Author: Jeyaraman Thiruvengadam

Do you know about Denonia?

Do you know about Denonia?

Malware that targets AWS Lambda Environments A first-of-its-kind malware that is specifically designed to execute in an AWS Lambda environment has been discovered by Cado labs. Even serverless environments are no longer safe. While the malware’s distribution is limited, the discovery of such malware is evidence of bad actors’ advanced technical skills and their interest

Read More
What is Spring4Shell?

What is Spring4Shell?

Spring framework is found to have a Remote Code Execution (RCE) flaw. This vulnerability, if exploited successfully, will let the attacker take control of the targeted system. Fortunately, the team behind the framework was successfully able to release a patch to address the flaw. What makes Spring4Shell vulnerability (CVE-2022-22965) very dangerous is the leverage it

Read More
Dirty Pipe – Privilege Escalation Vulnerability in Linux

Dirty Pipe – Privilege Escalation Vulnerability in Linux

Linux is found to have yet another severe privilege escalation vulnerability (CVE 2022-0847) in kernel version 5.8 and above. This vulnerability is allowed bad actors to execute malicious code that can act as a host to destructive actions like installing backdoors into the system, injecting code into scripts, and even creating unauthorized user profiles. This

Read More
Adopting Zero Trust Model

Adopting Zero Trust Model

From Zero to Hero Employees are not limited to the office building like in the old days. The remote working had effects on literally everything. Organizations today need a comprehensive security strategy to manage the complexities of securing the data. From perimeter-based security to Zero trust architecture, we have come a long way. Let us

Read More