Tag: Infosec
-
Cloud-native security in 2025: Why runtime visibility must take center stage
Posted on September 20, 2025, Level intermediate Resource Length medium
The article from The Hacker News outlines the transformative shift in cloud-native application security as industries increasingly adopt containerized and serverless architectures. This evolution has expanded attack surfaces beyond what traditional security models can effectively manage. It introduces runtime visibility as a critical component for contemporary security strategies, allowing teams to understand active threats within production environments. By The Hacker News.
Tags infosec cio devops cloud servers serverless
-
Rate limiting for Django websites
Posted on September 4, 2025, Level intermediate Resource Length long
Rate limiting restricts the number of requests a client can make to your Django website within a specific timeframe. It's especially useful for blocking malicious bots, crawlers, or brute-force attacks that overwhelm server resources. By Aidas Bendoraitis.
Tags nginx devops infosec devops kubernetes
-
Securing Kubernetes resources without a VPN
Posted on September 4, 2025, Level intermediate Resource Length long
Securing kubernetes resources that you want to expose to only some users externally is often done through IP allowlisting and a VPN. While this is a tried and true method, there are some drawbacks. By Brian Sizemore.
Tags nginx app-development infosec devops kubernetes
-
Container registry SSL and K8s Kind
Posted on July 29, 2025, Level advanced Resource Length long
AI safety discussions predominantly focus on easy to conceptualise, highly salient risks including algorithm bias, hallucinations and disinformation. While these are crucial concerns, they overlook a fundamental truth we've learned from other high-stakes fields like aviation and healthcare: sometimes the most dangerous risks can hide in plain sight. By Manu Savani.
Tags ai cio infosec software learning management
-
How to use rsnapshot for incremental backups on Raspberry Pi
Posted on July 22, 2025, Level beginner Resource Length short
After trying out several backup tools over the years, rsnapshot has proven to be one of the most reliable, and setting it up on a Raspberry Pi is easier than you might think. As you know, maintaining our Raspberry Pi infrastructure is crucial. Data loss can disrupt projects and impact efficiency, so we need a robust backup solution. The article highlights `rsnapshot`, a powerful open-source tool that provides an excellent way to automate incremental backups on our Pis. Let me show you how it all works. By Usman Qamar.
Tags linux open-source infosec servers
-
Addressing hidden risks in AI implementation for safety
Posted on July 14, 2025, Level beginner Resource Length long
AI safety discussions predominantly focus on easy to conceptualise, highly salient risks including algorithm bias, hallucinations and disinformation. While these are crucial concerns, they overlook a fundamental truth we've learned from other high-stakes fields like aviation and healthcare: sometimes the most dangerous risks can hide in plain sight. By Manu Savani.
Tags ai cio infosec software learning management
-
Multimodal AI for IoT devices requires a new class of MCU
Posted on July 2, 2025, Level beginner Resource Length long
Context-aware computing enables ultra-low-power operation while maintaining high-performance AI capabilities when needed. The rise of AI-driven IoT devices is pushing the limits of today's microcontroller unit (MCU) landscape. While AI-powered perception applications—such as voice, facial recognition, object detection, and gesture control—are becoming essential in everything from smart home devices to industrial automation, the hardware available to support them is not keeping pace. By Todd Dust.
Tags programming cloud ai infosec servers iot how-to
-
The edge of security: How edge computing is revolutionizing cyber protection
Posted on July 1, 2025, Level beginner Resource Length medium
The traditional centralized model of cloud computing presents significant cybersecurity risks, creating a single point of failure and suffering from latency that can delay critical security updates. Edge computing emerges as a superior, decentralized solution that brings processing power closer to where data is generated. By Andrew Garfield.
Tags programming cloud cio infosec servers iot
-
Wget to wipeout: Malicious Go modules fetch destructive payload
Posted on June 30, 2025, Level beginner Resource Length medium
Sockets threat research team uncovered a destructive supply-chain attack targeting Go developers. In April 2025, three malicious Go modules were identified, using obfuscated code to fetch and execute remote payloads that wipe disks clean. The Go ecosystem's decentralized nature, lacking central gatekeeping, makes it vulnerable to namespace confusion and typosquatting, allowing attackers to disguise malicious modules as legitimate ones. By @socket.dev.
Tags programming golang app-development infosec servers
-
Background of Coinbase's May 2025 breach
Posted on May 31, 2025, Level beginner Resource Length long
Coinbase, America's largest cryptocurrency exchange, received an unsolicited email from an unknown threat actor on May 11, 2025. They claimed to possess sensitive information about its customers and demanded a ransom of $20 million. By Dilip Kumar Patairya.
Tags infosec blockchain fintech crypto cio
-
Bitcoin Core to unilaterally remove controversial OP-Return limit
Posted on May 27, 2025, Level beginner Resource Length medium
In 2014, crypto advertising barely existed. The term "Web3" hadn't been coined, Facebook banned crypto ads and startups promoting their tokens were mostly confined to forums and niche publications. But for Bitmedia founder Matvii Diadkov, the opportunity was obvious. By Martin Young.
Tags app-development blockchain fintech crypto infosec
-
Python adopts standard lock file format for reproducible installs
Posted on May 13, 2025, Level beginner Resource Length short
Python's ecosystems now have a standardized lock file format called pyproject.lock (or pylock.toml) defined by PEP 751. This was formally adopted after the proposal was accepted. By Sarah Gooding.
Tags python cloud infosec devops