Uptycs Blog

Welcome! The Uptycs blog is for security professionals and osquery enthusiasts interested in exploring new ideas in cloud security. We hope you’ll enjoy our blog enough to subscribe and share.

What Are Cloud Workload Security Best Practices?

What Are Cloud Workload Security Best Practices?

We’ve posted quite a bit about how more companies are shifting their workloads to the cloud. But a key question is how do you secure those workloads in the cloud? With some many different permutations of cloud workloads, from virtual machines, to endpoints, to containers, getting started with how to secure it all can seem a little overwhelming? So what are some cloud workload security best practices?

Is The Cloud Secure?

Is The Cloud Secure?

It’s no longer an on-prem world. For years we’ve all heard about the disappearing security perimeter, the shift to SaaS, cloud-based workloads and new concepts like containers and Kubernetes. For years tech marketing and airport billboards have promised that the cloud can help your organization scale, become more competitive and transform your business. Which it can, but for many organizations, particularly those in highly regulated industries, the question remains:

What Does Cloud Native Mean?

What Does Cloud Native Mean?

“Digital transformation” has been one of the biggest buzzwords of the last decade-- and has come to mean many things to many people. But the biggest manifestation that most workers have come to encounter has been the shift to the cloud. As more organizations move away from purchasing costly on-site servers and locally installed software, a new breed of IT infrastructure has sprung up termed ‘cloud native.’

macOS: Bashed Apples of Shlayer and Bundlore

macOS: Bashed Apples of Shlayer and Bundlore

The Uptycs threat research team has been observing over 90% of macOS malware in our daily analysis and customer telemetry alerts using shell scripts. Though these scripts have slight variations, they mostly belong to a plague of adware strains—Shlayer and Bundlore. These malware are the most predominant malware in macOS, also with a history of evading and bypassing the built-in Xprotect, Gatekeeper, Notarization and File Quarantine security features of macOS.

Evasive Techniques Used By Malicious Linux Shell Scripts

Evasive Techniques Used By Malicious Linux Shell Scripts

Research by: Siddartha Sharma and Adhokshaj Mishra

In our previous blog, we discussed the common utilities in Linux which are generally used by threat actors in the attack chain. This blog discusses the common defense evasion techniques which are mostly used in malicious shell scripts and how Uptycs detects them.

6 Tips for Evaluating A Cloud Security Solution

6 Tips for Evaluating A Cloud Security Solution

Securing your data and devops environments has never been harder. As digital transformation accelerates and more of the business moves to the cloud, the job of cybersecurity teams has never been more difficult. With cloud deployments scattered across multicloud and hybrid environments, and touching nearly every facet of the business, it’s both harder and more important than ever to ensure that you have full visibility into all of your cloud controls.

Page 1 of 23: