Security News
Here’s an overview of some of last week’s most interesting news, reviews and articles: “Smart city” governments should also be smart about security While the definition of “smart city” is still...
Security researchers have discovered a cryptojacking worm that propagates using containers in the Docker Engine (Community Edition) and has spread to more than 2,000 vulnerable Docker hosts. “The...
Palo Alto Networks’ security researchers have identified what appears to be the first crypto-jacking worm that spreads using Docker containers. read more
A worm with a randomized propagation method is spreading via the popular container technology.
Make sure you're not deploying containers based on vulnerable images by scanning those images with Harbor.
MacStadium, the leading provider of enterprise-class cloud solutions for Apple Mac infrastructure, announced ‘Orka’ (Orchestration with Kubernetes on Apple), a new virtualization layer for Mac...
If you deploy Docker containers based on an official imagine, you might want to set a root password for heightened security.
Make sure you're only pulling down signed Docker images with Content Trust enabled.
An analysis of the 1,000 most popular Docker containers uncovered a variety of security vulnerabilities, some of which are critical.
In this webinar, Ethan Hansen, Security Analyst for Threat Stack’s Cloud Security Operations Program, will discuss recently observed Docker exploit attempts from the field, where attackers were...