Palo Alto Networks Details Exploit of Microsoft ACI Service

Palo Alto Networks Details Exploit of Microsoft ACI Service

The Unit 42 research arm of Palo Alto Networks has revealed how it discovered vulnerabilities in the multitenant Kubernetes clusters hosted on the Azure Container Instances (ACI) cloud service provided by Microsoft ...
Docker, secrets, gitguardian Thycotic Kubernetes secrets

GitGuardian Investigation Finds Secrets in Docker Images

A report published by GitGuardian, a provider of security tools for scanning Git repositories, finds that out of 2,000 images pushed to Docker Hub, a total of 7% contained at least one ...
ZTA trust authentication service mesh

Using Service Mesh to Enable Zero-Trust Architecture (ZTA)

Cybersecurity is not only a threat to private enterprises, it’s a national government priority, too. A 2021 presidential executive order names zero-trust architecture (ZTA) as part of new cybersecurity initiatives across government ...
Lacework Red Hat Aqua Security

Lacework Labs Finds Backdoors in Container Images

Cloud security platform provider Lacework this week published a report that reveals cybercriminals are now creating backdoors in legitimate container images. Lacework Labs reports it has discovered that a threat actor, dubbed ...
Docker, Trend Micro, SIEM attack Aqua Security CyberArk pen testing Accurics

Aqua Security Report Finds Malicious Images on DockerHub

Aqua Security has published a report that identifies five malicious Docker images that have collectively been pulled more than 130,000 times from the Docker Hub repository. The images hijack organizations’ resources to ...
Canonical VMware DoD AWS Finch CRI-O container containers

Container Isolation is not Safety

Container technology has seen a sharp rise in adoption in many organizations’ IT workloads in recent years. The unprecedented ability to support fast, resilient and scalable software is now well acknowledged. However, ...
security IaC containers secure

The Last Cloud-Native Puzzle Piece: Security Automation

In recent years, DevOps has embraced automation in this new cloud-native world. Infrastructure-as-code (IaC) is now commonly applied to spin up servers, automate configurations, set up storage and apply standard networking features ...
kubernetes

ARMO Tool Determines Security Posture of Kubernetes Clusters

ARMO has made available a Kubescape tool for testing whether Kubernetes clusters have been deployed securely. The Kubescape tool uses guidance for hardening the platform provided by the National Security Agency (NSA) ...
Apache Spark Grafana eBPF CNI OpenELB Anchore Grype API NetApp Spot

Anchore Delivers Container Security Integration for GitLab

Anchore has made its open source Grype vulnerability scanner tool for containers generally available for DevOps teams that are running the latest version of the GitLab continuous integration/continuous delivery (CI/CD) platform. Anchore ...
state, stateless, kubernetes, scanning, cloudsmith, stateless ephemeral stateful security Kubernetes unikernel Sumo Logic

The Time for Unikernels is Now

In this episode of The View With Vizard, NanoVM CEO Ian Eyberg explains why the time to employ unikernels to make IT more secure has arrived. The video is below, followed by ...