The complexity of container infrastructure, if not properly accounted for, can pose serious security risks. To minimize risks when building in containers, we came up with six steps that developers can follow.
In a survey commissioned by Trend Micro, majority of the respondents shared their concern for the risks in implementing DevOps. Learn why consulting IT security teams in the initiatives can help bridge gaps between production and security.
Threat actors are targeting Linux servers with vulnerable software, namely the project management tool Jira and the message transfer agent Exim, using a variant of the Watchbog trojan, which drops a Monero miner to expand their botnet.
The rise in adoption of containers means a greater need for security awareness. Our infographic details the various threats that container users could encounter at each stage of the development pipeline.
Threat actors were found exploiting CVE-2018-1000861, a vulnerability in the Stapler web framework that is used by the Apache Jenkins open-source software development automation server with versions 2.153 and earlier.
A year after a potentially critical vulnerability (CVE-2018-1002100) was found and patched in the popular open-source container orchestration system and DevOps tool Kubernetes, researchers discovered that the vulnerability can still be exploited.