Latest News
Read all latest blog posts
![NBD: A Powerful Tool for data center](/images/blog/nbd_hua8f721a8e18b00032458174323e2859e_37312_300x225_resize_q100_h2_box.webp)
NBD: A Powerful Tool for data center
NBD: A Powerful Tool for data center NBD, the abbreviation for Network Block Device (protocol), is a protocol that was initially implemented in the Linux kernel version 2.
Read More![NBD: A Powerful Tool for data center](/images/blog/nbd_hua8f721a8e18b00032458174323e2859e_37312_460x0_resize_q100_h2_box.webp)
NBD: A Powerful Tool for data center
NBD: A Powerful Tool for data center NBD, the abbreviation for Network Block Device (protocol), is a protocol that was initially implemented in the Linux kernel version 2.
Read More![Demystifying SFTP](/images/blog/sftp_huf6dec0e9b9056bd5275dfef7494c00d3_14237_460x0_resize_q100_h2_box_3.webp)
Demystifying SFTP
Introduction SFTP is an auxiliary protocol of SSH that allows file transfer between two hosts over the SSH protocol.
Read More![xz/liblzma Backdoor: Open Source Nuke? Maybe Not That Bad!](/images/blog/xz-nuke_hu3063030001deeed7a2ee793786cc3734_540485_460x0_resize_q100_h2_box_3.webp)
xz/liblzma Backdoor: Open Source Nuke? Maybe Not That Bad!
xz/liblzma Backdoor: Open Source Nuke? Maybe Not That Bad! Story Background On March 29, 2024, a report exposing a backdoor in the upstream source code of the controversial open-source project, the xz software package, was made public on the oss-security mailing list.
Read More![Supermicro x11ssh-F OpenBMC Porting (WIP)](/images/blog/openbmc_hu96646d49a8efaa5089502841e3275983_14467_460x0_resize_q100_h2_box.webp)
Supermicro x11ssh-F OpenBMC Porting (WIP)
Supermicro x11ssh-F OpenBMC Porting (WIP) Introduction to BMC and OpenBMC BMC, short for Baseboard Management Controller, is a specialized microcontroller embedded in certain computers, typically servers.
Read More![Key management of OpenPGP Card](/images/blog/pgp-lock_hu74bcb30350c358c803b2796a91f02e30_9348_460x0_resize_q100_h2_box.webp)
Key management of OpenPGP Card
Key management of OpenPGP Card Background As blank smartcards supporting Java Card 3.
Read More![Protect the Watcher: Hardened SIEM/XDR server with VED](/images/products/hl-wazuh_hu12dd2534072f8238144bbfb448a950a4_182924_460x0_resize_q100_h2_box_3.webp)
Protect the Watcher: Hardened SIEM/XDR server with VED
Background Modern cybersecurity operation centers significantly depend on two key elements: agent-based security solutions operating on desktops, laptops, and server operating systems, and a threat analysis system, often referred to as a Security Information and Event Management (SIEM) system or eXtended Detection and Response (XDR).
Read More![Vault Range - The Measure and Resilience of Weaponized Exploit Methods for Linux](/images/blog/rootthebox_hu9d387ea65dd3944cfe32b27d6f9e6792_203875_460x0_resize_q100_h2_box_3.webp)
Vault Range - The Measure and Resilience of Weaponized Exploit Methods for Linux
Disclaimer VED (Vault Exploit Defense) test image contains only the VED kernel module, and does not contain any security baselines, access control policies and situational hardening solution.
Read More![+PROTECTING LINUX AT KERNEL LEVEL WHY AND HOW](/images/blog/kernel-userspace_hu6a52a68a652eb8d9f48170407d836129_94710_460x0_resize_q100_h2_box_3.webp)
+PROTECTING LINUX AT KERNEL LEVEL WHY AND HOW
Introduction We designed Vault Exploits Defense (VED) as a foundation security layer for various flavors of Linux operating system.
Read More![Memory corruption in JCRE: An unpatchable HSM may swallow your private key](/images/blog/swallow-key_hu10c750ba121fc02d540d0b041015b6b0_101425_460x0_resize_q100_h2_box_3.webp)
Memory corruption in JCRE: An unpatchable HSM may swallow your private key
Background The key has always been a core target of security protection.
Read More