Microsoft Office zero-day vulnerability or Microsoft Support Diagnostic Tool Vulnerability CVE-2022-30190 Attackers are effectively exploiting an unpatched vulnerability in the Microsoft Office that considers remote code execution from Microsoft Office. The vulnerability exists in all Windows versions and can be exploited in Microsoft Office 2013, Office 2019, Office … [Read more...]
What’s the Difference Between DevOps and DevSecOps?
People nowadays listening to new interesting profile DevSecOps. But they are really confused about how to get into this, also they are not sure about the difference between DevOps and DevSecOps. I have talked to multiple people who are working in DevOps and Security. Talking to them seems both of them are confused. In this article, I will clear your confession about … [Read more...]
Install Rootless Docker
Overview Rootless docker is the is the new function launched in docker version v19.03 which help to run docker without giving root permission.Although there are podman by Redhat which provide this same functionality.Let us see how to setup rootless docker. Installation of Rootless Docker Before Installation of rootless docker you should not have any version of docker … [Read more...]