Cloud Security

Discover Cloud Security News

A Linux Admin's Guide to Tackling Emerging Cloud-Native Security Risks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

As 2025 approaches, we Linux admins are facing new and often unseen cloud-native security obstacles. While skilled at mitigating known risks, emerging vulnerabilities require immediate attention and refined defensive strategies that can keep pace with these threats. These risks don't just exist theoretically-they require real action to mitigate now!

Navigating the Security Challenges of Containerization with Anchore

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Containerization is now standard in today's fast-paced technological landscape. It offers streamlined development, enhanced scalability, and improved resource efficiency. However, this technological shift also brings significant security issues, such as Linux buffer overflow vulnerabilities. Security in containerized environments has become more critical as organizations adopt DevOps for rapid development and continual deployment.

Docker, Hadoop, Confluence, Redis at Risk of New Cryptomining Attack

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A recent attack campaign targeted publicly accessible Docker, Hadoop, Confluence, and Redis deployments. The attackers exploited misconfigurations and known vulnerabilities to implant cryptominers on compromised systems. As Linux admins, infosec professionals, Internet security enthusiasts, and sysadmins, it is crucial to understand the implications of this attack and take appropriate measures to protect our systems.

Kubernetes Security Best Practices for 2024

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The dynamic Kubernetes security landscape has given rise to several trends shaping how organizations approach this increasingly critical area. The aim of Kubernetes security is to prevent unauthorized access, foster data privacy, and protect the integrity of a Kubernetes environment. Robust Kubernetes security requires a defense-in-depth approach, including measures such as access control, network policies, resource isolation, and security context. Let's explore best practices you can implement to secure your Kubernetes clusters and the workloads and data running within them in 2024.

Are You Looking for Linux Vulnerabilities in the Right Places?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Scanning for vulnerabilities in the right places is critically important in securing your Linux environment. While vulnerability scanning initially involved scanning Linux hosts, it has since shifted to scrutinizing container images. However, in the world of vulnerability management, we often focus on scanning images in registries and CI/CD processes but forget to monitor vulnerabilities where it really matters: container images that are actually running.

Unleashing the Power of LOKI: Linux, OpenStack and Kubernetes Infrastructure

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The LOKI stack is a powerful infrastructure that combines Linux, OpenStack, and Kubernetes in the ever-changing landscape of cloud infrastructure. OpenStack reports that Kubernetes was now used on more than 85% of OpenStack installations, indicating how these technologies are becoming increasingly integrated, as opposed to the idea of either-or choices.

What Is eBPF? The Ultimate Guide

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

eBPF stands for extended Berkeley Packet Filters, which are a way of running programs on network interfaces. There are two types of BPF: classic and extended. Classic BPFs were introduced in Linux 2.6.25, while extended BPFs were introduced with Linux 4.0 (2010), allowing for more functionality than classic BPFs.

Kubernetes Security on AWS: A Practical Guide

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Kubernetes security is safeguarding your Kubernetes clusters, the applications they host, and the infrastructure they rely on from threats. As a container orchestration platform, Kubernetes is incredibly powerful but presents a broad attack surface for potential adversaries.