Please turn on your JavaScript for this page to function normally.
wireless router
New SOHO router malware aims for cloud accounts, internal company resources

Cuttlefish, a new malware family that targets enterprise-grade small office/home office (SOHO) routers, is used by criminals to steal account credentials / secrets for AWS, …

Curl
Be prepared to patch high-severity vulnerability in curl and libcurl

UPDATE (October 11, 2023, 07:15 a.m. ET): Curl v8.4.0 is out and fixes both CVE-2023-38545, a SOCKS5 heap buffer overflow vulnerability and CVE-2023-38546, a cookie injection …

Docker hub
Researchers find hidden vulnerabilities in hundreds of Docker containers

Rezilion uncovered the presence of hundreds of Docker container images containing vulnerabilities that are not detected by most standard vulnerability scanners and SCA tools. …

Python
Python tarfile vulnerability affects 350,000 open-source projects (CVE-2007-4559)

Trellix Advanced Research Center published its research into CVE-2007-4559, a vulnerability estimated to be present in over 350,000 open-source projects and prevalent in …

Handshake
Loft partners with Docker to help users manage virtual Kubernetes clusters

Loft Labs partners Docker so that Docker Desktop users can now set up and manage virtual Kubernetes clusters. Recently, Docker announced the launch of an extensions API …

Handshake
Mirantis collaborates with Docker to accelerate application design and delivery for developers

Mirantis announced a partnership with Docker to make it easier for Docker Desktop users to quickly start a K0s Kubernetes cluster on the local desktop and use Lens, the …

security platform
HUB Security Docker Digital Twin authenticates and verifies incoming Docker traffic

HUB Security announced its Docker Digital Twin product to protect, authenticate, and verify traffic created by Docker, a highly used platform for package containment. The HUB …

CasaOS
CasaOS: Open-source home cloud based on the Docker ecosystem

For parents and families, the thought of someone gaining access to sensitive information can be nothing short of a nightmare. However, one group of developers are on a mission …

Software
Confidential Computing Consortium unveils Gramine 1.0 to protect sensitive datasets at all stages

The Confidential Computing Consortium’s new Gramine Project is introducing its production-ready version – Gramine 1.0 – to enable protection of sensitive workloads with Intel …

Software
Fugue adds Kubernetes security checks for securing IaC and cloud runtime environments

Fugue announced support for Kubernetes security prior to deployment. Using policy as code automation built on the open source Regula policy engine, Fugue provides a unified …

Fugue IaC platform empowers cloud teams to eliminate security gaps

Fugue announced Fugue IaC, a unified platform for securing infrastructure as code (IaC) and cloud runtime environments using a single set of policies. Powered by a Unified …

cloud
Enterprising criminals are selling direct access to cloud accounts

Lacework released its cloud threat report, unveiling the new techniques and avenues cybercriminals are infiltrating to profit from businesses. The rapid shift of applications …

Don't miss

Cybersecurity news