Container infrastructure can be exploited in under one hour

Criminals are having a field day with misconfigured containers, installing cryptocurrency miners and various backdoors without breaking a sweat. According to a new report from Aqua Security Software, it takes less than an hour to compromise vulnerable software container infrastructure.  As reported by Silicon Angle, attackers are using bots to target misconfigured Docker APIs and are capable of gaining access …

Tovább a bejegyzéshez

Implementing a secure container strategy in your cloud environment

Containers have quickly moved from an emerging technology to an integral part of many organizations’ cloud strategies. Gartner predicts that by 2022, 75 percent of organizations will be running containerized applications in production, up from less than 30 percent today. Yet as containers have achieved widespread adoption, they’ve also caught the eyes of cybercriminals looking for another avenue to exploit.  …

Tovább a bejegyzéshez