CyberArk pen testing Accurics

CyberArk Unveils Open Source Pen Testing Tool for Kubernetes

CyberArk today launched an open source penetration testing framework, dubbed Kubesploit, for testing Kubernetes environments. Eviatar Gerzi, a cybersecurity researcher at CyberArk Labs, says that as more instances of Kubernetes clusters are ...
Sophos Kubernetes threats

Sophos Adds Ability to Scan Container Images

Sophos this week announced it is extending its Cloud Optix service for cloud security posture management (CSPM) to include support for container image scanning. Richard Beckett, senior product marketing manager for public ...
Worm

Palo Alto Networks Finds Cryptojacking Worm Using Containers

The Unit 42 research arm of Palo Alto Networks revealed this week that it has discovered an instance of cryptojacking employing containers in Docker Engine that includes a worm capable of replicating ...
Inside a Docker Cryptojacking Exploit

Inside a Docker Cryptojacking Exploit

Docker containers are often used to create developer sandbox environments. Because Docker containers can be lightweight, ephemeral infrastructure, they’re a natural fit for building sandboxes. While Docker is great at managing the ...