Baron SameEdit: Stopping the unstoppable (CVE-2021-3156)
In this episode of TFiR Secure IT, Ron Nixon and SwapnilBhartiya discussed three major cybersecurity stories — WindowsExchange hack, Senate’s hearing on SolarWinds hack and NSA’srecommendations on zero trust.
Your website is the anchor to your online presence and oftenyour first contact with customers. Like insurance, website securityprovides business liability protection. If a hacker can stealvaluable customer information from your site and it’s determinedthat you didn’t provide enough security features to prevent it,your business could be held liable and […]
We recently learned about DreamBus and FreakOut botnets that areattacking Linux systems. Ronald Nixon takes a deep dive on thesevulnerabilities and how Polyverse protects against them.
NPM/Node.js recently had a clever, yet simple, code injectionattack using a “dependency confusion” vulnerability. Below, Idescribe the attack as conducted (simulated, really), and asystemic solution that Polyverse specifically built to solve thisproblem. A recap of the attack, for baseline: Node dependencies arespecified by name and version but not address/location. Take[…]
Today, cybersecurity solutions alert you after an attack occursbut only if that attack is known. Unfortunately, zero-day attacksare inherently difficult to detect as they are by definition anattack that has never been documented. At Polyverse, we buildproducts and solutions that pre-emptively protect our customersagainst memory-based zero-day attacks. An interesting side […]
We certified our open source detection agent Zerotect on MicroFocus ArcSight, a security information and event management (SIEM)and log management tool. To get started with zero-day detectioncheck out the integration:https://marketplace.microfocus.com/arcsight/content/zerotect
The Qualys Research Team found a heap overflow vulnerability insudo, a common and most used utility on Linux, which gives rootprivileges to any local user. With Polymorphing installed, Linuxusers are protected without a workaround.
One of the few non-controversial opinions in cybersecurity isthat enabling any arbitrary user to get super-user privileges,without any caveats is a bad thing. This is a good training-wheelspolicy that anyone can grok and perhaps use as the base to allother policies – Mandatory Access Controls, SELinux and AppArmor,Group Policy, AI/ML […]
The 2020 SolarWinds breach rocked the cybersecurity industry.However, it was an inevitable event, and perhaps more importantly,future breaches are just as likely to occur. Learn more about thebreach and why it occurred in this interview with Ron Nixon and ifyou want to see how Polyverse could protect against supply chainbreaches, […]
2020 was an interesting year for the cybersecurity industry asorganizations transitioned to an almost entire work from homeworkforce. Learn more about Polyverse’s predictions forcybersecurity technology and the industry as a whole as we preparefor 2021 in our latest video with TFIR.
Prevasio found that over half of the public container imageshosted on Docker Hub have critical vulnerabilities. In this videointerview Archis discusses why the report is not as scary as it mayseem, and shares some best practices that users can follow toensure that they can use these public images without any added[…]
I’m Mike Sahari; lowkey Software Engineer, highkey CoffeeEnthusiast. You may know me from “How to Brew Good Coffee” and“Let’s Drink Espresso”. I’m a Software Engineer on the Build Farmteam at Polyverse, and primarily build and own the operational sideof the build farm, and the overall company. In short, I handleeverything […]