#security (2020-06)

Archive: https://archive.sweetops.com/security/


Meb avatar
Bash Wars: An examination of bash malware tactics and campaigns attachment image

Bash is so useful that it has become popular with malware authors, as it can easily perform many tasks that are necessary for malware installation.


HS avatar
Honda investigates possible ransomware attack, networks impacted attachment image

Compute networks in Europe and Japan from giant car maker Honda have been affected by issues that could be related to a cyber attack.



KEN avatar

When using RDS to save the customer data (financial service), how to improve the security on it? Any best practice?

Maciek Strömich avatar
Maciek Strömich

• Security Groups - access only from the instances

• Storage encryption with a KMS key


Ayman avatar

Hey Folks… FYI doing a webinar/office hours today at 11:30am PT on all things information security (not a CloudPosse thing, but approved to post by Erik). https://pages.cloudsecuritylabs.io/askayman

Ask Ayman Webinar Series attachment image

Not sure where to start with security for your company? Are you now suddenly responsible for cybersecurity at your organization? Ask a security expert anything!