Join us

ContentUpdates from Profisea...
Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

How to build a better vulnerability management program

Vulnerability management is key to mitigate high-risk cybersecurity threats. Determining every vulnerability type, addressing them holistically, and building a culture of continuous improvement are the core steps to building a well-rounded vulnerability management program. Asset management is a majo.. read more  

Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

6 ways generative AI chatbots and LLMs can enhance cybersecurity

OpenAI's ChatGPT is making waves in generative AI chatbots. While there is concern over security risks the technology could introduce, there are also great potential benefits. Generative AI chatbots and LLMs can significantly enhance cybersecurity for businesses in multiple ways, such as improving v.. read more  

6 ways generative AI chatbots and LLMs can enhance cybersecurity
Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

Strengthening Cloud Security Through Microsegmentation and Network Virtualization

The author discusses the impact of cloud computing on business operations and the security issues it brings, particularly with regards to protecting cloud data. To strengthen cloud security, microsegmentation and network virtualization are explored as techniques to create granular security policies,.. read more  

Strengthening Cloud Security Through Microsegmentation and Network Virtualization
Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

Infecting SSH Public Keys with backdoors

In this article, you will learn how to add a backdoor to the SSH Public Key. The backdoor will execute whenever the user logs in. The backdoor hides as an unreadable long hex string inside ~/.ssh/authorized_keys or ~/.ssh/id_*.pub. The source is available onGitHub... read more  

Infecting SSH Public Keys with backdoors
Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

DevSecOps Principles and Key Steps for Securing the CI/CD Pipeline

Adopting DevSecOps principles is crucial for organizations to effectively identify and reduce vulnerabilities in their software development process by integrating security practices in the early stage of development, promoting early identification and mitigation of security risks. Learn the fundamen.. read more  

Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

Passwordless Google Cloud SQL access control with Cloud SQL Auth proxy

The article discusses the challenges of managing database user permissions and passwords in a growing and complex environment at Love Holidays, a mature startup. It suggests using Google Cloud SQL Auth Proxy with Google IAM authentication and managing user permissions through infrastructure as code .. read more  

Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

Introducing Microsoft Fabric: The data platform for the era of AI

Microsoft Fabricis an end-to-end unified analytic platform that brings together data analytic tools and organization needs in a single unified product empowering every team in the analytic process from data engineers, warehousing & science analysts, to business users. Fabric addresses every aspect o.. read more  

Introducing Microsoft Fabric: The data platform for the era of AI
Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

Microsoft’s Azure Linux distro is now generally available

Microsoft has announced the general availability of Azure Linux, an open-source container host OS designed to run multiple containers in the cloud, aimed at making it easy for developers to deploy and manage container workloads. Azure Linux has been in public preview for two years since October 2022.. read more  

Microsoft’s Azure Linux distro is now generally available
Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

Azure Linux released at Build – where Microsoft revealed why it did not fork Fedora

Microsoft has announced the general availability of Azure Linux, a new open-source operating system distribution. The company built the OS from scratch, without forking any existing Linux distribution like Fedora. It is commercially supported, but the primary purpose is to run as a container host in.. read more  

Azure Linux released at Build – where Microsoft revealed why it did not fork Fedora
Link
@faun shared a link, 2 years, 6 months ago
FAUN.dev()

Threat actor bypasses detection, protections in Microsoft Azure Serial Console

Mandiant researchers have observed threat actors abusing privileged account access to Microsoft Azure Serial Console, bypassing many defense and detection methods, thereby gaining full administrative access to text-based console window of virtual machines. The technique is widely known in the securi.. read more  

Threat actor bypasses detection, protections in Microsoft Azure Serial Console

This organization doesn't have a detailed description yet. If you are the administrator of this organization, please claim this page and edit it.