HackDig : Dig high-quality web security articles for hackers

8 Cloud Security Best Practice Fundamentals for Microsoft Azure

In a previous blog, I discussed securing AWS management configurations by combating six common threats with a focus on using both the Center for Internet Security (CIS) Amazon Web Services Foundations benchmark policy along with general security best practices.Now I’d like to do the same thing for Microsoft Azure. I had the privilege of being involved in the
Publish At:2021-01-13 08:44 | Read:194 | Comments:0 | Tags:Cloud Featured Articles IT Security and Data Protection AWS

TeamTNT botnet now steals Docker API and AWS credentials

Researchers from Trend Micro discovered that the TeamTNT botnet is now able to steal Docker API logins along with AWS credentials. Researchers from Trend Micro discovered that the TeamTNT botnet was improved and is now able to steal also Docker credentials. The TeamTNT botnet is a crypto-mining malware operation that has been active since April 2020 an
Publish At:2021-01-10 07:00 | Read:212 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware AWS botnet cryptoc

Security, compliance, and visibility for Amazon EKS-D

Today AWS unveiled the Amazon EKS Distro (EKS-D) and Sysdig is excited to deliver support for the new Kubernetes distribution with our Secure DevOps solutions. Wherever you choose to run EKS-D to run container applications, Sysdig can also be used to detect and respond to runtime threats, continuously and validate compliance, as well as monitor and troubl
Publish At:2020-12-01 18:37 | Read:225 | Comments:0 | Tags:AWS Kubernetes Sysdig Monitor Sysdig Secure security

Shared Responsibility and Configuration Management in the Cloud: SecTor 2020

A number of high-profile data breaches have resulted directly from misconfigured permissions or unpatched vulnerabilities. For instance, the 2017 Equifax breach was the result of exploiting an unpatched flaw in Apache Struts allowing remote code execution. More recently, the Capital One breach last year stemmed from a misconfigured web application firewall.
Publish At:2020-10-13 01:55 | Read:493 | Comments:0 | Tags:Cloud Featured Articles AWS configuration Google Cloud hybri

How to monitor Istio, the Kubernetes service mesh

In this article, we are going to deploy and monitor Istio over a Kubernetes cluster. Istio is a service mesh platform that offers advanced routing, balancing, security, and high availability features, plus Prometheus-style metrics for your services out-of-the-box. What is Istio? Istio is a platform used to interconnect microservices.It provides advance
Publish At:2020-09-30 11:35 | Read:382 | Comments:0 | Tags:AWS DCOS Docker Google Cloud IBM Cloud Kubernetes OpenShift

Automate Fargate image scanning

Discover how to automate AWS Fargate image scanning directly in your AWS environment and block vulnerabilities from reaching production, among other threats. AWS Fargate and ECS allow you to deploy containerized workloads quickly. Fargate is even more convenient, as you don’t have to take care of the infrastructure. Those services are so convenient
Publish At:2020-09-30 11:35 | Read:399 | Comments:0 | Tags:AWS Sysdig Secure Fargate Image scanning Inline Image scanni

Secure and monitor AWS Outposts and hybrid clouds

Today we announced that Sysdig has demonstrated successful integration of our monitoring and security software with AWS Outposts and achieved the AWS Outposts Ready designation. AWS Outposts provides a fully managed service that extends AWS infrastructure, services, APIs, and tools to your datacenter, co-location space or "edge" location to support
Publish At:2020-09-15 13:32 | Read:354 | Comments:0 | Tags:AWS Sysdig Monitor Sysdig Secure Cloud

Secure and monitor your containers on Bottlerocket from AWS

Sysdig is pleased to support AWS today in their GA launch of Bottlerocket, a special-purpose operating system designed for hosting Linux containers. Orchestrated container environments run potentially hundreds of compute nodes. Operating general-purpose Linux on container hosts introduces complexity for IT teams who must patch and update packages across thei
Publish At:2020-08-31 17:50 | Read:704 | Comments:0 | Tags:AWS

Amazon Web Services Mitigated a 2.3 Tbps DDoS Attack

Amazon Web Services (AWS) said that it mitigated a distributed denial-of-service (DDoS) attack with a volume of 2.3 Tbps.In its “Threat Landscape Report – Q1 2020,” AWS Shield revealed that its team members had spent several days responding to this particular network volumetric DDoS attack.In Q1 2020, a known UDP reflection vector, CLDAP reflecti
Publish At:2020-06-18 08:14 | Read:1040 | Comments:0 | Tags:IT Security and Data Protection Latest Security News AWS DDo

Using AWS Session Manager with Enhanced SSH and SCP Capability

Last year, Amazon Web Services announced new capabilities in the AWS Systems Manager Session Manager. Users are now capable of tunneling SSH (Secure Shell) and SCP (Secure Copy) connections directly from a local client without the need for the AWS management console.For years, users have relied on firewalls and bastion hosts in order to securely access cloud
Publish At:2020-06-08 06:25 | Read:783 | Comments:0 | Tags:Cloud Amazon Web Services AWS scp SSH

Improving the Prometheus exporter for Amazon CloudWatch

A Prometheus CloudWatch exporter is a key element for anyone wanting to monitor AWS CloudWatch. Exporting CloudWatch metrics to a Prometheus server allows leveraging of the power of PromQL queries, integrating AWS metrics with those from other applications or cloud providers, and creating advanced dashboards for digging down into problems. But, who wa
Publish At:2020-05-24 09:25 | Read:799 | Comments:0 | Tags:AWS Falco falco Monitoring PromCat Prometheus Sysdig Monitor

Falco Support on AWS Fargate

Today we’re very excited to announce a partnership with Amazon to support Fargate in Sysdig’s product line. We are also announcing that Falco, the world’s most popular runtime security tool for containers, will soon be able to work on Fargate. This is an important milestone. For the first time, Fargate users will enjoy the benefit of deep instrumentation.
Publish At:2020-04-08 18:40 | Read:1211 | Comments:0 | Tags:AWS Falco falco

TROOPERS20 Training Teaser: Attack And Defence In AWS: Chaining Vulnerabilities To Go Beyond The OWASP Top 10

Attackers are everywhere. They are now on the cloud too! Attacking the most popular cloud provider – AWS, requires the knowledge of how different services are setup, what defences do we need to bypass, what service attributes can be abused, where can information be leaked, how do I escalate privileges, what about monitoring solutions that may be presen
Publish At:2020-02-27 17:57 | Read:1178 | Comments:0 | Tags:Events AWS TROOPERS TROOPERS20

Business in the front, party in the back: backdoors in elastic servers expose private data

It seems like every day we read another article about a data breach or leak of cloud storage exposing millions of users’ data. The unfortunate truth is that the majority of these leaks require no actual “hacking” on the part of the attacker. Most of the time, this highly confidential data is just sitting in open databases, ripe for the
Publish At:2020-01-17 16:50 | Read:1442 | Comments:0 | Tags:Threat spotlight aws AWS buckets cloud database cloud databa

Inline Image Scanning for AWS CodePipeline and AWS CodeBuild

In this blog post you’ll learn how to set up image vulnerability scanning for AWS CodePipeline and AWS CodeBuild using Sysdig Secure DevOps Platform. AWS provides several tools for DevOps teams: CodeCommit for version control, CodeBuild for building and testing code, and CodeDeploy for automatic code deployment. The block on top of all these tools is
Publish At:2019-11-26 11:50 | Read:1784 | Comments:0 | Tags:Uncategorized AWS Kubernetes Sysdig Secure


Tag Cloud