Cloud Security

Discover Cloud Security News

Docker, Hadoop, Confluence, Redis at Risk of New Cryptomining Attack

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A recent attack campaign targeted publicly accessible Docker, Hadoop, Confluence, and Redis deployments. The attackers exploited misconfigurations and known vulnerabilities to implant cryptominers on compromised systems. As Linux admins, infosec professionals, Internet security enthusiasts, and sysadmins, it is crucial to understand the implications of this attack and take appropriate measures to protect our systems.

Kubernetes Security Best Practices for 2024

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The dynamic Kubernetes security landscape has given rise to several trends shaping how organizations approach this increasingly critical area. The aim of Kubernetes security is to prevent unauthorized access, foster data privacy, and protect the integrity of a Kubernetes environment. Robust Kubernetes security requires a defense-in-depth approach, including measures such as access control, network policies, resource isolation, and security context. Let's explore best practices you can implement to secure your Kubernetes clusters and the workloads and data running within them in 2024.

Are You Looking for Linux Vulnerabilities in the Right Places?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Scanning for vulnerabilities in the right places is critically important in securing your Linux environment. While vulnerability scanning initially involved scanning Linux hosts, it has since shifted to scrutinizing container images. However, in the world of vulnerability management, we often focus on scanning images in registries and CI/CD processes but forget to monitor vulnerabilities where it really matters: container images that are actually running.

Unleashing the Power of LOKI: Linux, OpenStack and Kubernetes Infrastructure

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The LOKI stack is a powerful infrastructure that combines Linux, OpenStack, and Kubernetes in the ever-changing landscape of cloud infrastructure. OpenStack reports that Kubernetes was now used on more than 85% of OpenStack installations, indicating how these technologies are becoming increasingly integrated, as opposed to the idea of either-or choices.

What Is eBPF? The Ultimate Guide

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

eBPF stands for extended Berkeley Packet Filters, which are a way of running programs on network interfaces. There are two types of BPF: classic and extended. Classic BPFs were introduced in Linux 2.6.25, while extended BPFs were introduced with Linux 4.0 (2010), allowing for more functionality than classic BPFs.

Kubernetes Security on AWS: A Practical Guide

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Kubernetes security is safeguarding your Kubernetes clusters, the applications they host, and the infrastructure they rely on from threats. As a container orchestration platform, Kubernetes is incredibly powerful but presents a broad attack surface for potential adversaries.

Kubernetes Architecture and its Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Kubernetes is an open-source container orchestration platform that provides an efficient and scalable way to manage containerized workloads and services. The platform is based on a distributed architecture that enables it to manage and scale containerized applications across multiple nodes in a cluster. It plays a vital role in ensuring data security in containerized environments, providing "multiple layers of security measures" to protect the data.