Wednesday, October 22, 2025
Cloud Native Now

Cloud Native Now


MENUMENU
  • Home
  • Webinars
    • Upcoming
    • Calendar View
    • On-Demand
  • Podcasts
    • Cloud Native Now Podcast
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
  • About
  • Sponsor
MENUMENU
  • News
    • Latest News
    • News Releases
  • Cloud-Native Development
  • Cloud-Native Platforms
  • Cloud-Native Networking
  • Cloud-Native Security

malware

Docker Hub, container images, Ensuring Container Security

Best of 2024: JFrog Reveals Docker Hub Compromise Spanning Millions of Repositories

Malware attacks against millions of Docker Hub repositories have been underway since 2021. Assume all the content you host on a publicly accessible repository might be compromised ...
Mike Vizard | December 23, 2024 | docker, docker hub, JFrog, malware, malware campaign
Docker Hub, container images, Ensuring Container Security

JFrog Reveals Docker Hub Compromise Spanning Millions of Repositories

Malware attacks against millions of Docker Hub repositories have been underway since 2021. Assume all the content you host on a publicly accessible repository might be compromised ...
Mike Vizard | April 30, 2024 | docker, docker hub, JFrog, malware, malware campaign
Cado Trend Micro Docker vulnerability

Cado Security Labs Exposes Commando Cat Container Malware Campaign

Cado Security Labs today disclosed it has discovered a malware campaign, dubbed “Commando Cat,” that targets Docker API endpoints ...
Mike Vizard | February 1, 2024 | Cado Security, Commando Cat, docker, malware, vulnerability
Cado Security Labs Identifies Campaign to Compromise Docker Hosts

Cado Security Labs Identifies Campaign to Compromise Docker Hosts

Cado Security identified an ongoing effort to abuse Docker containers using a 9hits service to create fraudulent web traffic ...
Mike Vizard | January 18, 2024 | Cado Security, container security, cryptomining, docker, malware, vulnerability
Deepfence cloud-native SQL Server security Kubernetes

Deepfence Expands Scope of Open Source Container Security Platform

Deepfence today announced it has updated its open source ThreatMapper project to add expanded visualizations of attack paths and a scanner based on the YARA tool many security researchers use to identify ...
Mike Vizard | August 10, 2022 | cloud-native applications, Deepfence, malware, open source
Lacework Red Hat Aqua Security

Lacework Labs Finds Backdoors in Container Images

Cloud security platform provider Lacework this week published a report that reveals cybercriminals are now creating backdoors in legitimate container images. Lacework Labs reports it has discovered that a threat actor, dubbed ...
Mike Vizard | September 3, 2021 | backdoors, container security, Lacework, malware
container vulnerabilities

Report: Docker Hub Container Vulnerabilities High

Prevasio, a provider of a cloud service for scanning container images, this week released a report based on a scan of 4 million public container images found in Docker Hub that concludes ...
Mike Vizard | December 3, 2020 | container images, container security, containers, malware, vulnerabilities
container vulnerabilities

Protecting Containers Against ‘Doki’ Malware

Security researchers at Intezer recently alerted the enterprise security community about Doki, a new and substantial malware targeting public Docker environments. Downloaded and installed via a Linux backdoor, Doki uses Dyn’s DynDNS ...
Fei Huang | August 24, 2020 | container security, Docker containers, malware
cryptojacking Docker Hub

Docker Hub Distributing Cryptomining Malware?

A pair of cybersecurity reports published this week suggests the level of cryptomining malware lurking in the Docker Hub repository is potentially greater than most IT teams realize. Aqua Security, a provider ...
Mike Vizard | June 26, 2020 | container images, container security, cryptomining, docker hub, malware
RunC Bug Highlights Docker Security Challenges, But It's Not Fatal

RunC Bug Highlights Docker Security Challenges, But It’s Not Fatal

It’s a Docker admin’s worst nightmare: An attacker compromises a container, then uses it to gain control of the entire host server. A newly discovered security vulnerability in runC enables just that ...
Christopher Tozzi | January 20, 2017 | bug, container security, docker, docker security, malware, runC, security
  • 1
  • 2
  • ›
Loading...

Techstrong TV

Click full-screen to enable volume control
Watch latest episodes and shows

Tech Field Day Events

UPCOMING WEBINARS

  • CloudNativeNow.com
  • Error
  • SecurityBoulevard.com
How Experts Accelerate Delivery and Eliminate Test Environment Challenges
4 November 2025
How Experts Accelerate Delivery and Eliminate Test Environment Challenges
Big Risks, Engineering Bottlenecks, and AI
23 October 2025
Big Risks, Engineering Bottlenecks, and AI

RSS Error: A feed could not be found at `https://devops.com/webinars/feed/`; the status code is `403` and content-type is `text/html; charset=UTF-8`

Accelerate & Secure: Optimizing Your Software Supply Chain with DevSecOps
18 November 2025
Accelerate & Secure: Optimizing Your Software Supply Chain with DevSecOps
Double Your Ransoms, Not Your Costs: Scaling Your Gang with AI
18 November 2025
Double Your Ransoms, Not Your Costs: Scaling Your Gang with AI
Prioritizing Digital Executive Protection to Manage Corporate Risk
13 November 2025
Prioritizing Digital Executive Protection to Manage Corporate Risk

Podcast


Listen to all of our podcasts

Press Releases

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

ThreatHunter.ai Halts Hundreds of Attacks in the past 48 hours: Combating Ransomware and Nation-State Cyber Threats Head-On

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

Deloitte Partners with Memcyco to Combat ATO and Other Online Attacks with Real-Time Digital Impersonation Protection Solutions

SUBSCRIBE TO CNN NEWSLETTER

MOST READ

LLMs & Kubernetes Configuration: Automating Hardening, Drift Detection and Policy Enforcement

October 2, 2025

Runtime Visibility & AI-powered Security in Cloud-Native Environments

October 6, 2025

Service Mesh Evolution: Ambient Mode, Gateways & The Return of Simpler Architectures

October 1, 2025

Bridging Observability & Security in Kubernetes: Beyond Just Metrics

September 29, 2025

CNCF, Docker Partnership Streamlines Container Security, Operations 

September 25, 2025

RECENT POSTS

The Evolution of Container Security: From Reactive Fixes to Proactive Defense
Contributed Content Kubernetes Security Social - Facebook Social - LinkedIn Social - X 

The Evolution of Container Security: From Reactive Fixes to Proactive Defense

October 22, 2025 Dmitry Chuyko 0
How Distroless Containers Defend Against npm Malware Attacks 
Cloud-Native Security Contributed Content KubeCon + CloudNativeCon NA 2025 KubeCon + CloudNativeCon North America KubeCon + CloudNativeCon North America 2025 Social - Facebook Social - LinkedIn Social - X Topics 

How Distroless Containers Defend Against npm Malware Attacks 

October 22, 2025 Dhanush V M 0
Why Traditional Kubernetes Security Falls Short for AI Workloads
Contributed Content KubeCon + CloudNativeCon NA 2025 KubeCon + CloudNativeCon North America 2025 Kubernetes Social - Facebook Social - LinkedIn Social - X Topics 

Why Traditional Kubernetes Security Falls Short for AI Workloads

October 22, 2025 Ratan Tipirneni 0
Tools and Workflows for Kubernetes in CI/CD
Contributed Content Kubernetes Social - Facebook Social - LinkedIn Social - X Topics 

Tools and Workflows for Kubernetes in CI/CD

October 22, 2025 Mariusz Michalowski 0
When “Healthy” Isn’t Healthy: Rethinking Kubernetes Health Checks for Real-World Systems 
Contributed Content KubeCon + CloudNativeCon NA 2025 KubeCon + CloudNativeCon North America 2025 Kubernetes Social - Facebook Social - LinkedIn Social - X 

When “Healthy” Isn’t Healthy: Rethinking Kubernetes Health Checks for Real-World Systems 

October 22, 2025 Nick Taylor 0
  • About
  • Media Kit
  • Sponsor Info
  • Write for Cloud Native Now
  • Copyright
  • TOS
  • Privacy Policy
Powered by Techstrong Group
Copyright © 2025 Techstrong Group, Inc. All rights reserved.
×