Containers have 600+ vulnerabilities on average

Containers are the fastest growing – and weakest cybersecurity link – in software supply chains, according to NetRise. Companies are struggling to get container security right. Issues from misconfigured clouds, containers, and networks to u… Continue reading Containers have 600+ vulnerabilities on average

QScanner: Linux command-line utility for scanning container images, conducting SCA

QScanner is a Linux command-line utility tailored for scanning container images and performing Software Composition Analysis (SCA). It is compatible with diverse container orchestration systems, container runtimes, and operating systems. QScanner featu… Continue reading QScanner: Linux command-line utility for scanning container images, conducting SCA

Am I Isolated: Open-source container security benchmark

Am I Isolated is an open-source container security benchmark that probes users’ runtime environments and tests for container isolation. The Rust-based container runtime scanner runs as a container, detecting gaps in users’ container runtime isola… Continue reading Am I Isolated: Open-source container security benchmark

How isolation technologies are shaping the future of Kubernetes security

In this Help Net Security interview, Emily Long, CEO at Edera, discusses the most common vulnerabilities in Kubernetes clusters and effective mitigation strategies. Long shares insights on emerging isolation technologies that could enhance Kubernetes s… Continue reading How isolation technologies are shaping the future of Kubernetes security

Strengthening Kubernetes security posture with these essential steps

In this Help Net Security interview, Paolo Mainardi, CTO at SparkFabrik, discusses comprehensive strategies to secure Kubernetes environments from development through deployment. He focuses on best practices, automation, and continuous monitoring. Many… Continue reading Strengthening Kubernetes security posture with these essential steps

DockerSpy: Search for images on Docker Hub, extract sensitive information

DockerSpy scans Docker Hub for images and retrieves sensitive information, including authentication secrets, private keys, and other confidential data. “DockerSpy was created to address the growing concern of sensitive data leaks within Docker im… Continue reading DockerSpy: Search for images on Docker Hub, extract sensitive information

Docker fixes critical auth bypass flaw, again (CVE-2024-41110)

A critical-severity Docker Engine vulnerability (CVE-2024-41110) may be exploited by attackers to bypass authorization plugins (AuthZ) via specially crafted API request, allowing them to perform unauthorized actions, including privilege escalation. Abo… Continue reading Docker fixes critical auth bypass flaw, again (CVE-2024-41110)

Portainer: Open-source Docker and Kubernetes management

Portainer Community Edition is an open-source, lightweight service delivery platform for containerized applications. It enables the management of Docker, Swarm, Kubernetes, and ACI environments. It provides a smart GUI and a comprehensive API to manage… Continue reading Portainer: Open-source Docker and Kubernetes management

Some Open Source Software Licences are Only ‘Open-ish,’ Says Thoughtworks

A number of open source tech tools have moved towards commercial licences. Thoughtworks says this creates “big headaches” for IT, who are scrambling to maintain compliance and find replacement tools. Continue reading Some Open Source Software Licences are Only ‘Open-ish,’ Says Thoughtworks