As cloud applications are built, tested and updated, they wind their way through an ever-complex series of different tools and teams. Across hundreds or even thousands of technologies that make up the patchwork quilt of development and cloud environments, security processes are all too often applied in only the final phases of software development. Placing security at the very … [Read more...] about The 4 Keys to Building Cloud Security Programs That Can Actually Shift Left
programs
Why you shouldn’t download programs from YouTube links
Earlier this month, Kaspersky experts published a detailed report on a threat they’ve called OnionPoison. They discovered malicious code being distributed through YouTube video. The video advertised using Tor Browser for private browsing. This browser is a modified version of the Firefox browser — with maximum privacy settings. But its most important feature is that it can … [Read more...] about Why you shouldn’t download programs from YouTube links
Code coverage for eBPF programs
By analyzing the resulting LLVM IR for source-based coverage instrumented programs, we should now have a better understanding of what we need to do for having it on eBPF programs running in the Linux kernel. We now know what to completely get rid of and do differently, and what we need to patch to make it loadable and usable by the BPF VM in the kernel.The plan is simple: get … [Read more...] about Code coverage for eBPF programs