![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095945/cloud2-400x200.jpg)
Enterprising criminals are selling direct access to cloud accounts
Lacework released its cloud threat report, unveiling the new techniques and avenues cybercriminals are infiltrating to profit from businesses. The rapid shift of applications …
Perforce Helix Artifacts streamlines development workflow complexity and reduces costs
Perforce Software announced its new universal package manager, Helix Artifacts. Helix Artifacts allows Helix Core users to capitalize on their Perforce investment by storing, …
Granulate adds Kubernetes filtering feature to open-source gProfiler
Granulate released new Kubernetes filters feature to the company’s gProfiler. gProfiler is an open-source production profiling solution that measures the performance of code …
![container](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102319/container-400x200.jpg)
It takes less than one hour to exploit vulnerable container infrastructure
Aqua Security published a research revealing a continued rise in cyberattacks targeting container infrastructure and supply chains, and showing that it can now take less than …
AlmaLinux OS 8.4: A free open source alternative to CentOS
The AlmaLinux OS Foundation announced availability of AlmaLinux OS 8.4 just one week after the release of Red Hat Enterprise Linux (RHEL) 8.4. “This is our second stable …
![Kali Linux](https://img.helpnetsecurity.com/wp-content/uploads/2020/12/08102405/kali_linux1-400x200.jpg)
Kali Linux team releases Kaboxer, a tool for managing applications in containers
The team behind the popular pentesting Kali Linux distro has released Kaboxer, a tool to help penetration testers use older applications that don’t work on modern …
![cloud binary](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194831/cloud_binary-400x200.jpg)
Businesses embracing cloud more than ever
Organizations are accelerating their cloud journey to take advantage of its flexibility, control costs, speed time-to-market, and simplify data management, according to …
SecurID’s new capabilities help businesses develop resilience in digital era
SecurID announced at RSA Conference 2021 that it will debut the key capabilities that modern enterprises need to cultivate greater resilience, meet today’s business needs, and …
SecurID’s enhancements accelerate cloud adoption and advance customers’ zero trust strategies
SecurID announced key enhancements that will help organizations accelerate their cloud journeys, provide full-spectrum authentication options, and ensure flexible and adaptive …
![MITRE ATT&CK](https://img.helpnetsecurity.com/wp-content/uploads/2021/02/15120235/mitre-attack-400x200.jpg)
MITRE ATT&CK v9 is out and includes ATT&CK for Containers
The Mitre Corporation has released the ninth version of its ATT&CK knowledge base of adversary tactics and techniques, which now also includes a newly created ATT&CK …
![containers](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095724/containers-400x200.jpg)
Most containers are running as root, which increases runtime security risk
While container usage reveals organizations are shifting left by scanning images during the build phase, DevOps teams are still leaving their environments open to attack, …
![container](https://img.helpnetsecurity.com/wp-content/uploads/2017/12/09102319/container-400x200.jpg)
Canonical publishes set of secure container application images
Canonical has published the LTS Docker Image Portfolio, a curated set of secure container application images, on Docker Hub. The LTS Docker Image Portfolio comes with up to …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD