Securing the SPIFFE (Secure Production Identity Framework for Everyone) SPIRE (the SPIFFE Runtime Environment) servers (a crown jewel)

How does one secure the SPIFFE (Secure Production Identity Framework for Everyone) SPIRE (the SPIFFE Runtime Environment) server given the importance of the SPIRE Server in authenticating and attesting the workloads?
The SPIRE Server is th… Continue reading Securing the SPIFFE (Secure Production Identity Framework for Everyone) SPIRE (the SPIFFE Runtime Environment) servers (a crown jewel)

securing webassembly/WasmEdge – any 0-day exploits so far and devsecops pipeline targetted at webassembly?

I am looking to deploy webassembly at scale in production. Before I do so, like to know if there are any 0-day exploits so far and if there are devsecops tools pipeline specifically targetted at webassembly?

Continue reading securing webassembly/WasmEdge – any 0-day exploits so far and devsecops pipeline targetted at webassembly?

Instead of waiting until zero-day exploits to happen, how to preemptively find zero-day vulnerabilities in order to deter zero-day exploits?

Instead of waiting until zero-day exploits to happen, how to preemptively find zero-day vulnerabilities in order to deter zero-day exploits? There has to be a better way.

Continue reading Instead of waiting until zero-day exploits to happen, how to preemptively find zero-day vulnerabilities in order to deter zero-day exploits?

Can an API endpoint hosted running on K8S be breached to compromise the entire cluster? Were there ever such attacks?

Can an API endpoint or a Web Application hosted on K8S exposed been breached to compromise the entire K8S cluster? Were there ever such attacks?
i.e., attacker compromises the spring boot based API with some /PUT, /POST calls which then co… Continue reading Can an API endpoint hosted running on K8S be breached to compromise the entire cluster? Were there ever such attacks?

Working Code for Grant Negotiation and Authorization Protocol (gnap) for evaluation? Performance vs OAuth/OIDC

Understand that Grant Negotiation and Authorization Protocol (gnap) is still in draft status at the IETF.
I am looking to evaluate GNAP and be the first to put in production. Are there any working Code for Grant Negotiation and Authorizati… Continue reading Working Code for Grant Negotiation and Authorization Protocol (gnap) for evaluation? Performance vs OAuth/OIDC

Authentication for blockchain nodes using SPIFFE/SPIRE to avoid rogue nodes [closed]

As a blockchain microservices developer, I observed that most, if not all, public blockchain nodes do not authenticate or authorise with each other before communicating.
If one may apply authentication to blockchain nodes using SPIFFE/SPIR… Continue reading Authentication for blockchain nodes using SPIFFE/SPIRE to avoid rogue nodes [closed]

Using Artificial Intelligence (AI) to detect unauthorized code modification to reduce and to even stop zero-day exploits

Since Solarwinds Hack and Hafnium attack involved some degree of unauthorized code modification (orion DLL, creation of web shell), is it possible to use Artificial Intelligence (AI) built into the very application (Solarwinds, Exchange Se… Continue reading Using Artificial Intelligence (AI) to detect unauthorized code modification to reduce and to even stop zero-day exploits