Baron SameEdit: Stopping the unstoppable (CVE-2021-3156)
From a security perspective, Polyverse’s ability to polymorph aLinux operating system and make it nearly immune from known andundisclosed memory-based attacks that make up 70% of successfulattacks is compelling. It goes a long way to protecting andattack proofing a large array of servers, VMs and containers in thecloud, or on […]
Join Ron Nixon and Archis Gore as they discuss why UScompanies are constantly under attack from hackers and what can bedone to mitigate the changing threats.
Hello readers. I am here today to tell you about my favoritetool when dealing with containers, Skopeo! This light-weightcommand line tool allows one to perform various operations oncontainer images and image repositories. Here at Polyverse, we usecontainers every day, both internally and in our customer-facingproducts. Some tasks might involve transferring […]
Ransomware in the cloud is a growing cybersecurity threat, onethat can impact business continuity. Learn more about the threatand what you can do to mitigate it in this interview with TFIR.
In this short video interview, learn why legacy systems are sochallenging to secure and three concrete things you can do to stayprotected.
In this episode of TFiR Secure IT, Ron Nixon and SwapnilBhartiya discussed three major cybersecurity stories — WindowsExchange hack, Senate’s hearing on SolarWinds hack and NSA’srecommendations on zero trust.
Your website is the anchor to your online presence and oftenyour first contact with customers. Like insurance, website securityprovides business liability protection. If a hacker can stealvaluable customer information from your site and it’s determinedthat you didn’t provide enough security features to prevent it,your business could be held liable and […]
We recently learned about DreamBus and FreakOut botnets that areattacking Linux systems. Ronald Nixon takes a deep dive on thesevulnerabilities and how Polyverse protects against them.
NPM/Node.js recently had a clever, yet simple, code injectionattack using a “dependency confusion” vulnerability. Below, Idescribe the attack as conducted (simulated, really), and asystemic solution that Polyverse specifically built to solve thisproblem. A recap of the attack, for baseline: Node dependencies arespecified by name and version but not address/location. Take[…]
Today, cybersecurity solutions alert you after an attack occursbut only if that attack is known. Unfortunately, zero-day attacksare inherently difficult to detect as they are by definition anattack that has never been documented. At Polyverse, we buildproducts and solutions that pre-emptively protect our customersagainst memory-based zero-day attacks. An interesting side […]
We certified our open source detection agent Zerotect on MicroFocus ArcSight, a security information and event management (SIEM)and log management tool. To get started with zero-day detectioncheck out the integration:https://marketplace.microfocus.com/arcsight/content/zerotect