Beapy Cryptojacking Campaign Uses EternalBlue to Exploit Enterprises
Symantec reported on April 25 that an unknown group of attackers is making use of the same EternalBlue vulnerability that enabled the WannaCry ransomware attack to conduct cryptojacking attacks on...
View ArticleCyber-security Is Improving, Though Risk Continues to Grow
There is never a shortage of bad news when it comes to cyber-security, thanks to a seemingly endless stream of vulnerabilities and exploits. The 2019 Trustwave Global Security Report, released on April...
View ArticleDocker Hub Breach & Impact
Docker is warning of a data breach that impacts some 190,000 users of its Docker Hub repository for container images. The breach was first reported by Docker late on April 26 in an email sent to Docker...
View ArticleOpenStack Looks to Help Define the Future of Open Infrastructure
The OpenStack Foundation is continuing to grow its open-source efforts, including confirming new top-level projects and expanding its Ironic bare metal program, as part of the kickoff for the Open...
View ArticleShuttleworth Tells OpenStack to Keep Its Focus on the Cloud
Few if any figures in the OpenStack community are as well-known, or as outspoken, as Canonical CEO and Ubuntu Linux founder Mark Shuttleworth. At the Open Infrastructure Summit in Denver on April 29,...
View ArticleDocker Enterprise 3.0 Advances Container Development
SAN FRANCISCO – Docker CEO Steve Singh kicked off his company’s DockerCon 19 event with the assertion that container technology is the engine for innovation in the modern digital economy. DockerCon...
View ArticleDocker Responds to Data Breach and Outlines the Container Future
SAN FRANCISCO – The elephant or rather the whale in the room at DockerCon this week, was the data breach of the Docker Hub, first disclosed on April 26. During a keynote address and in a private press...
View ArticleLinux 5.1 Advances Performance and Security With New Features
Linus Torvalds released the Linux 5.1 kernel update on May 5, providing users of the open-source operating system with new features that will help to improve performance, stability and security. The...
View ArticleRed Hat Enterprise Linux 8 Delivers New Server Management Features
Red Hat is kicking off its annual Red Hat Summit customer event on May 7, announcing the release of Red Hat Enterprise Linux 8. Red Hat Enterprise Linux 8 adds multiple new features including a web...
View ArticleHow Breach & Attack Simulation Can Improve Your Security Strategy
Breach and attack simulation (BAS) helps businesses automate and scale how they test their cybersecurity defenses. Unlike traditional penetration testing, which offers a point-in-time view of defenses,...
View Article