Remove Authentication Remove How To Remove Linux Remove Malware
article thumbnail

Technology Short Take 176

Scott Lowe

Networking Lee Briggs (formerly of Pulumi, now with Tailscale) shows how to use the Tailscale Operator to create “free” Kubernetes load balancers (“free” as in no additional charge above and beyond what it would normally cost to operate a Kubernetes cluster). Ivan Pepelnjak dives deep on DHCP relaying on a Linux host.

Linux 112
article thumbnail

Technology Short Take 155

Scott Lowe

Isovalent—the company behind the Cilium project—has been talking a lot about how the use of eBPF will transform things, including the architecture of a service mesh. Along those lines, one of their latest articles discusses how to achieve identity-based mutual authentication leveraging eBPF.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: Scanning the Internet

ForAllSecure

Traditional anti-malware research relies on customer systems but what if a particular malware wasn’t on the same platform as your solution software? éveillé from ESET joins The Hacker Mind podcast to talk about the challenges of building his own internet scanner to scan for elusive malware. Marc-Etienne M.Léveillé

article thumbnail

Cybersecurity for enterprise: 10 essential PAM considerations for modern hybrid enterprises

CIO Business Intelligence

How are cyberattack methods evolving? You must also understand how moving to cloud drives changes in enterprise cybersecurity—how to protect those resources, drive down risk, and improve productivity. Especially in Linux estates, they create multiple local privileged accounts for convenience.

article thumbnail

The Hacker Mind Podcast: Hacking Behavioral Biometrics

ForAllSecure

Vamosi: How do we know who’s on the other end of a connection, who it is that is logging into a computer or an account online? So we include other telemetry that seeks to authenticate that the entity logging in is who they say they are. So that’s why you need multi factor authentication. Think about it.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

And if you could initiate a heartbeat before authentication was complete on the site, you could smash and grab the encrypted information before anyone even knew who you were. The thing is criminal hackers also know how to fuzz test -- and they might have found Heartbleed first but we have no way of knowing. Kaksonen: Please do not.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

And if you could initiate a heartbeat before authentication was complete on the site, you could smash and grab the encrypted information before anyone even knew who you were. The thing is criminal hackers also know how to fuzz test -- and they might have found Heartbleed first but we have no way of knowing. Kaksonen: Please do not.