News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

NIS2 policy and container security
B2B Cyber ​​Security ShortNews

The digital landscape in Europe is facing a significant change with the publication of the NIS2 Directive. The implementation of this digital transformation is closely linked to the development of cyber security. Governments around the world are now taking action to increase the protection of critical infrastructure from cyber threats. This policy, which aims to increase security and resilience in the cyber environment, particularly affects the growing number of Kubernetes users. Understanding NIS2 The NIS2 Directive consists of a landmark regulation that addresses cyber security and digital infrastructure in the European Union. Your main goal is to…

Read more

Endangered artifacts and container images
Endangered artifacts and container images

A pioneer in cloud-native security has discovered thousands of exposed registries and artifact repositories containing over 250 million artifacts and over 65.000 container images. Many of these artifacts and images contained highly confidential and sensitive proprietary code and "secrets". Aqua's team of IT security researchers, Team Nautilus, uncovered misconfigurations that put thousands of companies of all sizes at risk worldwide - including five from the Fortune 500 and two major IT security vendors. At IBM, for example, an internal container registry was exposed to the Internet: After Nautilus researchers informed the local security team, Internet access to these environments was closed and the risks minimized. Aqua has…

Read more

Container images: 87 percent with high-risk vulnerabilities
Container images: 87 percent with high-risk vulnerabilities

According to the Sysdig study, 87 percent of container images are said to have high-risk vulnerabilities. The 2023 Cloud-Native Security and Usage Report finds massive risk in the supply chain, along with more than $10 million in wasteful spending on large-scale cloud deployments. Sysdig, the leader in cloud and container security, announces the results of the "Sysdig 2023 Cloud-Native Security and Usage Report". The report, which focuses on two themes this year, shows that supply chain risk and readiness to implement a Zero Trust architecture are the top unresolved security issues in cloud and container environments...

Read more

Defense against container-based zero-day attacks
Defense against container-based zero-day attacks

A new cloud-native security solution can stop zero-day attacks and shield critical production vulnerabilities until a patch can be applied. Aqua Security introduces the eBPF Lightning Enforcer. Powered by new eBPF technology, Lightning Enforcer provides full visibility into running workloads, making it easy for security professionals to identify and stop even advanced attacks in real time. Shift Left is an important factor in preventing vulnerabilities, misconfigurations, and software supply chain threats from entering production environments. However, sometimes this security approach is not enough. This has led to a…

Read more

New attack paths: Dangerous macros hidden in ISO, LNK, RAR & Co
New attack paths: Dangerous macros hidden in ISO, LNK, RAR & Co

The use of macros to spread malware has declined significantly: by as much as 2021 percent between October 2022 and June 66. However, attackers are beginning to use tricks to circumvent the protection. Commonly, cyber criminals use VBA macros to automatically execute malicious content if a user has macros enabled in Office applications. XL4 macros, on the other hand, are specific to the Excel application, but can also be used by attackers as a tool for spreading malware. The masterminds behind macro-based attacks typically use social engineering to convince the recipient…

Read more

CNAPP capabilities for container security and cloud vulnerabilities 
CNAPP capabilities for container security and cloud vulnerabilities

CrowdStrike extends CNAPP capabilities to secure containers and help developers quickly identify and remediate cloud vulnerabilities. The extension of agent-based and agentless protection adds support for Amazon ECS and enables DevSecOps teams to develop in AWS environments even more securely. CrowdStrike, a leading provider of cloud-based protection for endpoints, workloads, identity and data, announced powerful new capabilities of the Cloud Native Application Protection Platform (CNAPP). Thanks to the new features, CrowdStrike Cloud Security now also offers support for Amazon Elastic Container Services (ECS) within AWS Fargate, extends image registry scanning to include...

Read more

Hardware, API Server, and Container Risks with Kubernetes
Hardware, API Server, and Container Risks with Kubernetes

Kubernetes is extremely popular, but without proper security measures, it also comes with risks. Security expert CyberArk names three specific risks and shows which defensive measures are required to get hardware, API server and container risks in Kubernetes under control. In software development today, speed and agility are key. Container technology is being used to an increasing extent. Kubernetes has emerged as the de facto standard for managing containerized workloads and services. Security Considerations in Kubernetes From a security perspective, the Kubernetes orchestration platform brings with it specific identity-related challenges that need to be addressed early in the development process. Otherwise...

Read more

Bitdefender: new cloud workload security 
Bitdefender: new cloud workload security

Cloud workload security with the new Bitdefender GravityZone Security for Containers. With protection of cloud workloads for containers and Linux environments, runtime support for container workloads and Linux kernel independence to reduce risks and enable a faster switch to new distributions. With the new GravityZone Security for Containers solution, Bitdefender is expanding its offering for Cloud Workload Security (CWS). The new offer now also protects the container run time. It also includes defense against threats as well as Extended Endpoint Detection and Response (XEDR) and protects containers in private and public clouds against exploits. With the unified cybersecurity platform Bitdefender, users have ...

Read more

Cloud security with MITER ATT & CK for Containers
Cloud security with MITER ATT & CK for Containers

Shaping the future of cloud security with MITER ATT & CK for Containers. Trend Micro is contributing to a new framework that helps companies build and deploy secure container environments. Trend Micro, one of the world's leading providers of cloud security, is supporting MITER with research and resources in developing a new framework for container security. Trend Micro threat intelligence was an integral part of the development of ATT & CK® for Containers. MITER benefited from the evidence-based results from several years of dedicated research with which Trend Micro supported the new framework. Evidence-based results from the research "Trend Micro ...

Read more

Container scanning in cloud environments 
Container scanning in cloud environments

More security in cloud environments through container scanning. Sophos Cloud Optix now also identifies weaknesses in container images and enables automated reactions. Sophos is expanding its cloud analysis solution, Sophos Cloud Optix, and offers additional security for container assets in multi-cloud environments with the ability to scan container images. With the new extension, potentially dangerous operating system weaknesses in container images can be identified and automatically remedied. Increased Demand for Cloud Services Over the past year, the increased demand for cloud services has prompted many IT and security teams to accelerate their cloud migrations. In addition to an efficient and secure strategy for application delivery in the cloud ...

Read more