Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

Containers (Cloud Computing)

Cloud Native Security Hasn’t Solved Compliance Challenges

17 May 2022

Modern, cloud-based, distributed networks may lack a defined perimeter to protect, but they still need network security. And nearly all …

Tags Challenges, Compliance, Containers, Containers (Cloud Computing), Infrastructure Development

OAuth Security in a Cloud Native World

16 May 2022

These days most software companies use cloud deployment with modern hosting capabilities that make everyone productive, from developers to …

Tags Containers, Containers (Cloud Computing), OAuth, Sponsored, World

How to use new Amazon GuardDuty EKS Protection findings

6 May 2022

If you run container workloads that use Amazon Elastic Kubernetes Service (Amazon EKS), Amazon GuardDuty now has added support that will …

Tags Containers, Containers (Cloud Computing), EKS, How, Protection

Deep Dive: Protecting Against Container Threats in the Cloud

2 May 2022

Containers are self-contained pods representing complete, portable application environments. They contain everything an application needs …

Tags Cloud, Cloud Computing, Cloud Security, Containers, Containers (Cloud Computing)

Bug in the Linux Kernel Allows Privilege Escalation, Container Escape

8 March 2022

A missing check allows unprivileged attackers to escape containers and execute arbitrary commands in the …

Tags Bug, Cloud Computing, Cloud Security, Containers, Containers (Cloud Computing)

Article: Is Docker Secure Enough?

23 February 2022

Docker is a platform most developers are now familiar with. It makes it easier to create, deploy and run your applications in packages …

Tags Application Security, Articles, Cloud Computing, Cloud Security, Containers (Cloud Computing)

Control access to Amazon Elastic Container Service resources by using ABAC policies

17 February 2022

As an AWS customer, if you use multiple Amazon Elastic Container Service (Amazon ECS) services/tasks to achieve better isolation, you often …

Tags Amazon ECS, Containers, Containers (Cloud Computing), Services, Tags

Tigera Tightens Cloud Native Container Security

15 February 2022

Tigera claims you can catnap about your container security with its new cloud native application protection platform (CNAPP) for its Calico …

Tags Cloud Computing, Containers, Containers (Cloud Computing), IT, Tigera

Report Finds 75% of Cloud Runtimes Contain High or Critical Vulnerabilities

15 February 2022

Sysdig’s latest cloud-native and security-usage report finds that shipping containers with vulnerabilities has become standard practice – …

Tags Cloud Computing, Cloud Security, Containers, Containers (Cloud Computing), Critical

Runtime Security Project Falco Adds Extensible Plugin Framework

8 February 2022

Falco, a cloud-native runtime security project, has released version 0.31.0. This release introduces a new plugin system for defining …

Tags AWS CloudTrail, Cloud Computing, Cloud Security, Containers, Containers (Cloud Computing)

Palo Alto Networks on the State of Cloud Native Security

20 January 2022

The single biggest factor in the cloud and its security, though, was beyond the control of any technology company. According to PANW, the …

Tags Cloud Computing, Cloud-Native, Containers, Containers (Cloud Computing), States

What Does 2022 Have in Store for Cybersecurity and Cloud Security Specialists?

5 January 2022

Cloud adoption and industry transformation are accelerating as the world looks for efficiency. Let’s face it, 2022 promises to be another …

Tags Containers, Containers (Cloud Computing), Google, kubernetes, Open Source

Cryptomining Attack Exploits Docker API Misconfiguration Since 2019

29 December 2021

Hackers behind a cryptomining campaign have managed to avoid detection since 2019. The attacks exploited misconfigured Docker APIs that …

Tags Attacks, Cloud Computing, Cloud Security, Containers, Containers (Cloud Computing)

Continuous runtime security monitoring with AWS Security Hub and Falco

17 December 2021

Customers want a single and comprehensive view of the security posture of their workloads. Runtime security event monitoring is important …

Tags Amazon ECS, Amazon EKS, Best Practices, Containers, Containers (Cloud Computing)
Post navigation
Older posts
Page1 Page2 … Page20 Next →
Cookie-Free

NVD

  • CVE-2022-1886 – Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. …26 May 2022
  • CVE-2022-29682 – CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerabili …26 May 2022
  • CVE-2022-20809 – Multiple vulnerabilities in the API and web-based management interfaces of Cisco Expresswa …26 May 2022
  • CVE-2022-29683 – CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerabili …26 May 2022
  • CVE-2022-20821 – A vulnerability in the health check RPM of Cisco IOS XR Software could allow an unauthenti …26 May 2022
  • CVE-2022-29684 – CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerabili …26 May 2022

EXPLOITS

  • qdPM 9.1 – Remote Code Execution (RCE) (Authenticated) (v2)26 May 2022
  • m1k1o’s Blog v.10 – Remote Code Execution (RCE) (Authenticated)23 May 2022
  • OpenCart v3.x Newsletter Module – Blind SQLi23 May 2022
  • Showdoc 2.10.3 – Stored Cross-Site Scripting (XSS)17 May 2022
  • SolarView Compact 6.0 – OS Command Injection17 May 2022
  • T-Soft E-Commerce 4 – SQLi (Authenticated)17 May 2022

SECURELIST

  • Managed detection and response in 202126 May 2022
  • The Verizon 2022 DBIR25 May 2022
  • What’s wrong with automotive mobile apps?25 May 2022
  • ISaPWN – research on the security of ISaGRAF Runtime23 May 2022
  • Evaluation of cyber activities and the threat landscape in Ukraine17 May 2022
  • HTML attachments in phishing e-mails16 May 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »