Topics

CrowdStrike Details LemonDuck Cryptojacking Container Attack Campaign
CrowdStrike has published an alert detailing an active campaign that uses compromised containers to mine for cryptocurrency on Linux platforms launched via a botnet known as LemonDuck. LemonDuck is a cryptomining botnet ...

Chainguard Launches Platform to Enforce Secure Containers
Chainguard today launched a platform that ensures only trusted container images are run on Kubernetes clusters to ensure the integrity of a software supply chain. Chainguard Enforce! is the first product from ...

Google Petitions to Donate Istio Service Mesh to CNCF
Google and the Istio Steering Committee today announced at an IstioCon 22 event that they have submitted the open source Istio service mesh for consideration to become an incubating project administered by ...

Report Surfaces Scope of Overspending in the Cloud
A report published today by CAST AI, a provider of a platform for optimizing cloud costs using machine learning algorithms for Kubernetes environments, finds that on average organizations are spending three times ...

Canonical Expands Ubuntu Container Image Portfolio
As part of an update to its Ubuntu operating system, Canonical has added Grafana Loki, Apache Kafka and Apache Cassandra container images to the portfolio of images to which it provides long-term ...

WSO2 Unfurls Choreo Integration Service for Cloud-Native APIs
WSO2 has made generally available Choreo, a cloud service for integrating cloud-native microservices based on Kubernetes, Docker containers and Envoy proxy software. Asanka Abeysinghe, chief technology evangelist for WSO2, notes that IT organizations ...

VMware Updates Tanzu Platform to Ease K8s App Deployments
VMware has made generally available an update to its Tanzu Application Platform that makes it simpler to deploy and manage application workloads across multiple Kubernetes clusters. In addition, VMware includes support for ...

5 Best Practices for Cloud-Native Permissions
Cloud-native/microservices-based products are complex, and so is building access control and managing permissions for these products. And it’s only getting worse with each pull request. Most developers end up building authorization or ...

Outwitting the New CRI-O Vulnerability
If you’re a CRI-O user, there’s a newly discovered vulnerability that could affect you. It’s called CVE-2022-0811 and it was discovered by CrowdStrike cloud security researchers. While it can’t be exploited by ...

Spot Check: Guide to K8s Spot Node Savings
Hesitant about introducing spot nodes into your Kubernetes clusters? You’re not alone. Despite their bargain value, the fact that spot nodes offer no availability guarantees can make leveraging them feel like a ...