Enhanced Linux and container security for Sophos Intercept X for Server

Credit to Author: Rich Beckett| Date: Thu, 14 Apr 2022 12:53:35 +0000

We are pleased to announce that Intercept X Advanced for Server with XDR now includes enhanced visibility for Linux hosts and container workloads. The new functionality is available for all Intercept X Advanced for Server with XDR and Server MTR customers at no additional cost. Included as part of the Sophos XDR Detections dashboard, the […]

Read more

Explained: What is containerization?

Credit to Author: Pieter Arntz| Date: Wed, 04 Dec 2019 17:00:00 +0000

Containerization is gaining traction as a method to improve consistency, portability, and scalability without the investments required for virtualization. But is it secure?

Categories:

Tags:

(Read more…)

The post Explained: What is containerization? appeared first on Malwarebytes Labs.

Read more

Attacking Containers and runC

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Tue, 12 Feb 2019 19:22:35 +0000

This week a new vulnerability was published (CVE-2019-5736) that highlights everything bad and good about containers. Simply put, this vulnerability can be exploited using an infected container to attack the host. It’s a real world example of a breakout attack that has long been a major concern in virtualized and container environment. Here, the attack…

The post Attacking Containers and runC appeared first on .

Read more

This Week in Security News: Cyber Leads and Email Frauds

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 15 Jun 2018 13:00:42 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, The Trump Administration added a cyber lead at Homeland Security and the Energy Department. Also, the FBI announced the arrest of 74 “email fraudsters” on Monday. Read…

The post This Week in Security News: Cyber Leads and Email Frauds appeared first on .

Read more

Securing Containers at Scale: Amazon EKS, Amazon ECS and Deep Security Smart Check

Credit to Author: Wendy Moore| Date: Wed, 13 Jun 2018 12:00:30 +0000

Containers present a new opportunity for teams. An opportunity to deploy faster, more consistently, and with a simplicity rarely seen. But in order to make that happen a lot of infrastructure needs to be setup ahead of time. A cluster of hosts for the container runtime, an orchestration layer, and—of course—security throughout. To simplify this…

The post Securing Containers at Scale: Amazon EKS, Amazon ECS and Deep Security Smart Check appeared first on .

Read more