Author: Ankur Khurana
-
Recently, CVE-2024-3094 was disclosed, revealing that malicious code had been discovered in the upstream tarballs of xz, starting with version 5.6.0. The malicious code uses complex obfuscation techniques to extract a prebuilt object file from a disguised test file within the source code. This file then modifies specific functions in the liblzma code during the…
-
Hello, fellow cloud enthusiasts! I’m an engineer at Kapstan, and I’m thrilled to introduce you to a tool we’ve been passionately crafting: Kapstan’s One-Click Terraform Generator. Our mission was to simplify AWS management, and with this tool, we believe we’ve achieved just that. In this post, I’ll guide you through how to use our Terraform…
-
In one of the previous blog post, “Mastering DevSecOps Transformation: How Infrastructure-as-Code (IaC) Empowers SaaS Businesses for Rapid Growth,” we explored the powerful impact of adopting IaC for scaling and streamlining SaaS infrastructure. Kapstan spearheads this transformation by offering IaC solutions tailored for businesses at different stages of growth. As promised, we’re now back with…