Encryption of backups using age and the value of simplicity
I will briefly introduce the age encryption tool. We will learn to encrypt both personal and corporate backups with one simple command, and then argue about why openssl…
I will briefly introduce the age encryption tool. We will learn to encrypt both personal and corporate backups with one simple command, and then argue about why openssl…
Continuing the story about vulnerabilities discovered by UCSB pentesters and formed the basis of cases at the Pentest Award, we publish an analysis of the following real…
Hello, tekkix! The security team of the Platform, led by its team leader Vladimir Bukin, is in touch. The main task of our team is to protect CI/CD and, in particular,…
The profession of a fraudster is highly competitive: to stay afloat and be economically efficient, poor fellows must keep up with trends and respond quickly to changes.…
Recently, developers using the Trivy image scanner encountered the TOOMANYREQUESTS error. It occurred due to the maximum number of tool users and the download rate limit…
In the article, we will talk about the PAM class solution, as well as consider who privileged users are and what key role they play in managing access to critical systems…
Artificial intelligence has already firmly entered the arsenal of modern business tools. Its application is now the norm, not the exception. AI effectively solves the…
Identifying incidents is one of the main tasks of information security specialists. Incidents can be detected in various ways. For example, you can manually analyze event…
When spirits come into our world and magic becomes not just a myth, but something real, anything can happen. For example, all servers suddenly overheat, smoke, and users…
Hello! My name is Pavel, and I am the head of office IT infrastructure at Yandex. For more than a year of my work, to one degree or another, I have dedicated myself to…
BitNinja is an analogue of Dr.Web or Immunify, but unlike them, it specializes not only in catching viruses, but also in filtering incoming traffic. The antivirus uses…
Прошло почти полгода с момента предыдущего релиза Dependency‑Track v4.11 . 1 октября вышел новый релиз Dependency‑Track v4.12.0, а на днях — релиз v4.12.1. Мы опробовали…
Analysis of the evolution and development prospects of interfaces for harmonious cooperation between humans and artificial intelligence.
The Consortium for Information and Software Quality launched the "State of the Industry" survey - the first comprehensive study of software quality analysis. This article…
Hello everyone! In the blog of the Solar 4RAYS Cyber Threat Research Center, we continue to share the results of incident investigations, useful tools for information…
I think it is no secret to many that vulnerabilities in a project can have an extremely negative impact on it. There are a number of ways to deal with vulnerabilities,…
When SMTP was created, it worked by transmitting data in clear text, as we had not yet developed a solution for secure data transmission, what we now call "transport…