Microsoft had bundled its next generation antivirus software in the Windows 10 Fall Creators’ update, bringing more enhancement to the Windows Defender Advanced Threat Protection by moving it up from isolated defenses to a smart, interconnected, and coordinated defense grid that is intelligent, simple to manage, and ever evolving.

Now, Microsoft has extended the Windows Defender anti-malware system to Apple macOS, which expansion reflects its growing cross-platform nature; while the application suite has been renamed as Microsoft Defender ATP, with the designated labels "Defender for Mac" or "Defender for Windows" for individual clients.

The Defender for Mac will focus more on signature-based malware detection as a start, albeit the Defender ATP for Windows track various system behaviors and report to the ATP cloud service, which helps to detect threats even without any piece of malware detected.

While the macOS malware issue has become commonplace, with ransomware running rampage on the platform in 2016, and other malicious attacks for which Apple was forced to integrated some malware protection into macOS, but that has not guaranteed maximum protection for Mac users.

And this unfortunate situation has seriously impacted the corporate usage of the product; while Microsoft Windows has a good range of security tools that ensure the systems are secure and kept up-to-date, even alert administrators if there is any cause for alarm, but no such security system for the Apple ecosystem.

The new software suite is currently available as a preview for limited Mac devices running macOS High Sierra and above, with users needing to apply to the program to use it, whereby Microsoft will contact those users via email once their applications are approved.

Microsoft also promised to bring the unified security solutions to other “platforms” which perhaps, may suggest that the Defender Advanced Threat Protection (ATP) will soon be available for Linux devices as well.

Microsoft extends Defender Advanced Threat Protection (ATP) to Apple Mac



Tekton, is Google's new open-source project that offers a Kubernetes-native framework for building CI/CD systems that's fully capable of running anywhere Kubernetes can, and also work with any existing CI/CD servers.

While Kubernetes serves as a hedge against cloud lock-in, the new project features a shared building blocks for creating cloud-native CI/CD pipelines, whereby developers can easily build and deploy software across multi-clouds or for on-premise systems.

Tekton will enable developers to deploy immutable images, and have control on different infrastructure, with components provided to standardize CI/CD tools across different languages and environments. And the components are able to work with CI/CD tools like Knative, Skaffold, Jenkins and Jenkins X, while leveraging Kubernetes and the cloud for CI/CD, and providing automation pipeline.

It also work well with Google Cloud Platform with Kubernetes tools, which can be deployed to Google Kubernetes Engine and supporting artifact storage and Google Container Registry.

Additionally, Tekton can be deployed across different environments such as serverless platforms, VMs or Firebase. With key capabilities including: Pipelines running on the Kubernetes container orchestration platform, allowing developers to combine containers to form complex pipelines.

And also leveraging containers as building blocks, through Tekton Pipelines, with Kubernetes clusters as a first-class type with the Tekton Pipeline.

Tekton toolkit offers Kubernetes-native framework for building CI/CD systems



Google has announced the public availability of Sandboxed API, for easy sandboxing of C and C++ libraries and creating secure and reusable implementations of functionality residing within other popular libraries.

While it is pretty common for applications to be affected by different types of vulnerabilities that could be exploited for remote code execution, sandboxing is a technique that helps to mitigate those problems, by isolation the app processes employed by software developers.

Albeit, the tasks of sandboxing are often very demanding, therefore the open-sourcing of the Sandboxed API by Google will makes it relatively easier to create security policies for individual software libraries, and offer granular protection for reusable software infrastructure.

The API can also separate the library to be sandboxed from a high-level perspective, with callers into two separate processes: the sandboxee and the host binary. And actual library calls marshalled by an API object from the host side and forwarded via inter-process communication to the sandboxee whereby an RPC stub unmarshals and send calls to original library.

It is currently implemented for software libraries written in the C programming language (C bindings), though Google has promised adding support for more programming runtimes in the near future.

Additionally, Google is making publicly available the core sandboxing project, Sandbox2, which is now part of Sandboxed API as the underlying sandboxing primitives. But it can also be used as standalone to isolate arbitrary Linux processes, which is considered a lower-level API.

Google Open Sources Tool for Securing C and C++ Software Libraries, Sandboxed API



Slack, the popular collaboration software has made it possible for enterprise customers to have more control over their sensitive data, including: email messages, business files and team chats, with the release of enterprise key management (EKM).

The EKM feature is available for all customers of Enterprise Grid, which product is targeted at large organizations, to give those businesses more control over the keys used to encrypt/decrypt data in the collaboration application.

It will avail businesses the means to better secure their most sensitive data, and perhaps open up the door for new entrants like banking and financial services to embrace the team collaboration software.

Cisco is perhaps the only team collaboration software vendor to provide customers with encryption/decryption keys, but with Slack’s EKM, IT administrators now have the ability to revoke access to data within a Slack channel, instead of total disruption of access for all users on the platform.

While Slack do encrypt data in transit and at rest, the company does not yet have plans of bringing end-to-end encryption to its service, which rivals like Cisco Webex Teams and Symphony do provide.

Slack is hoping to appeal more to its Enterprise Grid customers, with about 150 businesses already using the service, including 21st Century Fox and Capital One.

Slack's Enterprise key Management to give businesses more control over sensitive data



The Windows Defender Application Guard was formerly released explicitly for the Microsoft Edge browser, and works by isolating the contents of a tab in the browser from the rest of the system.

Just like sandboxing, it blocks websites and downloaded files from accessing the system, thus prevents malware in the virtualized “container” access to the user’s confidential information, making it also impossible to access data or connect with other systems on a network.

And as the tab is closed on shutting down the browser, or on logging out of the PC, any malware that managed to get into the container is tossed away.

Microsoft extended the Windows Defender Application Guard functionality to Chrome and Firefox browsers via an extension, alongside the announcement of Windows 10 Insider Preview build 18358.

The extension works the same way as in Edge browser, by crosschecking entered URL against a list of trusted websites, which when found an untrusted site, will open in a sandboxed tab, from there then navigate to the website, so as to protect your system.

While the anti-malware technology had undergone some major testing under Windows Insiders running Windows 10 Enterprise, this is the first availability outside the Microsoft Edge browser.

Albeit, the extension is currently available to Windows Insiders, but will be publicly available to use on Windows 10 version 1803 or higher when it's official released, though it may require Windows 10 Pro or Enterprise edition.

Microsoft extends Windows Defender Application Guard to Chrome and Firefox browsers



The general-purpose C++ development environment, CIDLib is now open to the public, with the lighter use of C++/STL libraries templates as its advantage over what's been commonplace, making it easy to debug, been based on a virtual kernel.

While CDLib is currently available only for Window, based on a virtual kernel that abstracts from the operating system and a Linux implementation developed years ago still requiring some more update to be fully functional today.

CIDLib employ some third-party code, which includes the Scintilla engine as the CML language source editor and also parts of the standard JPEG libraries that provide support for the JPEG file format.

It served as a foundation for the Charmed Quark Controller (CQC), a supposedly proprietary home automation platform for years, and the environment has got a pretty matured code base.

Additionally, CIDLib has about 1,100 classes and functionality which includes: serving as build tools for project definition system, resource compiler, and loadable text system. It also provides an embeddable, virtual machine-based language called CML and IDE for CML editing and debugging, coupled with virtual kernel platform portability layer.

Some other planned features under consideration include support for 3D graphics, more efficient internet telephony, and custom public cryptography system.

The general-purpose C++ Development Environment, CIDLib is now open source



DuckDuckGo (DDG) is a search engine, but unlike Google, it strongly emphasizes on protecting the privacy of its users by avoiding the filter bubble of personalized results, and subsequently, targeted advertising.

While Google is notorious for profiling and tracking users behavior online, DDG distinguishes itself by not profiling its users and sticking to the same search results for every given keyword search, and most probably returning the best accurate results, rather than results generated from individual preferences.

The source code is open sourced and hosted at GitHub under the Apache 2.0 License, though the core is proprietary. It sources its results from over 400 sources, including Yahoo! Search BOSS, Bing, and its own Web crawler (the DuckDuckBot); also uses data from crowd-sourced sites, including Wikipedia, to populate "Zero-click Info" boxes, usually above the results that display topic summaries and related topics.

DuckDuckGo has been growing steadily since launched in 2008, and has taken outside investment to scale its efforts to capitalize on growing international reach for its pro-privacy products, which Google has recently recognized the importance of offering consumers a private search option, by adding DuckDuckGo in the Chrome 73 available search engines for over 59 countries.

Google had quietly updated the lists of default search engines available per region on Chrome browser, while expanding the choice of search product users can select from the different markets around the world.

Again, the area of privacy is the big feature that DuckDuckGo sells itself on: As it doesn't log what you're searching for, and will only put up occasional advertising, which isn't personalized at all, and you can easily disable it.

What's more, even the sites you visited know nothing about the search terms you used to find them, and that's something other search engines do, while piecing together different clues from your browsing behavior and the data that your computer broadcasts publicly to sell their ads.

Additionally, DuckDuckGo runs the encrypted versions of a site by default. If you're among those of us who are tired of the big tech companies hoovering up data on us, DuckDuckGo will surely appeal to you.

DuckDuckGo: Get to know the fast rising Privacy-focused Search Engine



Google has released Chrome 73 for Windows, Mac, and Linux, with the most noticeable feature coming in the form of dark mode for macOS, which change appears in the Omnibar, Chrome’s tabs, the three dots overflow menu and the bookmarks row.

While users previously can download dark mode themes through the Chrome store to implement a DIY dark mode, but with this latest update it will now work without the help of any third-party theme, as the new feature automatically turn Chrome browser to dark mode if you enable it in the Mac settings.

The dark mode is akin to Chrome’s incognito mode, but the only difference is that no incognito icon appears on the top right corner, coupled with the fact that no protection from tracking in any sense and logs are kept as per Chrome normal workings.

How to Enable Chrome Dark Mode on Mac



If you wish to enable dark mode on your Mac, simply go to System Preferences, then select General, from there select Dark at the Appearance option, and Chrome will turn into dark mode.



You can also choose to browse the internet in dark mode on Chrome while keeping the macOS Mojave’s own dark mode, by simply using Chrome themes to switch over.

Google Chrome by default doesn’t offer any settings to show on the night mode in the browser itself, before now. And as a consequence, many users had resorted to Google Chrome extension for turning on the dark mode in the browser. The dark mode is most often suitable for night browsing, and you could as well use night time mode in Chrome with the help of Hacker imaginative and prescient extensions.

You can follow the steps given below to add the extension for turning on the night mode. Step 1: From the Chrome store, search for “Hacker vision” extension. Step 2: Click on “Add to Chrome”. Step3: Enter the info when asked with the aid of the extension and provide the necessary permissions. That's it.

Google had promised that “Windows support is on the way”, so you can use the above methods if you wish to use dark mode on Windows.

How to Enable Dark Mode on Chrome browser For Apple Mac Computer



Quarkus is an open source framework developed by Red Hat that uses a unification of reactive and imperative model programming to solve the issue of distributed application architectures such as serverless and microservices. It is aimed at a container-first, cloud-native world, as Java development can be a challenge in such serverless environment.

The framework as Kubernetes Native is tailored for GraalVM and HotSpot, developed from the best-of-Java libraries and standards, with the goal of making Java a leading platform in Kubernetes and serverless environments and to offer developers a unified programming model for distributed application architectures.

While most Java developers are used to the imperative programming model, but developers are increasingly adopting to cloud native, event-driven, asynchronous, and reactive model to address business requirements in building highly concurrent and responsive applications.

Quarkus is built to seamlessly bring the two programming models together in a platform, resulting in strong leverage within an organization for significant runtime efficiencies.

It compiles to a native binary running on Oracle’s GraalVM virtual machine, with applications able to run with significantly less RAM and startup time quicker than traditional apps running on the JVM, which better fits serverless deployment. Albeit, Quarkus requires a Java IDE, JDK 8 or later, Apache Maven 3.5.3 or later, and GraalVM for native applications.

Red Hat, however claims that the code is streamlined for 80 percent common usages, with flexibility for the other 20 percent of cases; it employ libraries such as Eclipse MicroProfile and Vert.x, JAX_RS/RestEasy, JPA/Hibernate and Netty, with an extension for third-party frameworks.

Quarkus will serve as an effective solution for running Java in the world of Kubernetes, serverless, microservices, containers, FaaS, and the cloud, haven been designed for these environments from the ground up!

Red Hat’s Quarkus framework aims at Java optimization for distributed Application architectures



Alphabet, the parent company of Google through its cybersecurity outfit, Chronicle, has debuted a new threat analysis tool called Backstory with the aim of salvaging business threats in replication of Google’s own threat detection infrastructure.

Backstory is a cloud-based enterprise-grade threat analytics tool designed to help businesses to investigate cyber incidents quickly, and pinpoint the vulnerabilities for potential fixes.

According to Chronicle co-founder Mike Wiacek, Backstory will thwart the ability of attackers to hide behind the statute of technical limitations, as it offers the solution to store, index, and search unlimited security telemetry.

It tend to solve the telemetry problem by allowing organizations to upload and store their internal security telemetry on Google Cloud and also leverage its machine learning and analytics technologies to monitor and analyze any potential threat.

Due to the high cost of storing traffic data, most of Backstory’s competitors tend to retain but a few weeks of traffic, and most often, critical in detection and stopping of breaches.

Backstory, on the other hand is able to store and surface even years-old data, and akin to SIEM solutions, it converts logs such as: NetFlow, DNS traffic, endpoint logs, proxy logs, into searchable and actionable information to help businesses gain more insights into cyber threats and attacks on their networks.

Additionally, Backstory compares data against "threat intelligence" signals culled from a variety of other sources, including the Alphabet-owned VirusTotal, Proofpoint, Avast and Carbon Black.

Chronicle is currently working with clientele which includes Quanta Services, Siemens, Paccar, and Oscar Insurance, among others.

Alphabet debuts Backstory, a new Threat analysis tool for Businesses