Vulnerable Docker services are being targeted by a novel campaign in which the threat actors are deploying XMRig cryptocurrency miner as well...
A large-scale attack campaign discovered in the wild has been exploiting Kubernetes (K8s) Role-Based Access Control (RBAC) to create backdoors and run...
The hacker controlled 250GB worth of the NewsBlur database and ransomed it before deleting it. NewsBlur is a US-based software company that...
Researchers discovered a critical vulnerability in Docker that allows an attacker to take complete control of the host and the containers associated...
Introduction Dr. ROBOT is a tool for Domain Reconnaissance and Enumeration. By utilizing containers to reduce the overhead of dealing with dependencies,...
According to IT security audits specialists all versions of the Docker software are impacted by a race condition vulnerability that, if exploited,...
Microsoft says its official Microsoft images hosted in Docker Hub have not been compromised. The company behind Docker, a computer program developed...
In recent days, a still not identified hacker group got unauthorized access to a Docker database, a company dedicated to programmer software...
Docker Hub, one of the largest cloud-based library of Docker container images, has suffered a data breach after an unknown attacker gained...
The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production. The...
A set of scripts compromises the security of Docker services According to reports of cybersecurity and digital forensics specialists from the International...
Metadata-Attacker or a set of cross-site scripting vectors to test any webservice against possible XSS vulnerabilities when displaying unfiltered meta datWith this...
Easily run a hidden service inside the Tor network with this container Generate the skeleton configuration for you hidden service, replace for...
The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs). GOSINT allows a security...
Mail header analyzer is a tool written in flask for parsing email headers and converting them to a human readable format and...
About Getting default credentials added to commercial scanners is often difficult and slow. changeme is designed to be simple to add new...
Short Bytes: HypriotOS 1.0.0 release recently arrived. It enables you to run Docker containers on entire Raspberry Pi family. HypriotOS is a Debian...
Short Bytes: An Indian security researcher was able to find Vine’s source code in plain sight. All he had to do was...
Short Bytes: The latest Windows 10 Insider Build has brought Hyper-V container support to Windows. This will allow a user to run...
Short Bytes: Docker images, Docker containers, Docker Hub, Compose, Machine, Swarm etc. are frequently used terms when working with Docker. In this article,...
Short Bytes: Linux containers (LXC) are very popular these days among developers and companies (perhaps due to Docker, which leverages LXC on the...