Cado Trend Micro Docker vulnerability

Cado Security Labs Exposes Commando Cat Container Malware Campaign

Cado Security Labs today disclosed it has discovered a malware campaign, dubbed “Commando Cat,” that targets Docker API endpoints ...
Cado VMware container security

Cado Security Labs Identifies Campaign to Compromise Docker Hosts

Cado Security identified an ongoing effort to abuse Docker containers using a 9hits service to create fraudulent web traffic ...
container vulnerability scanning

8 Tips for Successful Container Vulnerability Scanning

Container vulnerability scanning is a critical part of container security. It involves inspecting container images and their components to identify potential security issues, weaknesses or vulnerabilities. Containers are lightweight, portable units used ...
ARMO Employs eBPF to Identify Severe Kubernetes Vulnerabilities

ARMO Employs eBPF to Identify Severe Kubernetes Vulnerabilities

ARMO today announced it has added a capability to its Kubernetes security platform that makes it simpler to prioritize remediation of vulnerabilities based on their relevancy. Ben Hirschberg, ARMO CTO, says this ...
vulnerability

Kubernetes MiTM Vulnerability Underscores Need for Virtual Patching

CVE-2020-8554, a man-in-the-middle (MiTM) vulnerability affecting all Kubernetes versions, has begun drawing attention from the cloud-native community for its ability to allow authenticated-but-malicious users to remotely bypass security restrictions. This vulnerability is ...
cloud-native security Nutanix

Palo Alto Networks Digs Into Kubernetes Security Flaw

The Unit 42 research arm of Palo Alto Networks this week issued a security alert that warns a previously disclosed Kubernetes vulnerability may be more severe than initially appreciated. An issue known ...
LOKI CRD vulnerability

CRD Vulnerability Cause for Kubernetes Concern

A CRD vulnerability is the latest in a slew of security issues impacting Kubernetes A CVE-2019-11247 vulnerability disclosed this week that affects Kubernetes application programming interfaces (APIs)  highlights the need for organizations ...
Latest Container Vulnerabililty

Latest Container Vulnerabililty Creates Another Tempest in a Security Teapot

As containers grow in popularity, so, too, do security threats The disclosure this week of a vulnerability that could be employed by cybercriminals to overwrite the host runc binary to gain control ...
JFrog Shines Light on Container Issues

JFrog Shines Light on Container Issues

At the recent JFrog swampUp annual user conference JFrog expanded its DevOps ambitions into the realm of containers with tools that gives IT organizations visibility into both the container and the IT ...
Meet Clair, open source vulnerability analysis on containers

Meet Clair, open source vulnerability analysis on containers

DockerCon Barcelona has lots of buzz coming out of it and we will be covering all of the action here this week.  We wanted to lead off with a story that was ...