Data Safety and Information Security

Data Safety and Information Security

641 bookmarks
Custom sorting
Blog: A deep dive into CVE-2023-2163: How we found and fixed an eBPF Linux Kernel Vulnerability
Blog: A deep dive into CVE-2023-2163: How we found and fixed an eBPF Linux Kernel Vulnerability
This blog post takes a look at the years where eBPF was one of the kernel subsystems that grabbed the attention of a lot of security researchers. We will tell the story of how we discovered CVE-2023-2163, what our root-cause analysis process looked like, and what we did to ultimately fix the issue.
·bughunters.google.com·
Blog: A deep dive into CVE-2023-2163: How we found and fixed an eBPF Linux Kernel Vulnerability
List of User Agents strings | UserAgents.io
List of User Agents strings | UserAgents.io
List of user agents categorized by device and platform. Utility to parse user agents and get information like operative system device
·useragents.io·
List of User Agents strings | UserAgents.io
Bypassing eBPF to Protect Runtimes in Kubernetes Apps
Bypassing eBPF to Protect Runtimes in Kubernetes Apps
Generative AI presents new security problems for runtimes of Kubernetes applications. Operant, a runtime application platform provider, offers a non-eBPF solution.
·thenewstack.io·
Bypassing eBPF to Protect Runtimes in Kubernetes Apps
GeoLite2 Free Geolocation Data
GeoLite2 Free Geolocation Data
Develop applications using industry-leading IP intelligence and risk scoring.
·dev.maxmind.com·
GeoLite2 Free Geolocation Data
"A Story About Jessica" by SwiftOnSecurity
"A Story About Jessica" by SwiftOnSecurity
The cybersecurity expert SwiftOnSecurity, a decade ago, wrote a parable called "A Story About Jessica" and posted it to their (now-deleted) Tumblr blog. I found it moving and insightful. The consultancy Superbloom pointed to it … | Cogito, Ergo Sumana | Blog by Sumana Harihareswara, Changeset founder
·harihareswara.net·
"A Story About Jessica" by SwiftOnSecurity
Introduction to Hyperscan
Introduction to Hyperscan
Hyperscan, a high-performance, open source regex matching library from Intel, supports PCRE syntax, simultaneous matching of regex groups, and streaming operations. Suitable for DPI,IDS, IPS, and firewalls, and has been deployed in network security solutions worldwide. Hyperscan is integrated with DPDK, where its performance can reach wire speed and at larger packets sizes.
·intel.com·
Introduction to Hyperscan
www.blocklist.de -- Fail2Ban-Reporting Service (we sent Reports from Attacks on Postfix, SSH, Apache-Attacks, Spambots, irc-Bots, Reg-Bots, DDos and more) from Fail2Ban via X-ARF.
www.blocklist.de -- Fail2Ban-Reporting Service (we sent Reports from Attacks on Postfix, SSH, Apache-Attacks, Spambots, irc-Bots, Reg-Bots, DDos and more) from Fail2Ban via X-ARF.
www.blocklist.de -- Fail2Ban-Reporting Service (we sent Reports from Attacks on Postfix, SSH, Apache-Attacks, Spambots, irc-Bots, Reg-Bots, DDos and more) from Fail2Ban via X-ARF. we report SSH-, Mail-, FTP-, Apache- and other Attacks from fail2ban via X-ARF
·blocklist.de·
www.blocklist.de -- Fail2Ban-Reporting Service (we sent Reports from Attacks on Postfix, SSH, Apache-Attacks, Spambots, irc-Bots, Reg-Bots, DDos and more) from Fail2Ban via X-ARF.
AI crawlers need to be more respectful
AI crawlers need to be more respectful
We talk a bit about the AI crawler abuse we are seeing at Read the Docs, and warn that this behavior is not sustainable.
·about.readthedocs.com·
AI crawlers need to be more respectful
Ben Werdmuller (@ben@werd.social)
Ben Werdmuller (@ben@werd.social)
What if the Harris campaign - or the White House - wanted to join the fediverse properly? They'd have to admin their own Mastodon (or similar) instance. I'm convinced there's a need for a VIP hosted instance for brands, government, professional organizations, and anyone who cares about branding, brand safety, analytics, tight links to other branded web properties (including WordPress integration), and professional moderation. #fediverse
·werd.social·
Ben Werdmuller (@ben@werd.social)
WireGuard vs OpenVPN: Which One Should You Use?
WireGuard vs OpenVPN: Which One Should You Use?
Looking for a VPN solution for your devices? Explore our comparison of WireGuard vs OpenVPN to determine which one fits your personal needs.
·maketecheasier.com·
WireGuard vs OpenVPN: Which One Should You Use?
Unfashionably secure: why we use isolated VMs
Unfashionably secure: why we use isolated VMs
Would your rather observe an eclipse through a pair of new Ray-Bans, or a used Shade 12 welding helmet? Undoubtably the Aviators are more fashionable, but the permanent retinal damage sucks. Fetch the trusty welding helmet. We’ve made a number of security choices when building Canary that have held us in pretty good stead. These…
·blog.thinkst.com·
Unfashionably secure: why we use isolated VMs
Phish-Friendly Domain Registry “.top” Put on Notice
Phish-Friendly Domain Registry “.top” Put on Notice
The Chinese company in charge of handing out domain names ending in “.top” has been given until mid-August 2024 to show that it has put in place systems for managing phishing reports and suspending abusive domains, or else forfeit its…
·krebsonsecurity.com·
Phish-Friendly Domain Registry “.top” Put on Notice
Second-class interactions are a first-class risk
Second-class interactions are a first-class risk
Below is a screenshot of Vizceral, a tool that was built by a former teammate of mine at Netflix. It provides a visualization of the interactions between the various microservices. Vizceral uses mo…
·surfingcomplexity.blog·
Second-class interactions are a first-class risk
(Crowd)Strike 3, You’re Out: Reimagining OS Security
(Crowd)Strike 3, You’re Out: Reimagining OS Security
In the fast-evolving world of cybersecurity, the recent CrowdStrike outage served as a stark reminder of the vulnerabilities that can arise…
·pennypinstripe.medium.com·
(Crowd)Strike 3, You’re Out: Reimagining OS Security
How we share secrets at a fully-remote startup | Grist
How we share secrets at a fully-remote startup | Grist
Fully-remote software startups are increasingly common. But what happens when you need to share real secrets? We have a 72-line solution.
·getgrist.com·
How we share secrets at a fully-remote startup | Grist