Docker malware is now common, so devs need to take Docker security seriously

Source:-https://www.zdnet.com Towards the end of 2017, there was a major shift in the malware scene. As cloud-based technologies became more popular, cybercrime gangs also began targeting Docker and Kubernetes systems. SECURITY Cyber security 101: Protect your privacy from hackers, spies, and the government Cyber security 101: Protect your privacy from hackers, spies, and the government Simple steps can make the difference between losing your online accounts or maintaining what is now a precious commodity: Your privacy. Read More Most of

Read more

Undetectable Linux Malware Targeting Docker Servers With Exposed APIs

Source:-thehackernews.com Cybersecurity researchers today uncovered a completely undetectable Linux malware that exploits undocumented techniques to stay under the radar and targets publicly accessible Docker servers hosted with popular cloud platforms, including AWS, Azure, and Alibaba Cloud. Docker is a popular platform-as-a-service (PaaS) solution for Linux and Windows designed to make it easier for developers to create, test, and run their applications in a loosely isolated environment called a container. According to the latest research Intezer shared with The Hacker News,

Read more

How to Secure Online Coding Platforms

Source:-devops.com The evolution of DevOps teams and a greater reliance on cloud-based computing has completely changed the coding process. Now, with Integrated Development Environments (IDEs), coding can be done entirely online. This is convenient, but are online IDEs secure? To answer this, we will focus on two popular cloud-based IDEs: AWS Cloud9 and Visual Studio Online. In online coding, the IDE is rendered inside your browser, the browser JavaScript engine uses WebSockets to initiate an Secure Shell (SSH) connection to

Read more

Why DevOps Is An Attractive Target For Cybercrime Syndicates

Source:-forbes.com Late in the month of September 2019, Avast detected an intrusion into its network through a temporary VPN profile. It is believed that this was an attempt to use malware to infect the CCleaner software owned by Avast. CCleaner is a utility that many companies use to remove malware from systems. Cybercrime syndicates had successfully implanted malware into CCleaner in 2017. This attempt in 2019 is largely believed to be a similar attempt, though it failed. Docker had to

Read more