Latest
Axios npm Supply Chain Attack: What You Need to Know
Analysis of the axios npm supply chain attack that dropped a cross-platform RAT via maintainer account compromise, with IOCs and defensive steps.
Salt Data Blog
Practical guides on IT infrastructure, cloud services, and technology from practitioners who solve these problems daily.
Latest
Analysis of the axios npm supply chain attack that dropped a cross-platform RAT via maintainer account compromise, with IOCs and defensive steps.
Every guide is written by practitioners who solve these problems daily, deploying infrastructure-critical software, setting up monitoring and backup systems, and managing compute, networking, and storage across client environments. We manage IT operations for growing businesses, and our articles are grounded in hands-on experience.
We publish independent reviews and reporting guided by transparent testing, clear disclosures, and strict separation from advertising or sponsorship influence. We do not sell coverage or outcomes. Review samples may be loaned, provided, or purchased, always disclosed, and never guarantee publication or positive results. We label affiliate links, manage conflicts of interest, and follow source-verification standards for news posts. If we make mistakes, we correct them quickly with visible update notes. Read our full editorial policy →
All Articles
Analysis of the TeamPCP supply chain attack on LiteLLM via compromised Trivy GitHub Actions, covering the 3-layer payload, IOCs, and defensive actions for MSPs.
Huntress deployed a conditional access policy across ITDR-protected tenants to block device code phishing from Railway infrastructure using AI-generated lures.
Our new guide compares in-house IT vs. outsourcing for Romanian SMBs with real costs, the invisible IT principle, and provider selection criteria.
A trailing space in a SQL Server database name can silently break VSS writer registration for every database. Here's how to find it, fix it, and prevent it.
Use Komodo's Resource Syncs for GitOps, Procedures for automated workflows, Builds for CI/CD pipelines, and the CLI for headless Docker management.
Analysis of the Fortinet 2025 Security Awareness and Training Report covering AI readiness gaps, training completion rates, and an action plan for MSP teams.
Analysis of the Huntress 2026 Cyber Threat Report covering identity compromise, RMM abuse, ClickFix loaders, ransomware timelines, and a 30-day action plan.
An open-source CLI tool that SSHs into multiple servers, discovers running Docker containers, and generates Mermaid diagrams or HTML tables for documentation.
Deploy Komodo Core with Docker Compose and install Periphery agents on remote servers to manage Docker containers, stacks, and builds from a single dashboard.
Deploy a complete self-hosted monitoring stack using Grafana, InfluxDB, and Telegraf with Docker Compose — from installation to your first dashboard.
A practical guide to installing Hudu with Docker Compose, maintaining it over time, and securely publishing it via Cloudflare Tunnel.
Step-by-step guide to building a reusable Proxmox VM template with Cloud-Init — from base Ubuntu setup and hardening to cloning production-ready VMs in seconds.
Set up SSH key-based login on Ubuntu, disable password authentication, and enable passwordless sudo — essential hardening for any server or VM template.
Introducing our new blog where we share technical insights, practical guides, and perspectives on IT infrastructure, cloud services, and managed solutions.