MIT and Stanford researchers develop operating systems with one major promise: Resisting ransomware

Computer science researchers at MIT and Stanford are developing an operating system with built-in cybersecurity defenses.

The post MIT and Stanford researchers develop operating systems with one major promise: Resisting ransomware appeared first on CyberScoop.

Continue reading MIT and Stanford researchers develop operating systems with one major promise: Resisting ransomware

Implementing a zero-trust system that uses workload identity across a service mesh in Kubernetes

In this Help Net Security video, Michael Peters, Principal Software Engineer at Red Hat, discusses how to implement a zero-trust system that uses workload identity across a service mesh in Kubernetes to provide explicit authorization between services, … Continue reading Implementing a zero-trust system that uses workload identity across a service mesh in Kubernetes

Container Drift: Where Age isn’t Just a Number

Container orchestration frameworks like Kubernetes have brought about untold technological advances over the past decade. However, they have also enabled new attack vectors for bad actors to leverage. Before safely deploying an application, you must answer the following questions: How long should a container live? Does the container need to write any files during runtime? […]

The post Container Drift: Where Age isn’t Just a Number appeared first on Security Intelligence.

Continue reading Container Drift: Where Age isn’t Just a Number

First Dero cryptojacking campaign targets unprotected Kubernetes instances

Learn how this cryptocurrency campaign operates and its scope. Then, get tips on protecting vulnerable Kubernetes instances from this cybersecurity threat.
The post First Dero cryptojacking campaign targets unprotected Kubernetes instances appeared fir… Continue reading First Dero cryptojacking campaign targets unprotected Kubernetes instances

What’re the most common vulnerabilities/weaknesses an attacker would exploit to gain SSH access to a container?

Fair warning – I am a security newbie.
In all container escape/breakout vulnerability scenarios I’ve read (CVE-2022-0185), the author assumes or states that the attacker already had shell or SSH access to the container. When I follow this … Continue reading What’re the most common vulnerabilities/weaknesses an attacker would exploit to gain SSH access to a container?

So, you want to deploy air-gapped Kubernetes, huh?

So, you want to deploy Kubernetes in an air-gapped environment, but after months of grueling work, you’re still not up and running. Or maybe you’re just embarking on the journey but have heard the horror stories of organizations trying to manage their … Continue reading So, you want to deploy air-gapped Kubernetes, huh?

Kubernetes is the key to cloud, but cost containment is critical

What’s driving the growth of open source container orchestrator Kubernetes? A study by Pepperdata shows how companies are using K8s and the challenges they face in getting a handle on cloud costs.
The post Kubernetes is the key to cloud, but cost conta… Continue reading Kubernetes is the key to cloud, but cost containment is critical

Keeping customer secrets safe from sysadmins and devs in Kubernetes

I’ve spent a few weeks on GCP and GKE (Kubernetes) trying to figure out how to store customer secrets. The secrets are used by some application even when the user is not logged on so I want to ensure no human can reach to them.
A lot of pl… Continue reading Keeping customer secrets safe from sysadmins and devs in Kubernetes

Ermetic’s new capabilities empower users to detect misconfigurations in Kubernetes

Ermetic revealed that its Cloud Native Application Protection Platform (CNAPP) can now automatically detect and correct misconfigurations, compliance violations, and risky or excessive privileges in Kubernetes clusters for its customers. Unlike traditi… Continue reading Ermetic’s new capabilities empower users to detect misconfigurations in Kubernetes