by EGI CSIRT | Dec 23, 2024 | Knowledgebase, News, Recommendations
Securing access to your servers is critical because it is the first line of defence against unauthorised access and potential breaches. Most security incidents are caused by inadequate access controls, such as weak or default passwords, stolen credentials, and lack of...
by EGI CSIRT | Dec 19, 2024 | Knowledgebase, News, Recommendations
Based on EGI Security Traceability and Logging Policy all certified EGI sites need to have a remote logging service in place. By storing logs remotely, you protect them from being tampered with or deleted by attackers who gain access to your systems. This ensures the...
by EGI CSIRT | Oct 13, 2023 | Knowledgebase, News, Recommendations
Based on recent incidents in the EGI environment, we would like to point out some of the guidelines and best practices to enhance the security resilience of the resource providers. Prevention Central logging: Ensure that logs are collected centrally by a remote...
by EGI CSIRT | Jun 13, 2022 | Knowledgebase, News
The EGI CSIRT has recently had several reports of malicious activities, where parts of infrastructures have been infected with cryptomining software. Crypto miners are tools that generate cryptocurrency, like Bitcoin. As these can generate profit relatively easily, it...
by EGI CSIRT | Jun 22, 2019 | Knowledgebase, News
A software vulnerability is a weakness in software which could allow actions to be carried out which are not intended. This may be the usage of resources, access to data, destruction or encryption of data (e.g. ransomware). A software vulnerability in software...
Recent Comments