Uptycs Blog

Welcome! The Uptycs blog is for security professionals and osquery enthusiasts interested in exploring new ideas in cloud security. We hope you’ll enjoy our blog enough to subscribe and share.

What’s the difference between CASB, CWPP, CSPM, and CNAPP?

What’s the difference between CASB, CWPP, CSPM, and CNAPP?

As enterprises shift their workloads to the cloud, securing cloud environments has become an imperative. 

Gartner forecasts that worldwide public cloud spending will increase by 18.4% in 2021 to a total of $304.9 billion. The market research firm predicts that the proportion of IT spending shifting to the cloud will accelerate, with the cloud projected to make up 14.2% of the total global enterprise IT spending market in 2024, up from 9.1% in 2020.

What you need to know about CWPP (cloud workload protection platform)

What you need to know about CWPP (cloud workload protection platform)

Organizations are accelerating their migrations to the cloud while continuing to use on-premises systems. This cloud/on-prem mix offers big upsides in flexibility and scalability, but it also makes it hard to protect an organization’s shifting attack surface.

Use Uptycs and osquery to secure your AWS Fargate containers on ECS

Use Uptycs and osquery to secure your AWS Fargate containers on ECS

AWS Elastic Container Service (ECS) and Elastic Kubernetes Service (EKS) require provisioning of compute resources to run container workloads.

Detecting Docker escapes using osquery and Uptycs

Detecting Docker escapes using osquery and Uptycs

Docker escape techniques allow an attacker to break out to the host system from a container. This is generally achieved by exploiting various misconfigurations in Docker. Broadly, the escape techniques fall into two categories:

Silver Sparrow macOS malware detection with Uptycs

Silver Sparrow macOS malware detection with Uptycs

Late last week cybersecurity company Red Canary published an article revealing a new strain of macOS malware they discovered. Looking at data provided by Malwarebytes they determined that this new malware, which they dubbed “Silver Sparrow,” had already infected nearly 30,000 macOS endpoints around the world.

Recent trends in malicious document techniques, targets, and attacks

Recent trends in malicious document techniques, targets, and attacks

Research by Ashwin Vamshi and Abhijit Mohanta

The Uptycs threat research team is monitoring ongoing targeted attacks and trends. We’ve recently seen threat actors and APT groups frequently using two document-based techniques: template injection and the Equation Editor exploit. In this piece, we’ll cover these oft-used techniques and provide details on the APT groups applying them.

Page 4 of 23: