Attacking Containers and runC

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Tue, 12 Feb 2019 19:22:35 +0000

This week a new vulnerability was published (CVE-2019-5736) that highlights everything bad and good about containers. Simply put, this vulnerability can be exploited using an infected container to attack the host. It’s a real world example of a breakout attack that has long been a major concern in virtualized and container environment. Here, the attack…

The post Attacking Containers and runC appeared first on .

Read more

This Week in Security News: Cyber Leads and Email Frauds

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 15 Jun 2018 13:00:42 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, The Trump Administration added a cyber lead at Homeland Security and the Energy Department. Also, the FBI announced the arrest of 74 “email fraudsters” on Monday. Read…

The post This Week in Security News: Cyber Leads and Email Frauds appeared first on .

Read more

Securing Containers at Scale: Amazon EKS, Amazon ECS and Deep Security Smart Check

Credit to Author: Wendy Moore| Date: Wed, 13 Jun 2018 12:00:30 +0000

Containers present a new opportunity for teams. An opportunity to deploy faster, more consistently, and with a simplicity rarely seen. But in order to make that happen a lot of infrastructure needs to be setup ahead of time. A cluster of hosts for the container runtime, an orchestration layer, and—of course—security throughout. To simplify this…

The post Securing Containers at Scale: Amazon EKS, Amazon ECS and Deep Security Smart Check appeared first on .

Read more