Linux Malware on the Rise
Ransomware, cryptojacking, and a cracked version of the penetration-testing tool Cobalt Strike have increasingly targeted Linux in multicloud infrastructure, report states.
Ransomware, cryptojacking, and a cracked version of the penetration-testing tool Cobalt Strike have increasingly targeted Linux in multicloud infrastructure, report states.
Hackers could exploit a Linux kernel bug to escape Kubernetes containers and access critical resources; however, the threat is minimized as any attacker needs to have the specific Linux capability CAP_SYS_ADMIN.
Infrastructure security is important to get right so that attacks can be prevented—or, in the case of a successful attack, damage can be minimized. It is especially important in a Kubernetes environment because, by default, a large number of Kubernetes configurations are not secure. Learn how to secure Kubernetes at the infrastructure level.
While it’s come a long way over the past year, Kubernetes security has not yet reached maturity. But judging from the level of investment in 2021 into technologies for securing Kubernetes — the now-dominant container orchestration platform — enterprises can expect major advancements in the area during the coming year.
Learn about nine great Docker alternatives for container management to consider using in your next project.
Linux and FreeBSD variants of the Hive ransomware have recently been discovered, demonstrating how threat actors are increasingly targeting other OSes besides Windows, and are looking to attack cloud apps.
Vulnerabilities in the life cycle of open-source software development can start from tiny crumbs but grow into substantial issues. This week’s KubeCon + CloudNativeCon North America in-person and virtual conference put security for open-source development back in the spotlight while also talking up cloud native’s rapid rise. Here are the highlights you should know about.
Linux is growing in popularity due to the impressive security, stability and flexibility of the OS, making it an increasingly attractive attack target. Learn about the top cloud security threats to your Linux system.
NSA/CISA Kubernetes hardening guidance offers a solid foundation for securing Kubernetes environments. Here are the key components and why they're important.
Container technology adoption has experienced a rapid upward surge over the past few years. But now that it has gained a serious foothold in the enterprise, questions are beginning to arise about container security. Perhaps the fundamental question is, just how secure are containers?
Hardening guidance from the NSA and CISA seeks to educate IT administrators about cloud security risks and best practices for implementing and maintaining Kubernetes.
Both public cloud and Open Source adoption has grown exponentially in recent years. What can we expect as we move towards the second half of 2021?
Aqua Security's Cloud Native Threats report reveals that 50% of new Docker instances are attacked within 56 minutes, among other key findings.
Widespread adoption of containerization and DevOps has introduced new cyber risks, but organizations are showing signs of maturing and adapting to the challenges of these dynamic modern environments.
Ubuntu Pro - the premium version of Ubuntu - is now available for Google Cloud users looking for a secure DevOps environment with bug patches and updates guaranteed for 10 years.
Microsoft has bought Flatcar Linux distro maker Kinvolk to boost its Azure cloud services. Kinvolk specializes in software container environments on Azure and other public clouds, and its Flatcar dristro packs multiple optimizations for running containerized applications, which can be run unchanged in across multiple computing environments.
Looking for a versatile virtual Linux desktop or server host? Shells makes using Linux in the cloud incredibly easy.
How much do you know about cloud security? Companies that move to the cloud have to assume new responsibilities, develop new skill sets and implement new processes. The first step to better cloud security is to assume you have no security. Learn more in a great CSO article:
Very few companies are securing the majority of their cloud-native apps with DevSecOps practices, according to new research. Get the details:
Cloud computing has the potential to greatly improve an organization's security posture; however, many companies have the tendency to become overly-reliant on cloud computing services like Amazon Web Services to oversee all aspects of security, instead of taking full responsibility for their data security. Learn more: