Interested in Solving your Challenges with XenonStack Team

Get Started

Get Started with your requirements and primary focus, that will help us to make your solution

Proceed Next

Technology Insights

Data Insights on Cloud Native, Big Data, DevOps, Data Science and Real Time Analytics, AI, Robotic Process Automation and Cognitive Automation

xenonstack blog author

Parveen Bhandari

Parveen is a Cloud Security expert, Technology Enthusiast, and Evangelist. His vast experience in technology excites him to write and share knowledgeable content. He understands clients’ challenges and knows how to deploy and execute tasks and offer solution building. He is a great team player with exceptional problem solving capabilities.

Explore Insights Posts

DevSecOps Pipeline - A Complete Overview | 2024

DevSecOps Pipeline - A Complete Overview | 2024

A Step Guide for implementing the DevSecOps Pipeline in the CI/CD to enhance the Software release workflow with continuous security.

27 October 2024

Key DevSecOps Checklists for Secure Development

Key DevSecOps Checklists for Secure Development

Explore Key DevSecOps Checklists for Secure Development into your development and operations processes, ensuring a secure and efficient pipeline

11 September 2024

DevSecOps Framework and Tools | The Ultimate Guide

DevSecOps Framework and Tools | The Ultimate Guide

Understand the benefits, architecture, and feasibility of integrating security early in the DevOps environment and adopting DevSecOps

19 June 2023

Role of SRE in Production Services | The Advanced Guide

Role of SRE in Production Services | The Advanced Guide

Role of Site Reliability Engineers in Production Services for developing highly scalable software systems and manage production systems.

09 June 2023

Cloud Security Pillar and its Best Practices

Cloud Security Pillar and its Best Practices

Cloud Security Pillar, Challenges and its Best Practices to protect data, applications, and infrastructure in a cloud computing environment

25 May 2023

Apache Storm Security with Kerberos | An Essential Guide

Apache Storm Security with Kerberos | An Essential Guide

Apache Storm security in conjunction with Apache Kerberos best practices, design, and functionality, enables businesses to process data securely.

16 March 2023

AWS Security Tools and its Configuration | Ultimate Guide

AWS Security Tools and its Configuration | Ultimate Guide

AWS Security Tools, Configuration and its use cases to check the configuration of the resources and records valuable information.

16 March 2023

Application Security Checklist and Strategy for 2023

Application Security Checklist and Strategy for 2023

Application security Checklist and strategy to consider in 2023 for securing applications against emerging cyber attacks in evolving threat landscape.

15 March 2023

Cybersecurity Framework | Quick Guide

Cybersecurity Framework | Quick Guide

Cybersecurity Framework and best practices for businesses to manage risks and reduce exposure to vulnerabilities that cyber criminals may exploit.

14 March 2023

Application Security Best Practices | Quick Guide

Application Security Best Practices | Quick Guide

Application security best practices to keep enterprises on top of security for minimizing the risk of data and code breaches.

10 September 2024

Managed SRE Challenges and its Solutions | Ultimate Guide

Managed SRE Challenges and its Solutions | Ultimate Guide

Managed SRE challenges, solutions, and recommended tools to resolving incidents, automating operational tasks, using the software to manage systems.

30 August 2024

Enterprise-Grade Secret Management using Vault Kubernetes

Enterprise-Grade Secret Management using Vault Kubernetes

Vault Kubernetes is ideal for Secret Management in Kubernetes and offers critical services in the fields of Identity Management, and Compliance.

23 September 2024

Decentralized Identity | The Future of Web 3.0

Decentralized Identity | The Future of Web 3.0

Digital identity is the key for enabling Web 3.0 to interact securely and provide privacy, control, openness, and interoperability.

02 July 2024

Software Development Life Cycle (SDLC) | Security and Aceleration

Software Development Life Cycle (SDLC) | Security and Aceleration

Software development life cycle is a sequences of stages to develop software and ensure its security and identify flaws early in the development stage

08 November 2022

Site Reliability Engineering | Approach to Achieve DevOps Objectives

Site Reliability Engineering | Approach to Achieve DevOps Objectives

Site Reliability Engineering (SRE) bridges gap between development and operations team. Get to know its benefits, principles, and much more.

29 October 2022

Whatsapp CVE-2019-3568 and Zimbra CVE-2018-6882 Vulnerabilities

Whatsapp CVE-2019-3568 and Zimbra CVE-2018-6882 Vulnerabilities

CVE-2019-3568 (Whatsapp) and CVE-2018-6882 (Zimbra) Vulnerabilities allow attackers to remotely inject arbitrary HTML or remotely execute code

16 December 2022

Crestron CVE-2019-3929 and F5 CVE-2022-1388 Vulnerabilities

Crestron CVE-2019-3929 and F5 CVE-2022-1388 Vulnerabilities

CVE-2019-3929 and F5 CVE-2022-1388 vulnerabilities can leads to priveledges escalation and remote code execution

16 December 2022

VMware CVE-2022-22947 and Zyxel CVE-2022-30525 Vulnerabilities

VMware CVE-2022-22947 and Zyxel CVE-2022-30525 Vulnerabilities

CVE-2022-22947 and CVE-2022-30525 are Code and Command Injection Vulnerabilities that can allow an attacker to modify files and execute OS commands.

10 September 2024

Remcos RAT: A Phishing Email Empowers the Attacker to take Control

Remcos RAT: A Phishing Email Empowers the Attacker to take Control

Remcos RAT malware targeting Windows-based computers gives the attacker complete remote control over the systems via phishing email to steal user ...

20 August 2022

What is CodeRed Virus? How to stop it?

What is CodeRed Virus? How to stop it?

CodeRed Worm propagates through networks, uses a vulnerability in Microsoft's IIS, and launches a DoS attack to suspend all activities.

20 August 2022

Introduction to Identity and Access Management

Introduction to Identity and Access Management

Unified Identity and Access Governance Solution can help Enterprises in limiting the access request to users for streamlining operations

30 August 2024

What is Serverless Security? - A Complete Guide

What is Serverless Security? - A Complete Guide

Applications rely on managed services for serverless security to abstract the necessity to manage, patch, and secure virtual machines and ...

15 July 2024

SecDevOps: What is it, and do you need it in your organization?

SecDevOps: What is it, and do you need it in your organization?

SecDevOps employs continuous and automated security testing even before the application is deployed, It ingrains culture of a security-first firm ...

10 September 2024

What is Cloud Security? A Quick Guide

What is Cloud Security? A Quick Guide

Cloud Security is a set of policies, procedures, and controls that together protects Cloud-Based Applications, data, and Infrastructure.

15 July 2024

Sasser Virus: Affecting Computers with Windows XP and Windows 2000

Sasser Virus: Affecting Computers with Windows XP and Windows 2000

The Sasser virus finds a vulnerable system, copies itself into the Windows system directory, and is launched the next time the computer is booted.

20 August 2022

Spring4shell : A Critical Vulnerability in Spring Java Framework

Spring4shell : A Critical Vulnerability in Spring Java Framework

Spring4shell (CVE-2022-22965) is a vulnerability in the Spring Java framework that execute code remotely and compromises a huge number of servers

22 August 2022

Clop Ransomware- A Dangerous File Encrypting Virus

Clop Ransomware- A Dangerous File Encrypting Virus

Clop Virus belongs to the Cryptomix ransomware family which actively avoids unprotected systems and encrypts saved files by planting the Clop ...

22 August 2022

Tinba : The Tiny Banker Trojan Compromising your Financial Accounts

Tinba : The Tiny Banker Trojan Compromising your Financial Accounts

Tinba is a tiny banker trojan that uses a spoofed website of a financial institution to redirect sensitive information, login credentials to the ...

30 August 2024

Delta CVE-2022-25880 and Sophos CVE-2022-1040 Vulnerabilities

Delta CVE-2022-25880 and Sophos CVE-2022-1040 Vulnerabilities

Delta Electronics DIAEnergie (CVE-2022-25880) and Sophos Firewall (CVE-2022-1040) Vulnerabilities allows remote code execution

16 December 2022

Microsoft CVE-2019-1405 and Sonic Wall CVE-2020-5135 Vulnerabilities

Microsoft CVE-2019-1405 and Sonic Wall CVE-2020-5135 Vulnerabilities

SonicWall's CVE-2020-5135 and Microsoft's CVE-2019-1405 vulnerabilities can cause disruption in the availability of resources

16 December 2022

CVE-2022-0609 and CVE-2022-24086 Vulnerabilities

CVE-2022-0609 and CVE-2022-24086 Vulnerabilities

CVE-2022-24086 Vulnerability in Adobe Commerce and Magento Open Source and CVE-2022-0609 Vulnerability in Google Chrome allows arbitrary code ...

30 August 2024

Zimbra CVE-2022-24682 and Microsoft CVE-2017-8570 Vulnerabilities

Zimbra CVE-2022-24682 and Microsoft CVE-2017-8570 Vulnerabilities

Zimbra Webmail Cross-Site Scripting (CVE-2022-24682) and Microsoft Office Remote Code Execution (CVE-2017-8570) vulnerabilities allow access to the ...

30 August 2024

CVE-2019-11581 and CVE-2020-8218: Code Execution Vulnerability

CVE-2019-11581 and CVE-2020-8218: Code Execution Vulnerability

Atlassian Jira CVE-2019-11581 and Pulse Connect CVE-2020-8218 Injection Vulnerabilities allow attackers to execute arbitrary code

16 December 2022

CVE-2021-21973 and CVE-2017-6077 Vulnerabilities

CVE-2021-21973 and CVE-2017-6077 Vulnerabilities

The VMware CVE-2021-21973 (SSRF) and NETGEAR CVE-2017-6077 (Remote Code Execution) Vulnerabilities have the potential to compromise your entire ...

16 December 2022

Zabbix Frontend CVE-2022-23131 and CVE-2022-23134 Vulnerabilities

Zabbix Frontend CVE-2022-23131 and CVE-2022-23134 Vulnerabilities

CVE-2022-23131 and CVE-2022-23134 Vulnerability in Zabbix Frontend could result in frontend settings alteration and Authentication instances takeover

16 December 2022

HIPAA Compliance Checklist and Security Rules | A Quick Guide

HIPAA Compliance Checklist and Security Rules | A Quick Guide

HIPAA Compliance checklist, security rules and Privacy for the protection of patient information with the increase in electronic medical records

25 June 2024

Apache Hbase Security with Kerberos | Complete Guide

Apache Hbase Security with Kerberos | Complete Guide

Apache HBase Security Architecture and its component to secure HBase with Kerberos and create a protected service session.

11 March 2022

Apache ZooKeeper Security and its Architecture | Complete Guide

Apache ZooKeeper Security and its Architecture | Complete Guide

Apache ZooKeeper Security, Architecture, and its Installation on AWS EC2 Instance for managing large hosts, maintenance and configuring information.

09 March 2022

Botnet Detection and Prevention Techniques | A Quick Guide

Botnet Detection and Prevention Techniques | A Quick Guide

Understanding Botnets and how does it work, best Anti-Botnet Tools and Best Practices to protect endpoint devices and malware unbeknownst to users.

06 August 2024

Augment Data and Analytics WorkFlows with Agentic AI

Real Time, Dynamic Insights to adapt to evolving questions and user interaction and Data Management Delivered with Agentic and decision Workflows to revolutionise enterprise decision-making capabilities