
BlueRock in Action: Actively Preventing LPE
Local Privilege Escalation (LPE) is a critical phase in most attacks. Once an attacker has a foothold within a compromised Linux container, an LPE exploit is how attackers achieve root-level access, break out of the container, and cause additional harm. With vast and complex capabilities such as the Linux kernel (spanning 25M+ lines of code), it’s not surprising that LPE vulnerabilities are discovered regularly by attackers and security researchers alike.

Featured in Forbes: Real-Time Prevention Strategies for Enhanced Cloud Security
Bluerock.io was recently featured in Forbes, where we shared insights on advancing cloud security through real-time prevention. The article explores essential strategies to protect cloud environments effectively and seamlessly, aligning with our commitment to making security native to infrastructure

The Quest for Resilience: Has the Pendulum Swung Too Far from Prevention?
Carl Jung is credited as having said “The pendulum of the mind oscillates between sense and nonsense, not between right and wrong” (emphasis mine) which succinctly captures the essence of a lot of human thought, not least in cybersecurity. Pendulums are also great metaphors for human thinking because—like an idealized theoretical model of a pendulum—external forces don’t necessarily cause things to return to an equilibrium

When Patching and Hardening Aren’t Enough: The Case for “Outside-In” Protection
CVE-2024-1086—a.k.a. Dirty Pagedirectory—is back in the news again and is an excellent demonstration of the limits of OS hardening and other “self-protection” mechanisms. It illustrates why modern runtime security can best be achieved by decoupling the method of protection from the object of protection. BlueRock achieves this separation with its groundbreaking workload protection platform.

Dirty Pagedirectory (CVE-2024-1086) and the (Missing) Pinnacle of the Pyramid of Pain
The Pyramid of Pain has been an essential tool for defenders, but may place too much emphasis on detection and response and inadvertently marginalized prevention.

eBPF – Who Watches the Watcher… and What is the Cost?
Discover eBPF's journey as a game-changer in Linux security and observability, shaping today's digital security landscape.

Open Source Software and the Terrible, Horrible, No Good, Very Bad Week
Uncover the critical details of CVE-2024-1086, a notable Linux kernel vulnerability with far-reaching security implications.