Join us

ContentUpdates from UWS...
Link
@faun shared a link, 2 years, 4 months ago
FAUN.dev()

What is Packet Duplication & How to Identify It

Unleash your inner network admin and conquer the mystery of packet duplication in the digital landscape of modern business. Learn how to identify and mitigate packet duplication to maintain data integrity and optimize network performance... read more  

What is Packet Duplication & How to Identify It
Link
@faun shared a link, 2 years, 4 months ago
FAUN.dev()

Use Confidential Virtual Machines and Enclaves to improve your cluster security

Confidential computing, using hardware-enforced trusted execution environments (TEEs) like secure enclaves, improves cluster security in the cloud-native ecosystem, particularly in Kubernetes. TEEs provide a secure and trusted execution environment for critical cryptographic operations and protect s.. read more  

Link
@faun shared a link, 2 years, 4 months ago
FAUN.dev()

Azure access from GitHub and GitLab pipelines - without secrets

Federate credential workload identity federation allows CICD pipelines in GitHub and GitLab to access Azure subscriptions without storing credentials in pipeline configurations. GitHub Actions can handle this transparently and GitLab can supply the necessary token directly in the pipeline run... read more  

Azure access from GitHub and GitLab pipelines - without secrets
Link
@faun shared a link, 2 years, 4 months ago
FAUN.dev()

Supply chain security for Go: Compromised dependencies

The rise in supply chain attacks on software has made it crucial for open-source developers using Go to monitor and assess the risks of their dependencies. Go provides built-in protections to help trust the integrity of packages, including the ability to detect and prevent malicious versions or with.. read more  

Link
@faun shared a link, 2 years, 4 months ago
FAUN.dev()

How to handle Large Objects (LOBs) migration from Db2, Oracle to Azure SQL & Datalake

Database modernization from Db2 and Oracle tables with LOB datatypes to Azure SQL PaaS offering (DB / MI) or SQL Server provides an opportunity to optimize databases by storing LOB data as Azure Datalake storage blob objects. This approach reduces maintenance time, offers flexibility in backup, disa.. read more  

How to handle Large Objects (LOBs) migration from Db2, Oracle to Azure SQL & Datalake
Link
@faun shared a link, 2 years, 4 months ago
FAUN.dev()

Hacking Auto-GPT and escaping its docker container

Auto-GPT arbitrary code execution and docker escape: Researchers discovered a vulnerability in Auto-GPT that allowed attackers to execute arbitrary code by injecting prompts and manipulating the user approval process. They also found a method to escape the Auto-GPT docker image and gain access to th.. read more  

Hacking Auto-GPT and escaping its docker container
Link
@faun shared a link, 2 years, 4 months ago
FAUN.dev()

Automating Custom VM Image Creation with Azure Image Builder and Azure DevOps

Developer automates the process of creating custom virtual machine images using the Azure Image Builder feature, eliminating the need for manual provisioning and configuration. This automation process involves defining resources in Azure, customizing the virtual machine image, and building the final.. read more  

Automating Custom VM Image Creation with Azure Image Builder and Azure DevOps
Link
@faun shared a link, 2 years, 4 months ago
FAUN.dev()

ServiceNow Insecure Access Control To Full Admin Takeover

A vulnerability in ServiceNow allows a low-privilege user to gain unauthorized full administrative access to the platform. By exploiting certain vulnerabilities, such as insecure access control and session token manipulation, an attacker can escalate their privileges from a standard user to an admin.. read more  

Link
@faun shared a link, 2 years, 4 months ago
FAUN.dev()

Starting HPC Worker Processes at Boot Time in VM Scale Sets

One is deploying an HPC embarrassingly parallel application in Azure Virtual Machine Scale Sets (VMSSs) and realized that (i) ssh into VM instances is possible even when they have not been fully provisioned and (ii) worker processes start before such provisioned state is reached. If you got into thi.. read more  

Link
@faun shared a link, 2 years, 4 months ago
FAUN.dev()

AWS WAF Clients Left Vulnerable to SQL Injection Due to Unorthodox MSSQL Design Choice

The Microsoft SQL Server has an undocumented design choice that allows it to bypass web application firewalls (WAFs) due to a lax attitude towards SQL parsers. This unorthodox design choice can potentially be exploited by hackers to bypass security protections provided by WAFs... read more  

AWS WAF Clients Left Vulnerable to SQL Injection Due to Unorthodox MSSQL Design Choice

This organization doesn't have a detailed description yet. If you are the administrator of this organization, please claim this page and edit it.