - December 08, 2023

Grafana Labs Distinguished Engineer Bryan Boreham detailed at KubeCon how he reduced the memory usage of Prometheus.

Entrepreneurship for Engineers: Level up Your Sales Game

- thenewstack.io cloud-native - December 08, 2023

If a startup gains traction, it can hire a sales team. In the meantime, it's up to its founder to build sales skills and close the deals.

Introduction In this post, we'll deep dive into the architecture principles we use in Amazon Elastic Container Service (Amazon ECS). We'll outline some of the features that Amazon ECS delivers to make it easy for your application to achieve high availability and resilience. We explore how Amazon ECS is designed to use AWS availability and […]

Introduction Containerization has gained popularity as a method for deploying and managing applications with Kubernetes, which is a leading container orchestration platform. Many customers choose Amazon Elastic Kubernetes Service (Amazon EKS) for its performance, scalability, availability, and integration with other AWS services and security. Enterprises across the industry opt for private container repositories, such as […]

Amazon Web Services (AWS) successfully completed a surveillance audit for ISO 9001:2015, 27001:2022, 27017:2015, 27018:2019, 27701:2019, 20000-1:2018, and 22301:2019, and Cloud Security Alliance (CSA) STAR Cloud Controls Matrix (CCM) v4.0. Ernst and Young Certify Point auditors conducted the audit and reissued the certificates on Nov 22, 2023. The objective of the audit was to assess […]

Background In a typical 3-tier application architecture, WebLogic is an application server that runs on a middle tier between back-end databases and browser-based clients. WebLogic allows users to develop and deploy an application that has business logic and allows the application to access other services like database, messaging, or other enterprise systems. Many customers still […]

Introducing Cloud SQL IAM group authentication

- GCP security blogs - December 08, 2023

New IAM groups authentication in Cloud SQL simplifies granting/revoking access to database objects at scale.

As the cars on our roads become smarter and more interconnected, the complexity of developing their software systems multiplies.

The flexibility and scalability of open source will allow car-makers to free their imagination and create software-driven cars of the future.

Sauce Labs has added native visual regression testing capabilities to its testing platform to enable DevOps teams to streamline workflows.

EKS: Adding a Redirect Rule to an ALB - ShavingTheYak

- shavingtheyak.com - December 08, 2023

How to add a redirect rule to an ALB using just an ingress resource in EKS.

Learn how to use Amazon EKS Blueprints for CDK to simplify integration of common tooling and provisioning of complete, opinionated EKS clusters that meet specific application requirements. This solution is designed to replace the deprecated Amazon EKS Quick Start.

AWS Transit Gateway is a network transit hub that enables you to connect thousands of Amazon Virtual Private Clouds (Amazon VPCs) and your on-premises networks using a single gateway. This simplifies your network connection and puts an end to complex peering relationships. AWS Transit Gateway Flow Logs enables you to export detailed telemetry information, such as source/destination […]

Is Cybersecurity Ready for Biden's AI Executive Order? | CSA

- cloudsecurityalliance.org - December 08, 2023

President Biden issued an executive order that trains the full scope of the administration's authority on emerging risks posed by AI technology.

Compromising Identity Provider Federation | CSA

- cloudsecurityalliance.org - December 08, 2023

CrowdStrike has seen an increase in cases involving adversaries that abuse identity provider federation to gain access to protected services.

DynamoDB vs. ScyllaDB: A Price Performance Comparison

- thenewstack.io operations - December 07, 2023

To better assess whether moving off DynamoDB makes sense, we did a detailed comparison across workload conditions, distributions and read:write ratios

AWS App Runner is a fully managed container application service that lets you build, deploy, and run containerized web applications and API services without prior infrastructure or container experience. AWS App Runner abstracts the intricacies of infrastructure, which enables companies such as Wix, Hubble, Cox, and others to accelerate innovation without the need to invest […]

Introduction Customers can run their Windows container-based applications on Amazon Elastic Container Service (Amazon ECS) using AWS Fargate to avoid the undifferentiated heavy lifting of managing servers. A common use case for Windows Containers on AWS is to run web applications hosted using Internet Information Services (IIS). When using common files in a web farm, […]

AWS Identity and Access Management (IAM) roles are a powerful way to manage permissions to resources in the Amazon Web Services (AWS) Cloud. IAM roles are useful when granting permissions to users whose workloads are static. However, for users whose access patterns are more dynamic, relying on roles can add complexity for administrators who are […]

By utilizing tools, implementing processes and continuously monitoring costs, you can save money while still reaping the benefits offered by different cloud providers.

Under an early access program, PagerDuty, Inc. is making available a tool that brings generative AI capabilities to its ITSM platform.

The goal of vulnerability management is to close the gap between discovery and resolution, thereby minimizing the window of opportunity for potential cyberattacks.

Google is a Leader in 2023 Gartner MQ for SCPS

- GCP compute blogs - December 07, 2023

For the sixth consecutive year, Google Cloud is a leader in Gartner Strategic Cloud Platform Services Magic Quadrant.

This blog covers the essential steps to secure your Docker images against potential vulnerabilities using Trivy scanner. Trivy

Recent Cybersecurity Incidents at Universities | CSA

- cloudsecurityalliance.org - December 07, 2023

Cybercriminals have set their sights on higher education. This blog details 5 incidents so that schools can understand the threats being aimed at them.

Are You a Fit for Advanced Cloud Security Training? | CSA

- cloudsecurityalliance.org - December 07, 2023

CSA's Advanced Cloud Security Practitioner (ACSP) training shows you how to build an enterprise-scale cloud security program.

The Road to Autonomous Cloud Security Remediation | CSA

- cloudsecurityalliance.org - December 07, 2023

Explore the shift from manual to automated remediation with GenAI in cybersecurity. The benefits include quicker remediation and reduced costs.

New Connectivity Tests coverage helps network troubleshooting

- GCP networking blogs - December 07, 2023

Google Cloud's Connectivity Tests includes new coverage to help you understand the reachability of your network services.

Reimagining Multicluster Kubernetes with k0s/k0smotron

- thenewstack.io kubernetes - December 06, 2023

k0s is highly-flexible Kubernetes, letting you configure and put control planes and workers wherever that makes sense for your use cases.

2024: The Year of Testing - DevOps.com

- devops.com - December 06, 2023

Now that AI has made advanced automation a fact, it is time to consider implementing the level of testing we always knew we should have.

If 2023 was the year of artificial intelligence (AI), then 2024 is going to be the year of human coexistence with the technology.

ICANN Launches Service to Help With WHOIS Lookups

- krebsonsecurity.com - December 06, 2023

More than five years after domain name registrars started redacting personal data from all public domain registration records, the non-profit organization overseeing the domain industry has introduced a centralized online service designed to make it easier for researchers, law enforcement…

Introducing Cloud TPU v5p and AI Hypercomputer

- GCP compute blogs - December 06, 2023

The new TPU v5p is a core element of AI Hypercomputer, which is tuned, managed, and orchestrated specifically for gen AI training and serving.

Introducing Dynamic Workload Scheduler

- GCP compute blogs - December 06, 2023

Dynamic Workload Scheduler lets you request Compute Engine accelerators in advance, to help ensure capacity allocation for your ML workloads.

11 Supply Chain Attacks in 13 Months | CSA

- cloudsecurityalliance.org - December 06, 2023

Don't overlook a critical area of supply chain security risk: non-human identities and their ungoverned access to core business and engineering environments.

Why CISOs Are Investing in AI-Native Cybersecurity | CSA

- cloudsecurityalliance.org - December 06, 2023

CISOs recognize how attackers use AI for malicious purposes and are investing in AI-native cybersecurity.

For many stateful containerized applications, such as those using Kubernetes orchestration, each stateful pod (the smallest deployable container object) may require dedicated persistent storage. A block storage solution is a good fit due to its high performance, low latency, and persistence attributes. If a compute instance has more compute resources to spare, you can only […]

What Is Operational Resilience?

- thenewstack.io operations - December 05, 2023

A series of recent service outages by cloud providers underscores the dangers to organizations and their customers. Planning for operational resilience can help protect against disaster.

JetBrains Developer Survey Tracks Rapid Adoption of AI

- thenewstack.io operations - December 05, 2023

Three in four developers use ChatGPT and nearly half use GitHub Copilot, according to a new survey by JetBrains. But very few devs think generative AI will take over all coding tasks.

How to Know If You're Building the Right Internal Tools

- thenewstack.io operations - December 05, 2023

In this episode of The New Stack Makers, Rob Skillington, of Chronosphere shared what he's learned from building platforms and tools for his colleagues.

The term "digital transformation" describes the implementation of new technologies, talents, and processes to remain competitive in an ever-changing technology landscape. Companies must embrace transformation initiatives to gain benefits such as improving productivity, improving customer experiences and reduce operational costs. A successful transformation journey involves both Migration and Modernization. Modernization is the refactoring of legacy technology by […]

Building advanced AI apps demands the right tools, and the right generative AI tools can elevate your projects significantly.

Generative AI is set to benefit the documentation and transformation of legacy code and potentially create new documentation in parallel with new builds.

AI is already being used in code writing, code review, quality assurance/testing, debugging and design and architecture, according to a recent survey.

An analysis of the security automation practices of 130 organizations published by Synopsys suggests significant progress toward securing software supply chains.

Customers use AWS Network Load Balancer (NLB), Classic Load Balancer (CLB), or Application Load Balancer (ALB) as load balancers or ingress with Amazon Elastic Kubernetes Service (Amazon EKS) clusters. AWS Load Balancer Controller is designed to help manage Elastic Load Balancers for a Kubernetes cluster. It satisfies Kubernetes Ingress resources by provisioning ALBs and Kubernetes […]

HPC Kubernetes: AI Training on 3,500 GPUs

- thenewstack.io kubernetes - December 04, 2023

K8s brings many advantages to managing fleets of GPUs, said CoreWeave's Peter Salanki, during a talk at KubeCon+CloudNativeCon 2023.

Cloud Migration and Platform Engineering at Large Organizations

- thenewstack.io platform-engineering - December 04, 2023

Learn what parts of a platform engineering strategy is the same, regardless of org size, and what things larger orgs have to pay attention to.

Running Weights and Biases Launch ML platform on GKE

- GCP containers blogs - December 04, 2023

Running the Weights & Biases Launch ML developer platform on GKE can reduce operational overhead and can improve an organization's security posture.

AWS Identity and Access Management (IAM) Access Analyzer offers tools that help you set, verify, and refine permissions. You can use IAM Access Analyzer external access findings to continuously monitor your AWS Organizations organization and Amazon Web Services (AWS) accounts for public and cross-account access to your resources, and verify that only intended external access […]

Introduction In this blog post you will learn how to visualize AWS Health events using Amazon Managed Grafana to gain deeper insights across multiple Health events in a centralized place. When used in conjunction with AWS Health, Grafana can enhance the ability to respond to issues, optimize performance, and ensure the overall Health of the […]

Cloud Armor for Regional External Application Load Balancers can help customers create regionally-scoped Cloud Armor security policies, and is now generally available.

Amazon Virtual Private Cloud (VPC) endpoints – powered by AWS PrivateLink—allow you to securely expose your application to consumers on AWS without using public IP space and without worrying about overlapping private IP space. You also don't have to worry about creating bidirectional network paths using services like AWS Transit Gateway or Amazon VPC Peering.To […]

New 99.9 percent availability SLA for Standard Tier networking

- GCP networking blogs - December 04, 2023

With the Standard Tier availability SLA, customers should experience no more than ~43 bad minutes - a loss of external connectivity - within a month.

DEVOPS WEEKLY ISSUE #675 - 3rd December 2023

- devopsweeklyarchive.com - December 03, 2023

A mix of topics this week, running from operations (status page updates), observability (several posts on open telemetry use cases), plus videos from the recent PackagingCon conference and tools for managing GitHub Action runners.

SRE Weekly Issue #401 – SRE WEEKLY

- sreweekly.com - December 03, 2023

Maybe you're thinking of skipping over "yet another article about blamelessness"? Don't. This one has some great examples and stories and is well worth a read.

User stories are represented as work items in Azure DevOps, allowing you to manage and track them effectively throughout the development lifecycle. Creating a

DevOps isn't just about software engineering methods and tools, its about results.

Setting Up Prometheus Observability Stack Using Docker

- devopscube.com - December 02, 2023

This blog covers the step by step guide to setup Observability Stack that contains Prometheus, Grafana & Alert

How Meta Patches Linux at Hyperscale

- thenewstack.io operations - December 01, 2023

Patching Linux is easy. Except when you need to patch tens of thousands of servers without downtime. Here's how Meta does it.

Application performance monitoring (or APM) is the practice of taking key application performance indicators to ensure system availability, improve system performance, and improve the end-user experience. This week we announced Amazon CloudWatch Application Signals, a new set of features built-in to Amazon CloudWatch to help you speed up troubleshooting, reduce application disruptions, and operational costs, […]

Circles X uses DORA DevOps best practices to build the first telco-as-a-service in Indonesia, helping partners to launch a digital telco.

Hey Programming Language Developer — Get over Yourself

- thenewstack.io observability - November 30, 2023

In this edition of The Tech Founder Odyssey, Jean Yang of Akita Software advocates for a pragmatic and data-driven approach to shape programming languages and tools in response to real-world developer needs.

Microsoft's New .NET Dev Tool Draws Community Support

- thenewstack.io kubernetes - November 30, 2023

Microsoft's new .NET Aspire tool has generated a swell of community interest, particularly in a tool called Aspir8.

Use workflows to deploy and manage kubernetes

- GCP containers blogs - November 30, 2023

Use the newly released Kubernetes API connector and the existing Kubernetes Engine API connector to manage the full lifecycle of Kubernetes.

Filestore features for stateful workloads on GKE

- GCP containers blogs - November 30, 2023

New features in Filestore, a fully managed, GKE integrated NFS storage service, help support demanding GKE stateful workloads such as AI/ML training.

Several independent software vendors (ISVs) and software as a service (SaaS) providers need to access their customers' Amazon Web Services (AWS) accounts, especially if the SaaS product accesses data from customer environments. SaaS providers have adopted multiple variations of this third-party access scenario. In some cases, the providers ask the customer for an access key […]

I've always loved building things, but when I first began as a software developer, my least favorite part of the job was thinking about security. The security of those first lines of code just didn't seem too important. Only after struggling through security reviews at the end of a project, did I realize that a […]

One of the challenges with distributed systems is that they are made up of many interdependent services, which add a degree of complexity when you are trying to monitor their performance. Determining which services and APIs are experiencing high latencies or degraded availability requires manually putting together telemetry signals. This can result in time and […]

Today, we are announcing an improved Amazon SageMaker Studio experience! The new SageMaker Studio web-based interface loads faster and provides consistent access to your preferred integrated development environment (IDE) and SageMaker resources and tooling, irrespective of your IDE choice. In addition to JupyterLab and RStudio, SageMaker Studio now includes a fully managed Code Editor based […]

Today, I'm happy to share the integrated development environment (IDE) extension for AWS Application Composer. Now you can use AWS Application Composer directly in your IDE to visually build modern applications and iteratively develop your infrastructure as code templates with Amazon CodeWhisperer. Announced as preview at AWS re:Invent 2022 and generally available in March 2023, Application Composer is […]

Today, we are announcing the general availability of myApplications supporting application operations, a new set of capabilities that help you get started with your applications on AWS, operate them with less effort, and move faster at scale. With myApplication in the AWS Management Console, you can more easily manage and monitor the cost, health, security […]

Today, Amazon Inspector adds three new capabilities to increase the realm of possibilities when scanning your workloads for software vulnerabilities: Amazon Inspector introduces a new set of open source plugins and an API allowing you to assess your container images for software vulnerabilities at build time directly from your continuous integration and continuous delivery (CI/CD) […]

AWS Fault Injection Service (FIS) helps you to put chaos engineering into practice at scale. Today we are launching new scenarios that will let you demonstrate that your applications perform as intended if an AWS Availability Zone experiences a full power interruption or connectivity from one AWS region to another is lost. You can use […]

Today we're launching zonal autoshift, a new capability of Amazon Route 53 Application Recovery Controller that you can enable to automatically and safely shift your workload's traffic away from an Availability Zone when AWS identifies a potential failure affecting that Availability Zone and shift it back once the failure is resolved. When deploying resilient applications, […]

SaaS (Software as a Service) platforms are hosted centrally and accessed through the Internet. They are subscription-based, providing users with regular

Mandiant's Earl Matthews pens a guest column on how security validation can help security and business leaders craft a clearer risk profile picture.

ChatGPT And Python: Some Basic Stuff - ShavingTheYak

- shavingtheyak.com - November 30, 2023

Basic fun example of calling the OpenAI API from your python script, with some caveats...

Improving SLOs with Nobl9 and Google Cloud

- GCP devops/sre blogs - November 30, 2023

How Nobl9's new reliability AI product, built on Google Cloud, helps make SLOs easier to understand and manage.

How a Popular Combo Provides DDoS Protection

- thenewstack.io operations - November 29, 2023

Border Gateway Protocol and Generic Routing Encapsulation allow rerouting of traffic to scrubbing centers where harmful data is filtered out.

OpenTelemetry for Go Is Almost a Go

- thenewstack.io observability - November 29, 2023

The OpenTelemetry project contributors are developing a bridge for Go and associated modules.

Apigee Hybrid now uses Helm charts for configuration

- GCP containers blogs - November 29, 2023

You can now perform installation and Day 2 operations of Apigee Hybrid with Helm charts.

At Amazon Web Services (AWS), we're committed to providing our customers with continued assurance over the security, availability, confidentiality, and privacy of the AWS control environment. We're proud to deliver the Fall 2023 System and Organizational (SOC) 1, 2, and 3 reports to support your confidence in AWS services. The reports cover the period October […]

As organizations expand their Amazon Web Services (AWS) environment and migrate workloads to the cloud, they find themselves dealing with many AWS Identity and Access Management (IAM) roles and policies. These roles and policies multiply because IAM fills a crucial role in securing and controlling access to AWS resources. Imagine you have a team creating […]

This blog post demonstrates how to help meet your security goals for a containerized process running outside of Amazon Web Services (AWS) as part of a hybrid cloud architecture. Managing credentials for such systems can be challenging, including when a workload needs to access cloud resources. IAM Roles Anywhere lets you exchange static AWS Identity […]

Today we are excited to announce the general availability of SaaS Quick Launch, a new feature in AWS Marketplace that makes it easy and secure to deploy SaaS products. Before SaaS Quick Launch, configuring and launching third-party SaaS products could be time-consuming and costly, especially in certain categories like security and monitoring. Some products require […]

Okta: Breach Affected All Customer Support Users

- krebsonsecurity.com - November 29, 2023

When KrebsOnSecurity broke the news on Oct. 20, 2023 that identity and authentication giant Okta had suffered a breach in its customer support department, Okta said the intrusion allowed hackers to steal sensitive data from fewer than one percent of…

This blog post explores how Amazon Q, the generative artificial intelligence (AI) powered assistant from AWS, helps you troubleshoot network-related issues by working with Amazon VPC Reachability Analyzer. These are exciting times for cloud networking! We're a long way from the days of debugging connectivity issues with ping and traceroute. Now we ask questions in […]

Managing network connectivity through categorized vpcs

- GCP networking blogs - November 29, 2023

Manage network connectivity through categorized VPCs. By carefully considering the connectivity requirements of each application, organizations can strike the right balance between security and flexibility.

Amazon S3 Express One Zone Introduces Near-Real Time Object Storage

- thenewstack.io cloud-native - November 28, 2023

Able to process millions of requests-per-second, Amazon S3 Express One Zone promises to hasten data access speeds by 10x over the AWS s3 Standard edition, offering single-digit millisecond latency while reducing request costs by 50%.

Securing Microservices Communication with mTLS in Kubernetes

- thenewstack.io microservices - November 28, 2023

Microservices often communicate with each other to fulfill complex business operations, creating security and scaling challenges. Mutual Transport Layer Security (mTLS) can help. Here's how to get started.

The post was co-written by Skylar Graika (Sr Principal Engineer, Smartsheet) Introduction Highly successful companies know that maintaining an accelerated pace of innovation is key to continued growth. They are increasingly looking to modernize their digital backbone of applications and development practices to support faster innovation and improved performance, security, and reliability, while maintaining a […]

Cost-efficient AI inference with Cloud TPU v5e on GKE

- GCP containers blogs - November 28, 2023

Cloud TPUs on GKE offer the scalability, orchestration, and operational benefits of GKE while maintaining the leading price-performance of TPU.

In this post, I will show you how to apply security at multiple layers of a web application hosted on AWS. Apply security at all layers is a design principle of the Security pillar of the AWS Well-Architected Framework. It encourages you to apply security at the network edge, virtual private cloud (VPC), load balancer, […]

ID Theft Service Resold Access to USInfoSearch Data

- krebsonsecurity.com - November 28, 2023

One of the cybercrime underground's more active sellers of Social Security numbers, background and credit reports has been pulling data from hacked accounts at the U.S. consumer data broker USinfoSearch, KrebsOnSecurity has learned.

Learn how to safely migrate to new terraform resources for cloud run service v2 without making changes to deployed resources.

Deep learning processes often need to read full datasets, which are usually hundreds of gigabytes in size, before they can perform intelligent data processing. High data retrieval speed and low latency from storage are crucial for enterprises running these performance-critical workloads. Akridata, an AWS independent software vendor (ISV) partner, helps make artificial intelligence (AI)-assisted unstructured-data […]

ChaosSearch is an Amazon S3-native database built on a serverless, stateless compute architecture within AWS that delivers live search, SQL, and Generative AI analytics. At ChaosSearch, the speed and performance of our architecture is important to us and our customers because time to results is the difference between success and failure, and we rely on […]

ClickHouse is a columnar database management system (DBMS) designed for blazing-fast real-time analytics. It was built to address the needs of interactive analytical applications requiring up-to-the-second analytics. To do that, it must support real-time data ingestion at the rate of hundreds of millions of events per second and run complex analytical queries, such as filtering, […]

Machine learning presents a number of new challenges to data teams, calling for technology solutions that can support training and fine-tuning performance-critical workloads with high performance. Data version control is one of the facets of high-performing ML pipelines, as it allows efficient experimentation and full ML pipeline reproducibility at scale. lakeFS by Treeverse, an AWS […]

Organizations are modernizing their data lakes on Amazon Simple Storage Service (Amazon S3) to handle the ever-growing data volume and speed while meeting the demands of analytics, machine learning (ML), artificial intelligence (AI), and generative AI applications. To enable a data-driven culture and remain innovative, the data platform must allow for data-centric collaboration across business […]

Arm Pushes AI into the Smallest IoT Devices with Cortex-M52 Chip

- thenewstack.io edge-computing - November 27, 2023

With its new Cortex-M52 chip, Arm is enabling AI analysis on small IoT devices at the edge.

As cloud environments—and security risks associated with them—become more complex, it becomes increasingly critical to understand your cloud security posture so that you can quickly and efficiently mitigate security gaps. AWS Security Hub offers close to 300 automated controls that continuously check whether the configuration of your cloud resources aligns with the best practices identified […]

The rapid growth of generative AI brings promising new innovation, and at the same time raises new challenges. At AWS, we are committed to developing AI responsibly while enabling customers to provide assurance regarding the security of their environment to regulators and auditors. AWS Audit Manager announces the first version of AWS best practices framework for generative AI […]

The AWS Well-Architected Tool (WA Tool) helps you define and review workloads based on the latest AWS architectural best practices. This allows you to consistently identify areas of strength and improvement in your workloads. During a Well-Architected review, you answer questions to evaluate your architecture and receive an improvement plan detailing any high or medium […]

Whether you use Terraform or something else to code your EKS cluster configurations, you will have likely run into the following scenario...

Introduction Since their introduction in 2010, tags have been helping Amazon Web Services (AWS) customers identify, organize, and manage their resources by adding referenceable key/value pairs. In this post, we explore how tags can be used to automate the addition and removal of Amazon VPC Lattice resource associations, and cross account resource shares using Amazon […]

How communication contributes to software delivery success

- GCP devops/sre blogs - November 27, 2023

When individuals from different backgrounds come together, they bring ideas and insights that lead to better problem-solving and decision-making.

This post is Part 2 of a two-part blog post series that will take you, an application developer, through the process of configuring and developing a data application that authenticates users with Microsoft Entra ID and then uses S3 Access Grants to access data on those users' behalf. Part 1 of this series gave an […]

This is Part 1 of a two-part blog series: Configuring the application. Here is Part 2: Developing the application. When we at AWS talk to our customers about their data lakes, they usually describe a desired access pattern in which users and groups from a corporate directory are granted access to datasets in Amazon Simple […]

Amazon Simple Storage Service (Amazon S3) is the most popular object storage platform for modern data lakes. Organizations today evolved to adopt a lake house architecture that combines the scalability and cost effectiveness of data lakes with the performance and ease-of-use of data warehouses. Likewise, Amazon S3 plays an increasingly important role as the foundational […]

Data is at the center of every machine learning pipeline. Whether pre-training foundation models (FMs), fine-tuning FMs with business-specific data, or serving inference queries, every step of the machine learning lifecycle needs low-cost, high-performance data storage to keep compute resources busy and performing useful work. Customers use Amazon Simple Storage Service (Amazon S3) to store training data […]

DEVOPS WEEKLY ISSUE #674 - 26th November 2023

- devopsweeklyarchive.com - November 26, 2023

Several FinOps related posts this week, along with a case study of moving build systems at scale, a review of the recent KubeCon event in Chicago and new tools for application and CI/CD configuration.

Today, we are happy to announce that AWS CloudTrail Lake data is now available for zero-ETL analysis in Amazon Athena. AWS CloudTrail Lake is a managed data lake for capturing, storing, accessing, and analyzing user and API activity on AWS for audit, security, and compliance purposes. CloudTrail Lake allows you to easily aggregate activity logs […]

AWS Config is a service that tracks configuration changes of AWS resources in your AWS account or across your AWS Organizations. AWS Config uses the configuration recorder to detect changes of your resources and track them as configuration items (CIs). Given the increasing complexity of cloud infrastructure, the number of resource configuration changes being made […]

And that's a wrap on the major announcements from re:Invent 2023! Scroll down to see a recap of all the exciting news from the event. For more ways to experience re:Invent, and to stay in touch with all the news that never stops at AWS, be sure to follow these great resources: AWS News Blog: […]

AWS CloudFormation, an Infrastructure as Code (IaC) service that lets you model, provision, and manage AWS and third-party resources, now supports using Git sync to automatically trigger a deployment whenever a tracked Git repository is updated. This enables developers to significantly speed up the development cycle for CloudFormation by integrating into their Git workflow and […]

SRE Weekly Issue #400 – SRE WEEKLY

- sreweekly.com - November 26, 2023

The network is not reliable. What are the implications and what can we do about it?

In this blog, we explore Automatic Target Weights (ATW), which can reduce the number of errors users experience when using web applications. ATW provides the ability to detect and mitigate gray failures for targets behind Application Load Balancers (ALB). A gray failure occurs when an ALB target passes active load balancer health checks, making it look healthy, but still returns errors. This scenario could be caused by many things, including application bugs, a dependency failure, intermittent network packet loss, a cold cache on a newly launched target, CPU overload, and more.

In this blog post, we highlight how Elastic Network Adapter (ENA) Express can improve workload performance in conventional network applications, such as databases, file systems, and media encoding. We begin by demonstrating how ENA Express can significantly improve tail latency when used with in-memory databases. From there, we will explore the advantages it offers to […]

Does Kubernetes Really Perform Better on Bare Metal vs. VMs?

- thenewstack.io operations - November 24, 2023

A detailed comparison of CPU, RAM, storage and network performance between Kubernetes clusters on virtual machines and bare metal.

AWS Trusted Advisor continuously evaluates your AWS environment using best practice checks in the categories of cost optimization, performance, resilience, security, service limits, and operational excellence and recommends actions to remediate any deviations from AWS best practices in the AWS Well-Architected Framework. AWS Well-Architected Framework is a collection of architectural best practices and guidance to […]

This post was coauthored by Mike Ravkine, Sr. Director at Cognitive Systems Introduction Cognitive Systems Corp., which provides pioneering Wi-Fi sensing technology, WiFi Motion, has redefined how people interact with wireless networks by using existing Wi-Fi signals to transform connected devices into motion sensors. Cognitive System's Wi-Fi Sensing technology constitutes a comprehensive software stack that […]

Introduction Many enterprises rely on AWS to host the entirety of their infrastructure due to the inherent advantages of cloud computing. However, some enterprises operate mission critical workloads from remote areas at an increased risk to lose external network connectivity. For instance, a research facility located in a remote desert, an oil rig in international […]

A DevOps Turkey-Day Poem - ShavingTheYak

- shavingtheyak.com - November 22, 2023

I hope you have as much fun reading this as I had writing it

AppMap Releases Runtime Code Review as a GitHub Action

- thenewstack.io microservices - November 21, 2023

It evaluates every code change in the pull request to help developers understand the impact on the code's runtime behavior.

Introduction The rise in popularity of Generative AI (GenAI) reflects a broader shift toward intelligent automation in the business landscape, which enables enterprises to innovate at an unprecedented scale, while adhering to dynamic market demands. While the promise of GenAI is exciting, the initial steps toward its adoption can be overwhelming. This post aims to […]

Your DevOps and Developer Productivity guide to re:Invent 2023 ICYMI – AWS re:Invent is less than a week away! We can't wait to join thousands of builders in person and virtually for another exciting event. Still need to save your spot? You can register here. With so much planned for the DevOps and Developer Productivity […]

TikTok to Open Source 'Cloud-Neutralizing' Edge Accelerator

- thenewstack.io edge-computing - November 20, 2023

The Global Service Accelerator could help commoditize cloud services for API-driven apps, TikTok engineers surmise at KubeCon.

The command line is used by over thirty million engineers to write, build, run, debug, and deploy software. However, despite how critical it is to the software development process, the command line is notoriously hard to use. Its output is terse, its interface is from the 1970s, and it offers no hints about the 'right […]

Introduction In this post, we explain how Amazon EC2 interprets idle timeouts and how to customize this configuration to optimize for your traffic patterns and workloads. We also dive into some common use-cases. Earlier this year, Amazon Elastic Compute Cloud (Amazon EC2) announced the Conntrack Utilization Metric for EC2 instances that offers you the ability […]

What Is Observability? Comprehensive Beginners Guide

- devopscube.com - November 20, 2023

If you want to understand what is Observability, its importance, its benefits, and its components, this guide is

DEVOPS WEEKLY ISSUE #673 - 19th November 2023

- devopsweeklyarchive.com - November 19, 2023

Technical posts on new DNS record types and authorization approaches, along with posts on the history of Devops through to how AI is changing software development.

SRE Weekly Issue #399 – SRE WEEKLY

- sreweekly.com - November 19, 2023

This research paper summary goes into Mode Error and the dangers of adding more features to a system in the form of modes, especially if the system can change modes on its own.

Introduction With Amazon Elastic Kubernetes Service (Amazon EKS) users can modify the configuration of the cluster before and after cluster creation without having to create a new cluster. Before provisioning the cluster, users can define specific parameters like the Kubernetes version, VPC and subnets, and logging preferences. Post-creation, they can dynamically adjust various settings, such […]

GKE architectures for hosting SaaS applications

- GCP containers blogs - November 17, 2023

Learn about the pros and cons of various architecture choices when building a software as a service (SaaS) platform on Google Kubernetes Engine (GKE).

Google Cloud CISO Phil Venables explains in his latest newsletter why sector-specific information centers are valuable partners for Google Cloud and the industry.

There are a number of settings you need to change and consider when shooting for zero downtime with ingress-nginx

Today, AWS is announcing support for read-only management events in Amazon EventBridge. This feature enables customers to build rich event-driven responses from any action taken on AWS infrastructure to detect security vulnerabilities or identify suspicious activity in near real-time. You can now gain insight into all activity across all your AWS accounts and respond to those events as is appropriate.

This post by Art Baudo – Principal Product Marketing Manager – AWS EC2, and Pranaya Anshu – Product Marketing Manager – AWS EC2 We are just a few weeks away from AWS re:Invent 2023, AWS's biggest cloud computing event of the year. This event will be a great opportunity for you to meet other cloud […]

Amazon CodeCatalyst is an integrated service for software development teams adopting continuous integration and deployment practices into their software development process. CodeCatalyst puts the tools you need all in one place. You can plan work, collaborate on code, and build, test, and deploy applications with continuous integration/continuous delivery (CI/CD) tools. You can also integrate AWS […]

Boost your vm with virtual network interfaces

- GCP compute blogs - November 17, 2023

Optimize your VM and network infrastructure scaling using new custom queue features and virtual network cards.

At Google Cloud, we built Regional Persistent Disk with mission- critical workloads in mind. Here's how to use them.

WordPress Security - Digi Hunch

- digihunch.com - November 17, 2023

With my configuration tampered with malicious redirect, here is how I fixed and hardened it with CloudFlare to improve WordPress security.

In the evolving cloud-native landscape, enterprises utilizing Amazon Elastic Kubernetes Service (Amazon EKS) often encounter challenges that hinder their pursuit of operational efficiency and cost-effectiveness. Notable among these challenges are the costs associated with Cross Availability Zone (AZ) traffic, with difficulties associated with achieving seamless scalability, hurdles in provisioning right-sized instances for nodes, and intricacies […]

In today's cloud-native landscape, efficient management of event-driven workloads is essential for real-time data processing. Traditional autoscaling often falls short amidst unpredictable event volumes, leading to inefficiencies and increased costs. Amazon Elastic Kubernetes Service (EKS), which is a managed container orchestration platform and is well-suited for deploying container-based applications. By integrating Kubernetes Event-Driven Autoscaling (KEDA) […]

Google Cloud is expanding Assured Workloads with two Japan regions, and introduces a new tool to help analyze migrations for compliance.

Alleged Extortioner of Psychotherapy Patients Faces Trial

- krebsonsecurity.com - November 16, 2023

Prosecutors in Finland this week commenced their criminal trial against Julius Kivimäki, a 26-year-old Finnish man charged with extorting a once popular and now-bankrupt online psychotherapy practice and thousands of its patients. In a 2,200-page report, Finnish authorities laid out…

The AWS Integrated Application Test Kit is a software library that provides conveniences to help you write automated tests for your cloud applications. This blog post shows some of the features of the initial Python version of the IATK.

Advanced logging controls for Lambda give you greater control over logging. Use advanced logging controls to control your Lambda function's log level and format, allowing you to search, query, and filter logs to troubleshoot issues more effectively.

This post is written by Josh Levinson, AWS Principal Product Manager and Julien Ridoux, AWS Principal Software Engineer Today, we announced that we improved the Amazon Time Sync Service to microsecond-level clock accuracy on supported Amazon EC2 instances. This new capability adds a local reference clock to your EC2 instance and is designed to deliver […]

This post is written by Subham Rakshit, Senior Specialist Solutions Architect, and Ismail Makhlouf, Senior Specialist Solutions Architect. Many organizations use a multi-account strategy for stream processing applications. This involves decomposing the overall architecture into a single producer account and many consumer accounts. Within AWS, in the producer account, you can use Amazon Managed Streaming for […]

Network configuration, diagnostics and general Linux troubleshooting are essential parts of System administration. Even for a developer who

New pipeline automation capabilities in Cloud Deploy enable continuous deployment as well as continuous delivery.

Developers use AWS Step Functions, a visual workflow service to build distributed applications, automate IT and business processes, and orchestrate AWS services with minimal code. Step Functions redrive for Standard Workflows allows you to redrive a failed workflow execution from its point of failure, rather than having to restart the entire workflow. This blog post […]

This post is written by Ahmed Nada, Principal Solutions Architect, Flexible Compute and Kevin OConnor, Principal Product Manager, Amazon EC2 Auto Scaling. Amazon Web Services (AWS) customers around the world trust Amazon EC2 Auto Scaling to provision, scale, and manage Amazon Elastic Compute Cloud (Amazon EC2) capacity for their workloads. Customers have come to rely […]

Managing AWS Lambda runtime upgrades | Amazon Web Services

- AWS compute blogs - November 15, 2023

This post is written by Julian Wood, Principal Developer Advocate, and Dan Fox, Principal Specialist Serverless Solutions Architect. AWS Lambda supports multiple programming languages through the use of runtimes. A Lambda runtime provides a language-specific execution environment, which provides the OS, language support, and additional settings, such as environment variables and certificates that you can access from […]

This post is written by Pascal Vogel, Solutions Architect, and Andrea Amorosi, Senior Solutions Architect. You can now develop AWS Lambda functions using the Node.js 20 runtime. This Node.js version is in active LTS status and ready for general use. To use this new version, specify a runtime parameter value of nodejs20.x when creating or […]

T-EACs show promise for helping decarbonize the grid

- GCP infra blogs - November 15, 2023

Time-based energy attribute certificates, or T-EACs, show promise for helping decarbonize electricity grids and accelerating a carbon-free future.

A new CPU vulnerability, 'Reptar,' found by Google researchers, has been patched by Google and Intel. Here's what you need to know.

Microsoft Patch Tuesday, November 2023 Edition

- krebsonsecurity.com - November 14, 2023

Microsoft today released updates to fix more than five dozen security holes in its Windows operating systems and related software, including three "zero day" vulnerabilities that Microsoft warns are already being exploited in active attacks.

This blog post describes how to implement cross-account sharing for Amazon Route 53 Application Recovery Controller (Route 53 ARC), by using AWS Resource Access Manager (AWS RAM). The post walks through setting up a resource share, highlights the benefits of cross-account sharing, and reviews the factors to consider when you set up resource sharing in […]

To bring the power of AI to more organizations around the world, Google Cloud is expanding its generative AI data residency guarantees for data stored at-rest.

Choosing a network load balancer in Google Cloud

- GCP networking blogs - November 14, 2023

Learn the differences between Google Cloud's Application Load Balancers and Network Load Balancers, and when to use them.

Improved networking route tables in Google Cloud console

- GCP networking blogs - November 14, 2023

With the improved route tables in the Google Cloud console, you can improve the performance, security, and scalability of your network.

Despite often not having access to other options, a new survey reveals that employees want more software choices, and they want it to be more secure.

We've added two secure enterprise browsing capabilities in Google Chrome to help implement strong, low-overhead data controls in tools already in end-users hands.

Top 5 Marketing Tech SaaS Security Challenges

- thehackernews.com - November 13, 2023

Don't leave your marketing data exposed. Discover the top challenges in securing SaaS applications used by marketing teams.

DEVOPS WEEKLY ISSUE #672 - 12th November 2023

- devopsweeklyarchive.com - November 12, 2023

Several posts on the impact of AI on operations, from incident response to infrastructure as code. Lots to look forward to in that space I'd wager. Plus posts on monitoring, the DORA state of devops report and more.

SRE Weekly Issue #398 – SRE WEEKLY

- sreweekly.com - November 12, 2023

A cardiac surgeon draws lessons from the Tenerife commercial airline disaster and applies them to communication in the operating room.

How I learned to stop worrying about AI and started to use it to help speed up my tech workday instead!

It's Still Easy for Anyone to Become You at Experian

- krebsonsecurity.com - November 11, 2023

In the summer of 2022, KrebsOnSecurity documented the plight of several readers who had their accounts at big-three consumer credit reporting bureau Experian hijacked after identity thieves simply re-registered the accounts using a different email address. Sixteen months later, Experian…

When trying to connect to the AWS EKS cluster you might face exec plugin: invalid apiVersion 'client.authentication.k8s.io/v1alpha1' error.

Autoclass now available for existing Cloud Storage buckets

- GCP storage blogs - November 10, 2023

Autoclass automates data placement of objects in Cloud Storage, and is now available for existing Cloud Storage buckets.

As security threats have become more sophisticated and easier to scale, customers increasingly use Amazon CloudFront and AWS WAF together to improve the performance, resiliency, and security of their web applications and APIs. CloudFront is a Content Delivery Network (CDN) that reduces latency by delivering data to viewers anywhere in the world using one of […]

Best Udacity Free Courses (2023 List)

- devopscube.com - November 10, 2023

In this blog, we will look at the list of Udacity free courses that you can use to

Docker at the Edge: How Machine Learning Transformed Fowl Task

- thenewstack.io edge-computing - November 09, 2023

A pilot study shows how machine learning can be applied at the edge using Docker and a microservices architecture to process video data.

Google Cloud supports DAOS Foundation

- GCP storage blogs - November 09, 2023

Google Cloud is a founding member of the DAOS Foundation to accelerate investment the open-source DAOS storage stack for HPC and AI/ML workloads.

Kubernetes Graceful Pod Shutdown and You

- shavingtheyak.com - November 09, 2023

DALL-E 3 Here's the scenario: Lets say we have a deployment in our kubernetes cluster for pods that do some sort of important processing work. They might be doing something like pulling messages from a queue and then processing uploaded files from your customers. Now if the processing task is…

AWS CodeBuild recently announced that it supports running projects on AWS Lambda. AWS CodeBuild is a fully managed continuous integration (CI) service that allows you to build and test your code without having to manage build servers. This new compute mode enables you to execute your CI process on the same AWS Lambda base images […]

Build Resilient Microservices with the Kubernetes Gateway API

- thenewstack.io microservices - November 08, 2023

Why the Kubernetes Gateway API is a potent solution for building resilient microservices within a Kubernetes environment.

Learn more about how the Azure ND H100 v5-series offers exceptional throughput and minimal latency for both training and inferencing tasks in the cloud.

Accurate Quantized Training (AQT) for TPU v5e

- GCP compute blogs - November 08, 2023

The new open-source Accurate Quantization Training (AQT) library provides the software support needed for easy tensor operation quantization in JAX accelerating training and inference.

Cloud TPU v5e is generally available

- GCP compute blogs - November 08, 2023

Cloud TPU v5e, now GA, demonstrated a 2.3X improvement in price-performance compared to the previous-generation TPU v4 for training LLMs.

AssemblyAI on Cloud TPU v5e price performance

- GCP compute blogs - November 08, 2023

AssemblyAI found that Cloud TPU v5e offers up to 4x greater price-performance than alternative enterprise-grade accelerators for machine learning (ML) model inference.

We used Multislice Training to run the world's largest LLM distributed training job on a compute cluster of 50,944 Cloud TPU v5e chips.

The 2023 State of Kubernetes in Production

- thenewstack.io edge-computing - November 07, 2023

Enterprises running Kubernetes in production are still struggling to find the balance of flexibility and complexity. Read Spectro Cloud's 2023 report.

Effective Traffic Management with Kubernetes Gateway API Policies

- thenewstack.io networking - November 07, 2023

The Kubernetes Gateway API simplifies configuration by abstracting away complexities and providing a user-friendly, declarative approach to define routing and traffic policies.

Implementing a secure network in Google Cloud means designing it to use tools like IAM, VPC, and a variety network security services.

GKE Enterprise is now GA

- GCP containers blogs - November 06, 2023

GKE Enterprise lets companies easily and securely increase team velocity, and reduce total cost of ownership of their business-critical workloads.

Who's Behind the SWAT USA Reshipping Service?

- krebsonsecurity.com - November 06, 2023

Last week, KrebsOnSecurity broke the news that one of the largest cybercrime services for laundering stolen merchandise was hacked recently, exposing its internal operations, finances and organizational structure. In today's Part II, we'll examine clues about the real-life identity left…

Synthetic monitoring in Cloud Monitoring is now GA

- GCP devops/sre blogs - November 06, 2023

Synthetic monitoring in Cloud Monitoring tests the availability, consistency, and performance of a web application from a real user's perspective.

DEVOPS WEEKLY ISSUE #671 - 5th November 2023

- devopsweeklyarchive.com - November 05, 2023

Several sets of posts this week on Prometheus and its ecosystem, coming out of the recent PromCon event. Plus discussion of being on-call, a counter-argument for those proposing building a platform and a scattering for other topics, from SBOMs to certificates.

AWS EC2 Instance Types Surprising Benchmark Results

- shavingtheyak.com - November 04, 2023

AWS is underselling the performance of their newer instance types by a huge margin - find out by how much!

Kubernetes CPU Requests In The Real World...

- shavingtheyak.com - November 04, 2023

How a better understanding of resource requests in kubernetes helped us dramatically improve the performance of...

Enhancing Kubernetes Networking with the Gateway API

- thenewstack.io service-mesh - November 03, 2023

As Kubernetes networking continues to evolve, the Gateway API remains at the forefront, providing a standardized and powerful solution for managing traffic, security, and routing within your clusters.

Priority-based scheduling in gke

- GCP containers blogs - November 03, 2023

Learn how to set up four different node pool types with various compute instances to utilize priority based scheduling in gke.

Dell GA's APEX Cloud Platform for Red Hat OpenShift

- thenewstack.io containers - November 02, 2023

Dell has released its Apex Cloud Platform for Red Hat OpenShift, which is aimed at simplifying the deployment of microservices containers.

Russian Reshipping Service 'SWAT USA Drop' Exposed

- krebsonsecurity.com - November 02, 2023

One of the largest cybercrime services for laundering stolen merchandise was hacked recently, exposing its internal operations, finances and organizational structure. Here's a closer look at the Russia-based SWAT USA Drop Service, which currently employs more than 1,200 people across…

SaaS Security is Now Accessible and Affordable to All

- thehackernews.com - November 02, 2023

Worried about shadow IT and SaaS security? Wing Security's "Essential SSPM" offers a solution. Discover, Assess, Control.

Powerful new rules in Security Command Center Premium can help customers quickly identify and remediate threats to backup and recovery infrastructure. Here's how.

Artifact Registry remote and virtual repositories are GA

- GCP devops/sre blogs - November 01, 2023

New Artifact Registry remote and virtual repositories can help customers better manage their application and OS artifacts.

Linkerd Enterprise Creators: Keep the Sidecar Mesh

- thenewstack.io service-mesh - October 31, 2023

Bouyant has created an enterprise version of Linkerd, which include security tools for implementing zero trust security within Kubernetes clusters as well as for cost optimization and more.

Defender for Cloud is a Microsoft first-party solution that uses the scale of the cloud to identify attacks targeting applications running in Azure App Service. Learn more.

Multi-cluster Gateway controller for GKE is now GA

- GCP networking blogs - October 31, 2023

The Multi-cluster Gateway controller for GKE, now GA, uses the Kubernetes Gateway API to help manage ingress traffic to fleets of GKE clusters.

Sharing the latest advancements in improving VM availability monitoring for customers with Project Flash. Learn more.

DEVOPS WEEKLY ISSUE #670 - 29th October 2023

- devopsweeklyarchive.com - October 29, 2023

Incident management, operating ElasticSearch clusters and Argo, tools for API linting and a scattering of other topics this week for your enjoyment.

So I was working on a project that required me to create a custom webhook into a pre-existing service running in our EKS cluster. I needed to use the ingress nginx controller due to needing to create a custom server block for the webhook, and due to the fact that…

AI and SEO Predictions - The Future of Organic Search?

- shavingtheyak.com - October 29, 2023

My thoughts on where AI trends will take us with regards to web content, SEO, and more.

The Systems Manager Hodgepodge - Digi Hunch

- digihunch.com - October 29, 2023

AWS Systems Manager is a hodgepodge and this post explains the core capabilities and the ones built on top of the core capabilities.

Lynis: Run a Security Audit on Linux for Free

- thenewstack.io containers - October 28, 2023

This article walks through the steps of installing Lynis security auditing software on both Ubuntu Server and Rocky Linux 9.

Recent Terraform Cloud Pricing Changes - Sticker Shock?

- shavingtheyak.com - October 28, 2023

Terraform Cloud's recent pricing model changes to RUM pricing are causing sticker shock for some organizations!

Customers using Amazon CodeWhisperer often want to enable their developers to sign in using existing identity providers (IdP), such as Okta. CodeWhisperer provides support for authentication either through AWS Builder Id or AWS IAM Identity Center. AWS Builder ID is a personal profile for builders. It is designed for individual developers, particularly when working on […]

How resilience contributes to software delivery success

- GCP devops/sre blogs - October 27, 2023

According to DORA and internal Google research, resilience is the first of five dimensions that drive DevOps and software delivery success.

Amazon CodeWhisperer is an AI coding companion that helps improve developer productivity by offering contextualized code snippets, or suggestions, generated based on coding context and natural language prompts to help developers build software quickly, responsibly, and securely. For enterprise customers, CodeWhisperer offers a Professional tier that adds administrative features, like SSO and IAM Identity Center […]

Learn how to deploy the cross-region internal application load balancer. This offers feature rich capabilities including, geo-routing, managed certificate support, multi-regional traffic distribution and failover. Build and explore.

Why Capistrano Got Usurped by Docker and Then Kubernetes

- thenewstack.io containers - October 25, 2023

David Eastman hosts a tech edition of Antiques Roadshow, by looking back at the pre-containers (even pre-Chef!) software tool Capistrano.

Return To Office Mandates Can Take A Hike

- shavingtheyak.com - October 25, 2023

DALL-E 3 I've been working from home since long before the pandemic. It's been almost 10 years of partial 'wfh' and 6 years of full time 'wfh' for me, and frankly I don't see it ever changing on my end, without threats of physical violence or bags of money. Some…

The Honomoana and Tabua subsea cables will connect Fiji and French Polynesia to the United States and Australia.

The Moby Project Post-Kubernetes: 3 New Releases in 2023

- thenewstack.io containers - October 24, 2023

The Moby Project is an open source project that spun off from Docker. Three major releases are planned for this year.

NCR Voyix adopts Cloud Logging and Log Analytics

- GCP devops/sre blogs - October 24, 2023

When it moved its banking apps to Google Cloud, NCR Voyix's SRE team benefitted from replacing third-party tools with Cloud Logging and Log Analytics.

Introduction The Rust programming language was created by Mozilla Research in 2010 to be "a programming language empowering everyone to build reliable and efficient(fast) software"[1]. If you are a beginner level SDE or DevOps engineer or decision maker in your organization looking to adopt Rust for your specific use, you will find this blog helpful […]

DEVOPS WEEKLY ISSUE #669 - 22nd October 2023

- devopsweeklyarchive.com - October 22, 2023

Posts on chaos engineering for security, DORA metrics for incident management and vulnerability management for containers this week, along with tools from API Gateways to AI-based developer assistants.

AWS CodeDeploy is a fully managed deployment service that automates software deployments to various compute services, such as Amazon Elastic Compute Cloud (Amazon EC2), Amazon Elastic Container Service (ECS), AWS Lambda, and on-premises servers. AWS CodeDeploy recently announced support for deploying to applications that use multiple AWS Elastic Load Balancers (ELB). CodeDeploy now supports multiple […]

At this year's OCP Global Summit, Microsoft will share our latest contributions to supercomputing architecture and hardware. Learn more.

Today, Amazon Web Services (AWS) announced the launch of the AWS Well-Architected Framework DevOps Guidance. The AWS DevOps Guidance introduces the AWS DevOps Sagas—a collection of modern capabilities that together form a comprehensive approach to designing, developing, securing, and efficiently operating software at cloud scale. Taking the learnings from Amazon's own transformation journey and our […]

Cilium taps eBPF for hooks for extending runtime observability, security, and networking capabilities across various deployment environments.

Is a Career as a DevSecOps Engineer in Your Future?

- thenewstack.io ci-cd - October 12, 2023

The growth in DevSecOps usage has increased job opportunities. Could one be for you?

Introducing GCVE Protected

- GCP storage blogs - October 12, 2023

The new GCVE Protected offers bundled pricing for both Google Cloud VMware Engine and Google Cloud's Backup & DR Service.

We are excited to announce the preview of Microsoft Playwright Testing, an end-to-end scalable service for running Playwright tests. Learn more

Google is expanding our use of demand response technology to temporarily reduce power consumption at our data centers to help local grids as needed.

Accidents manage you

- surfingcomplexity.blog - September 30, 2023

Here's a a line I liked from episode 461 of Todd Conklin's PreAccident Investigation Podcast. At around the 8:25 mark, Conklin says: ….accidents, in fact, aren't preventable…

For want of a dollar

- surfingcomplexity.blog - September 30, 2023

Back in August, The New York Times ran a profile of Morris Chang, the founder of TSMC. It's hard to overstate the role that this Taiwan-based semiconductor company plays in the industry. If y…

Pick the right storage option on Google Cloud

- GCP storage blogs - September 28, 2023

A new guide helps you research and select the Google Cloud storage services that best match your specific workload needs.

Introducing the Nuvem subsea cable

- GCP infra blogs - September 25, 2023

The Nuvem submarine cable will connect Portugal, Bermuda and South Carolina, and will be Bermuda's first transatlantic fiber optic route.

In addition to Control Tower, Landing Zone Accelerator (LZA) is another option to orchestrate a Landing Zone on AWS. This post discusses LZA.

Take full advantage of Open-source, analytics in the cloud and vault into the age of AI with HDInsight on AKS. Learn more.

Expanding cloud infrastructure around the world

- GCP infra blogs - September 19, 2023

We issued an update on the status of Google Cloud regions in Sweden, Saudi Arabia, New Zealand, Norway, Mexico, and Greece.

Cloud Bigtable architectures with change streams

- GCP infra blogs - September 15, 2023

Learn how to use change streams for Bigtable and how to incorporate change data capture into your system design.

Delivering Multi-Core Fiber Technology in Subsea Cables

- GCP infra blogs - September 12, 2023

Google and NEC are collaborating to adopt multi-core fiber (MCF) technology for the first time in the submarine cable industry.

Learn more on how Azure Space Data creates ubiquitous connectivity, resiliency, and global insights at scale

The surprising power of a technical document written by experts

- surfingcomplexity.blog - September 10, 2023

Good technical writing can have enormous influence. In my last blog post, I wrote about how technical reports written by management consultants can be used to support implementing a change program …

On productivity metrics and management consultants

- surfingcomplexity.blog - September 03, 2023

The management consulting firm McKinsey & Company recently posted a blog post titled Yes, you can measure software developer productivity. The post prompted a lot of responses, such as Kent Bec…

Upgrade to App Service Environment v3 before the previous versions reach end-of-life in August 2024 and learn of the many technical resources and benefits that can help you plan the migration right away.

Operating effectively in high surprise mode

- surfingcomplexity.blog - August 27, 2023

When you deploy a service into production, you need to configure it with enough resources (e.g., CPU, memory) so that it can handle the volume of requests you expect it to receive. You'll wan…

Normal incidents

- surfingcomplexity.blog - August 20, 2023

In 1984, the late sociologist Charles Perrow published the book: Normal Accidents: Living with High-Risk Technologies. In this book, he proposed a theory that accidents were unavoidable in systems …

Oddly influenced podcast

- surfingcomplexity.blog - August 20, 2023

Brian Marick recently interviewed me about resilience engineering on his Oddly Influenced podcast. I'm pretty happy with how it turned out.

Why LFI is a tough sell

- surfingcomplexity.blog - August 20, 2023

There are two approaches to doing post-incident analysis: the (traditional) root cause analysis (RCA) perspective the (more recent) learning from incidents (LFI) perspective In the RCA perspective,…

We can orchestrate landing zone in AWS using different tools. This post discusses control tower as an option to orchestrate landing zone.

Kubernetes 1.28 Accommodates the Service Mesh, Sudden Outages

- thenewstack.io service-mesh - August 18, 2023

This "Planternetes" release can keep service mesh containers running when the pod goes offline. Also in the box: Better support for DNS and more allowable time between necessary upgrades.

I was shocked to find this article on ReadWrite: The Truth About DevOps: IT Isn't Dead; It's not even Dying. Wait a second, do people really think this?

As DevOps adoption picks up pace, the signs are everywhere. Infrastructure as code once a backwater concept, and a hoped-for ideal, has become an essential to

I was having a conversation with a colleague recently. We were discussing DevOps, and the topic of Ansible came up as I was advocating it as a great tool to

You want to make your wordpress site bulletproof? No server outage worries? Want to make it faster & more reliable. And also host on cheaper components?

Does AWS Have a Dirty Little Secret? - iheavy

- iheavy.com - August 16, 2023

I was recently talking with a colleague of mine about where AWS is today. Obviously, these companies are migrating to EC2 & the cloud rapidly. The growth

First things first. This is not meant to be a beef against developers. But let's not ignore the elephant in the living room which is the divide between

Larry Summers, Director of the White House's National Economic Council coined the phrase "preserving optionality" back when he was deputy secretary of the

In the dynamic realm of software development and operations, where collaboration and alignment are paramount, there exists a four-letter word that has the

Performant and Programmable Telco Networking with eBPF

- thenewstack.io networking - August 11, 2023

To go cloud native, telcos nee a way to decouple and abstract their workloads from the hardware details. eBPF can provide improved performance, simplified operations, and complete visibility.

We are excited to announce the general availability of Azure Blob Storage Cold Tier in all public and Azure Government regions. Learn more.

Create a Samba Share and Use from in a Docker Container

- thenewstack.io networking - July 29, 2023

How to install Samba and configure it such that it can be used for sharing files to your network from a Linux server.

Options to authenticate kubectl to OIDC kube-apiserver using vanilla Kubernetes, Azure AKS, ROSA and EKS using OIDC

Achieve incredible innovations with the breadth and depth of cloud capabilities by Microsoft Azure. Learn more.

OAuth 2.0 and OIDC 2 of 2 - Digi Hunch

- digihunch.com - July 13, 2023

This post covers OIDC's classic flow - the authorization code flow and other flows for different architectures, as well as OIDC proxy.

Azure Managed Lustre delivers the time-tested Lustre file system as a first party managed service on Azure. Long time users of Lustre on-premises can now leverage the benefits of a complete HPC solution, including compute and high performance storage, delivered on Azure.

CIOs, Heed On-Premises App and Infrastructure Performance

- thenewstack.io networking - July 05, 2023

Consumer expectations for flawless digital experiences continue to rise, so companies must optimize their on-premises customer-facing technology.

AKS—network observability. This feature equips AKS users with powerful capabilities to gain enhanced visibility into their container network traffic.

Active knowledge

- surfingcomplexity.blog - June 26, 2023

Existential Comics is an extremely nerdy webcomic about philosophers, written and drawn by Corey Mohler, a software engineer(!). My favorite Existential Comics strip is titled Is a Hotdog a Sandwic…

The Microsoft Cloud Skills Challenge is aimed at helping individuals develop proficiency in the most in-demand skills in the tech industry. Learn more.

We are thrilled to announce the general availability of Azure CNI powered by Cilium.

This innovative solution provides seamless integration of borehole data into petrophysical and geological models, enabling users to view, filter, and deliver data to the OSDU Data Platform with ease. Learn more.

Dev News: React Still King, Vercel AI Tools, Netlify Connect

- thenewstack.io edge-computing - June 17, 2023

Web framework usage declined, but React still rules. Also, Vercel's AI plans, Netlify's unified data layer and Google's script editor tool.

With the general availability of Azure HBv4 and HX series virtual machines today, Microsoft has integrated the latest 4th Gen AMD EPYC processors with AMD 3D V-Cache technology.

Datadog, an Azure Native ISV Service that brings the power of Datadog's observability capabilities to Azure allows you to monitor and diagnose issues with your Azure resources by automatically sending logs and metrics to your Datadog organization.

Utilize the power of Virtual WAN routing to simplify connectivity with secure hubs in Azure Virtual WAN.

Generate and stream high-quality graphics for a high-performance, interactive gaming experience hosted in Azure, with NGads V620-series virtual machines.

Create AMIs with AWS CodePipeline | Amazon Web Services

- AWS automation blogs - June 01, 2023

One way to alleviate the pain of drift in your Amazon Web Services (AWS) workloads is to use a GitOps workflow to automate Amazon Machine Image (AMI) builds with AWS CodePipeline. In this post, we show you how to deploy a continuous integration and continuous delivery (CI/CD) pipeline, managed by CodePipeline, to build AMIs.

The partnership between Microsoft and SAP has enabled customers to accelerate their business transformation, improve resilience, minimize downtime, and prepare for more rapid growth.

Today, we are excited to announce the preview of Azure Container Storage, the industry's first platform-managed container native storage service in the public cloud, providing end to end storage management and orchestration for stateful applications to run efficiently at scale on Azure.

Network security policies are a critical component of modern IT environments, especially with the increasing adoption of cloud workloads. As workloads

We are rebranding Developer Velocity Lab to Developer Experience Lab to improve developer experiences. Learn more.

What's new with Azure Files | Microsoft Azure Blog

- Azure storage blogs - May 10, 2023

In this blog we will talk about how SAP ECS uses Azure Files NFS shares as part of their default deployment and we'll also announce some of the big NFS feature we've been working over the past year including: new 99.99 percent SLA, snapshot support, and nconnect.

I had the opportunity to participate in this year's Open Confidential Computing Conference (OC3), hosted by our software partner, Edgeless Systems. The panel featured some of the industry's most respected technology leaders. Learn more.

Today we are excited to announce the preview of Palo Alto Networks Cloud Next Generation Firewall (NGFW) for Azure, available as a software as a service (SaaS) offering in Azure Virtual WAN.

This post presents recommendations and best practices when migrating your existing VPCs from Amazon Virtual Private Cloud (VPC) Peering to AWS Transit Gateway. It includes a migration walkthrough and considerations that you can address to improve your odds of a seamless migration. This post also details common networking testing and bench-marking tools such as iPerf […]

In this blog, you will learn about each global traffic distribution solution Azure offers, and which solution is the best one for your internet-facing cloud architecture. Currently, Azure offers different options for distributing global traffic. Learn more.

We see many businesses make significant shifts towards cloud computing in the last decade. The Microsoft Azure public cloud offers many benefits to companies, such as increased flexibility, scalability, and availability of resources.

Isovalent Cilium Enterprise on Azure is a powerful tool for securing and managing Kubernetes' workloads on Azure. Isovalent Cilium Enterprise's range of advanced features and easy-to-deploy ability makes it an ideal solution for organizations of all sizes looking to secure their cloud-native applications. Learn more.

For this episode of Inside Azure for IT, we're bringing you three discussions about cloud strategies that can help you not only successfully navigate some of today's uncertainties, but also build agility and increase efficiency while you move ahead. Learn more.

Linkerd Service Mesh Update Addresses More Demanding User Base

- thenewstack.io service-mesh - April 11, 2023

Open source enthusiasts who once scrutinized the Linkerd service mesh are slowly being replaced by corporate clients with more specific needs, Buoyant CEO explains.

What Do You Know about Your Linux System?

- thenewstack.io operations - April 03, 2023

A look at the process to get insight into supported system calls and features and to assess how secure a system is and its runtime activity.

Microsoft Azure Firewall now offers new logging and metric enhancements designed to increase visibility and provide more insights into traffic.

Learn how to manage credentials with many accounts, automate IAM credential reports, and consolidate the results.

Organizations today use many ways to drive traffic to their websites and applications. This is important for new feature launches, marketing campaigns, advertising, and so on. One common approach uses HTTP/S redirects, where you send a user from one domain, or Uniform Resource Locator (URL), to another. Redirects are incredibly useful tools when moving websites, […]

AWS Cloud WAN helps you build a unified network that connects your cloud and on-premises environments. To help secure these networks, organizations use next-generation firewalls (NGFW) and intrusion prevention systems (IPS) as part of a defense in depth strategy. In this post, we describe architectural patterns for centrally managing and inspecting outbound network traffic from […]

Many types of organizations encounter DDOS attacks daily. DDoS, or Distributed Denial of Service, is an attack pattern that generates fake traffic to overwhelm organisation's properties (websites, APIs, applications, etc.) and make it unavailable to legitimate users. They majority of these attacks involve a huge burst of fake traffic that exhausts the application's resources (Memory […]

As an AWS customer, you might often want to understand the performance of the AWS Global Network. Visibility into how the AWS Global Network is performing at any given time can help you plan expansions into new AWS Regions and Availability Zones (AZs), as well as streamline troubleshooting of performance-related incidents. Today, I'm happy to […]

When we wrote the previous post (Visitor Prioritization on e-Commerce Websites with CloudFront and Lambda@Edge) five years ago, Visitor Prioritization was a relatively new concept. Since then, we saw a huge need for traffic shaping, throttling, and request prioritizing, especially in the gaming and media industries. Of course, e-Commerce sites still require this capability for […]

Discover a solution for automating Amazon EKS cluster prework using a sample AWS CloudFormation template. We combine this template with a Kubernetes cluster created with the Modular and Scalable Amazon EKS Architecture on AWS solution.

Load balancers are a critical component in the architecture of distributed software services. AWS Elastic Load Balancing (ELB) provides highly performant automatic distribution for any scale of incoming traffic across many compute targets (Amazon Elastic Compute Cloud (Amazon EC2), Amazon Elastic Container Service (Amazon ECS), AWS Lambda, etc.), while enabling developers to adopt security best practices […]

Many of our customers take a "defense in depth" approach to secure workloads within their Amazon Virtual Private Clouds (Amazon VPC). Using domain list rules in AWS Network Firewall and Amazon Route 53 Resolver DNS Firewall lets you enforce network security controls at multiple layers based on domain names. Although both DNS Firewall and Network […]

This post provides a solution to enhance the Amazon CloudFront origin security of on-premises web servers by automating the AWS IP prefix update process for some network firewalls. CloudFront is a content delivery network (CDN) service that securely delivers data, videos, applications, and APIs to customers globally with low latency and high transfer speeds—all within […]

In part 1 of this blog-post series, we walked you through steps to configure Amazon OpenSearch Service to receive logs from AWS Network Firewall using Amazon Kinesis Data Firehose. In this part 2, we cover steps to generate test alerts, validating them and configure dashboards in Amazon OpenSearch Service to visualize and analyze log data. […]

Azure VMware Solution is a fully managed service in Azure that customers can use to extend their on-premises VMware workloads more seamlessly to the cloud, while maintaining their existing skills and operational processes. Learn more.

During the last two years navigating changing economic climates and a global pandemic that shifted the way we work, we've learned that teams can continue to collaborate together productively and effectively in remote and hybrid settings. A recent Microsoft study shows that hybrid work works.

High-performance computing and orbital data deliver unprecedented insights into weather patterns, improving planning, forecasting, and decision-making, in an ever-evolving agriculture supply chain.

Learn how to reduce the use of managing secret and access keys and quickly deploy all the resources. Use version control to track all changes and enable better control in a multiaccount infrastructure.

Today we are excited to announce the public preview availability of Microsoft Azure Managed Lustre, a new addition to the Azure HPC + AI storage family of products.

Learn how to integrate Checkov into CodePipeline with fully automated pre-deployment compliance checks of your Terraform scripts, including built-in notifications. Our solution provides an end-to-end, automated CI/CD pipeline that allows you to stay compliant with AWS best-practices with minimal operational overhead.

Today we're pleased to announce the general availability of Azure Red Hat OpenShift on Microsoft Azure Government, combining world-class Azure infrastructure with a leading enterprise Kubernetes platform.

Azure High-Performance Computing provides a platform for energy industry innovation at scale.

We are announcing the general availability of Azure Load Testing, a fully managed load-testing service.

Learn to use CloudFormation custom resources in multistack AWS Cloud Development Kit (AWS CDK) applications to read parameters across AWS Regions.

The Hidden Costs of 'Free' Internal Developer Portals

- thenewstack.io operations - January 12, 2023

Why pay for a dev tool if you can deploy a free alternative? As we'll illustrate here, the free-IDP approach costs way more than you think.

How Not to Waste a Senior Hire

- thenewstack.io operations - December 21, 2022

So you've hired a senior developer. Now they should start doing their magic, right? But it's not so simple, and it can all end up surprisingly disappointing.

CLX is a personalized and self-paced journey that culminates in a certificate of completion—allowing you to maximize learning while minimizing time invested.

Microsoft announces strategic partnership with Isovalent to bring Cilium's eBPF-powered networking data plane and enhanced features for Kubernetes and cloud-native infrastructure.

Create an ephemeral Amazon FSx for Lustre file system that's active on an as-needed basis, allowing you to pay for services only when the system is used. With the file system running only when needed, you can still benefit from a powerful system with fast processing speeds without the high costs associated with a continuously running implementation.

SRE Fundamentals: Differences Between SLI vs. SLO vs. SLA

- thenewstack.io operations - November 17, 2022

These acronyms represent ways to quantify your commitments to system uptime and measure how successfully your site reliability engineering team is meeting them.

Our team has been busy bringing you a reliable, scalable, and secure monitoring service with Azure Monitor.

Have you created permission sets and assigned them to AWS Identity and Access Management (IAM) groups in AWS Organizations? Have you used existing corporate identities with AWS IAM Identity Center (successor to AWS Single Sign-On) to grant Active Directory groups access to AWS accounts and applications? Save time and minimize errors by managing permission sets automatically with a continuous integration and continuous deployment (CI/CD) pipeline built with AWS developer tools.

Are your infrastructure as code (IaC) Terraform deployments on the Amazon Web Services (AWS) Cloud protected against drift? IaC drift, which can leave your data and resources exposed to security risks, is especially difficult to track down and remove in an environment that spans multiple AWS accounts and AWS Regions. You can do it though, and in this post we show you how.

We're excited to announce that Microsoft has joined the Eclipse Foundation Jakarta EE and MicroProfile Working Groups as an Enterprise and Corporate member, respectively. Our goal is to help advance these technologies to deliver better outcomes for our Java customers and the broader community.

Microsoft was founded as a developer tools company, and developers remain at the very center of our mission. Today, we have the most used and beloved developer tools with Visual Studio, .NET, and GitHub. We offer a trusted and comprehensive platform to build amazing apps and solutions that help enable people and organizations across the planet to achieve more.

Welcome to Microsoft Ignite. I'm thrilled to share how Microsoft is empowering you to innovate with cloud-native and open source on Azure. The growth of Kubernetes and cloud-native applications in Azure and the broader technology has been nothing short of humbling and awe-inspiring. Open innovation is at the heart of nearly every innovation in cloud computing. The cloud-native ecosystem empowers people to build applications that make it easy to take advantage of this innovation.

Transmitting data from one organization to another is a technical problem that has been solved in innumerable ways. What is different about this project? The Eclipse Dataspace Connector (EDC) is a European open source project made up of components that enable multicloud, policy-based, federated data sharing based on European data sovereignty principles.

We are excited to announce the general availability of Azure Files support for authentication with on-premises Active Directory Domain Services (AD DS) today.

Continuing our Azure reliability series to be as transparent as possible about key initiatives underway to keep improving availability, today we turn our attention to Azure Active Directory

Questions about the security of and control over customer data, and where it resides, are on the minds of cloud customers today. We're hearing you, and in response, we published a whitepaper that gives clear answers and guidance into the security, data residency, data flows, and compliance aspects of Microsoft Azure.

Ansible 2.6: What's new for Azure | Microsoft Azure Blog

- Azure identity blogs - July 31, 2018

Ansible 2.6 was recently released and I am excited to share with you what's new for Azure in Ansible 2.6. In total, four new Azure modules were added in addition to over 17 enhancements to our existing modules.

Today, we're releasing our next update to Workbench, which we're calling version 1.2.0. You can either deploy a new instance of Workbench through the Azure portal or upgrade your existing deployment to 1.2.0 using our upgrade script.

We are pleased to announce that Azure Active Directory is integrated with Spring Security to secure your Java web applications.

Blockchain is increasingly prevalent as a topic of interest in our conversations with business leaders. A growing number of our customers and partners are experimenting with the technology as a…

Secured and lifecycle-managed device identity should just be another component of the IoT developers standard toolbox. Microsoft in collaboration with secure silicon partners is making this a reality.

Announcing public preview of access token for Azure AD B2C. Acquire an access token and use it to call a web api.