The Chainguard team has released a new whitepaper titled "All About That Base Image", which aims to help software professionals better understand the security debt of popular base images by analyzing the number, severity, and lifetime of vulnerabilities.
A proof-of-concept exploit allowing an attacker having compromised a container to escape to the underlying host and gain host-level administrative privileges. The code for the PoC is also available on Github.
Some common attack techniques that an attacker can use to exploit your Google Cloud Platform (GCP) environment, gain permissions, and steal information via services like Dataproc, Dataflow, and Composer.
Today, you can centrally close member accounts in your AWS organization enabling easier and more efficient account management of your AWS environment. This means you're able to close member accounts from your organization's management account without needing to login to each member account individually with root credentials.
How Trend Micro integrated with Amazon S3 Object Lambda to deliver malware scanning as objects are being retrieved from Amazon S3, and how you can use File Storage Security to detect, quarantine, and manage potential malware risk.
Azure Bastion native client support brings you the ability to connect to target VMs from the command line and log in using your Azure Active Directory credentials.
If you want to get your product or job ad in front of thousands of security professionals, ranging from engineers to CISOs and VCs, at companies ranging from small start-ups to Fortune500 and FAANG, you can reach out at 📨 [email protected] 📨
Thanks for reading!
If you found this newsletter useful and interesting, and know other people who would too, I'd really appreciate if you could forward it to them 📨
If you have questions, comments, or feedback, just reply to this email or let me know on Twitter @lancinimarco!