<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Katarina992</title>
    <description>The latest articles on DEV Community by Katarina992 (@katarina992).</description>
    <link>https://dev.to/katarina992</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F927384%2F6b081301-3b82-403c-a5c8-49e3a8a4d2bb.jpg</url>
      <title>DEV Community: Katarina992</title>
      <link>https://dev.to/katarina992</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/katarina992"/>
    <language>en</language>
    <item>
      <title>AWS’s Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation</title>
      <dc:creator>Katarina992</dc:creator>
      <pubDate>Mon, 18 Sep 2023 15:32:18 +0000</pubDate>
      <link>https://dev.to/katarina992/awss-hidden-threat-ambersquid-cloud-native-cryptojacking-operation-24le</link>
      <guid>https://dev.to/katarina992/awss-hidden-threat-ambersquid-cloud-native-cryptojacking-operation-24le</guid>
      <description>&lt;p&gt;🚨 New cloud threat alert! 🚨&lt;/p&gt;

&lt;p&gt;The Sysdig Threat Research Team has exposed AMBERSQUID 🦑, a stealthy #CloudNative cryptojacking operation exploiting multiple lesser-known #AWS services and costing victims over $10,000/day. Unlike a typical #cyberattack, AMBERSQUID flies under the radar by exploiting multiple services simultaneously — complicating incident response.&lt;/p&gt;

&lt;p&gt;Dive into the details of this stealthy yet costly attack! 👇&lt;/p&gt;

&lt;p&gt;&lt;a href="https://sysdig.com/blog/ambersquid/"&gt;https://sysdig.com/blog/ambersquid/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cryptocurrency</category>
    </item>
    <item>
      <title>SCARLETEEL 2.0: Fargate, Kubernetes, and Crypto</title>
      <dc:creator>Katarina992</dc:creator>
      <pubDate>Tue, 11 Jul 2023 13:33:08 +0000</pubDate>
      <link>https://dev.to/katarina992/scarleteel-20-fargate-kubernetes-and-crypto-221m</link>
      <guid>https://dev.to/katarina992/scarleteel-20-fargate-kubernetes-and-crypto-221m</guid>
      <description>&lt;p&gt;&lt;a href="https://sysdig.com/blog/scarleteel-2-0/"&gt;SCARLETEEL&lt;/a&gt;, an operation reported on by the Sysdig Threat Research Team last February, continues to thrive, improve tactics, and steal proprietary data. AWS Fargate, a more sophisticated environment to breach, has also become a target as their new attack tools allow them to operate within that environment.&lt;/p&gt;

&lt;p&gt;In their most recent activities, we saw a similar strategy to what was reported in the previous blog: compromise AWS accounts through exploiting vulnerable compute services, gain persistence, and attempt to make money using cryptominers. Had we not thwarted their attack, our conservative estimate is that their mining would have cost over $4,000 per day until stopped.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Cloud Defense in Depth: Lessons from the Kinsing Malware</title>
      <dc:creator>Katarina992</dc:creator>
      <pubDate>Wed, 05 Jul 2023 15:20:12 +0000</pubDate>
      <link>https://dev.to/katarina992/cloud-defense-in-depth-lessons-from-the-kinsing-malware-1p94</link>
      <guid>https://dev.to/katarina992/cloud-defense-in-depth-lessons-from-the-kinsing-malware-1p94</guid>
      <description>&lt;p&gt;&lt;a href="https://sysdig.com/blog/cloud-defense-in-depth/"&gt;https://sysdig.com/blog/cloud-defense-in-depth/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>cloudnative</category>
      <category>kubernetes</category>
      <category>security</category>
    </item>
    <item>
      <title>Bypassing Network Detection with Graftcp</title>
      <dc:creator>Katarina992</dc:creator>
      <pubDate>Wed, 08 Mar 2023 11:06:14 +0000</pubDate>
      <link>https://dev.to/katarina992/bypassing-network-detection-with-graftcp-54h3</link>
      <guid>https://dev.to/katarina992/bypassing-network-detection-with-graftcp-54h3</guid>
      <description>&lt;p&gt;A new network open source tool called graftcp (GitHub page) has been discovered in everyday attacks by the Sysdig Threat Research Team (TRT). Nowadays, threat actors try to improve their techniques by using new tools (as we mentioned in the PRoot article) to enhance the compatibility of their code to hit as many targets as possible and hide their traces properly.&lt;/p&gt;

&lt;p&gt;(&lt;a href="https://sysdig.com/blog/bypassing-network-detection-with-graftcp/"&gt;https://sysdig.com/blog/bypassing-network-detection-with-graftcp/&lt;/a&gt;)&lt;/p&gt;

</description>
      <category>containersecurity</category>
      <category>runtimesecurity</category>
      <category>containers</category>
      <category>containerapps</category>
    </item>
    <item>
      <title>Understanding Kubernetes Pod Pending Problems</title>
      <dc:creator>Katarina992</dc:creator>
      <pubDate>Fri, 16 Sep 2022 12:39:43 +0000</pubDate>
      <link>https://dev.to/katarina992/understanding-kubernetes-pod-pending-problems-59d1</link>
      <guid>https://dev.to/katarina992/understanding-kubernetes-pod-pending-problems-59d1</guid>
      <description>&lt;p&gt;
Kubernetes pod pending is ubiquitous in every cluster, even in different levels of maturity.
&lt;/p&gt;

&lt;p&gt;
If you ask any random DevOps engineer using Kubernetes to identify the most common error that torments their nightmares, a deployment with pending pods is near the top of their list (&lt;a href="https://sysdig.com/blog/debug-kubernetes-crashloopbackoff/"&gt;maybe only second to CrashLoopBackOff&lt;/a&gt;).
&lt;/p&gt;

&lt;p&gt;
Trying to push an update and seeing it stuck can make DevOps nervous. Even when the solution is fairly easy, finding the cause of a pod pending and understanding the changes you need to apply can be important (Kubernetes troubleshooting is rarely trivial).
&lt;/p&gt;

&lt;p&gt;
In this article, we cast some light on the different situations that cause this issue, allowing DevOps teams to find the solution quickly and, best of all, avoid it as much as possible.
&lt;/p&gt;

&lt;p&gt;
Read it here: &lt;a href="https://sysdig.com/blog/kubernetes-pod-pending-problems/"&gt;https://sysdig.com/blog/kubernetes-pod-pending-problems/&lt;/a&gt;
&lt;/p&gt;

</description>
      <category>kubernetes</category>
      <category>devops</category>
      <category>troubleshooting</category>
      <category>monitoring</category>
    </item>
  </channel>
</rss>
