Most Docker container images have critical flaws
According to new research, over two million container images hosted on the Docker Hub repository harbor at least one critical vulnerability. In an analysis carried out by cyber security firm Prevasio on four million image containers, over half (51%) contained at least one critical vulnerability. SEE MORE Getting started with Docker SEE MORE Mirantis snaps up Docker’s enterprise platform SEE MOR
E ‘Doki’ malware attacks Docker servers using Dogecoin SEE MORE Docker partners with AWS to help take the complexity out of containerisation The research also found incidents of container images carrying embedded malware. It found 6,432 malicious or potentially harmful containers, representing 0.16% of all publicly available images at Docker Hub. “Our analysis of malicious containers also shows that quite a few images contain a dynamic payload. That is, an image in its original form does not have a malicious binary. However, at runtime, it might be scripted to download a source of a coin miner, to then compile and execute it,” said Sergei Shevchenko, CTO at Prevasio. In its report, Prevasio said if a developer takes a shortcut by fetching a pre-built image instead of composing a new image from scratch, there’s a viable risk that such pre-built images might come with a Trojan installed. If such an image ends up in production, the attackers may potentially access such containerized applications remotely via a backdoor. Mark Bower, senior vice president at comforte AG, told ITPro that platforms like Kubernetes enable immense application delivery power. However, the built-in security controls reflect classical data-at-rest and transport encryption, perimeter, and access control-based security. “While these controls are important, the last decade has seen leading enterprises and data processors shift towards data-centric over perimeter controls to combat advanced malware, ransomware and insider risk to sensitive data,” Bower said. “Fundamentally, to thwart the variations of malware and attacks from misconfiguration or API exploitation, a data-centric approach is vital even with advanced container and app orchestration ecosystems to avoid data compromise or attacks that can create havoc for data-hungry enterprises depending on them.” Tim Mackey, principal security strategist at the Synopsys CyRC (Cybersecurity Research Centre), told ITPro that when selecting an image from Docker Hub, a development team is implicitly stating that they trust the security practices of the author of that container image. “Such implicit trust is risky from a security perspective, which is why many organizations are now creating hardened container images where the image hardening process is managed by a dedicated team skilled in operating system hardening which is separate from the core development team. These hardened images are then pushed to an internal registry and policies are defined that only allow images originating from hardened images in that internal registry to execute in a production cluster,” Mackey said.
Date: 2020-12-02
itpro.co.uk
Lexmark C3426dw review: Laser precision (2020-11-25) | Lexmarks GO Line series of lasers is aimed at businesses with relatively light printing needs and within that family the C3426dw is the top-end colour model It delivers good speeds and excellent output quality for a low starting price: the trade-off is running costs which are a little steeper than youll find with other lasers The starter cartridges supplied with the C3426dw are only rated for 1500.. |
What is AES encryption? (2019-09-30) | Since Roman times encryption has been essential in keeping communications between parties private and secure Today it is more important than ever in keeping our online purchasing and banking safe form cybercriminals SEE MORE The truth about encryption SEE MORE What is public key infrastructure PKI? SEE MORE What is PGP? There are several forms of encryption that can be used to secure data whether .. |
Facebook may finally launch its Libra cryptocurrency in early 2021 (2020-11-27) | The embattled Libra cryptocurrency built by Facebook will make its long-awaited launch as early as January after a tumultuous two years in developmentand rising scepticism among backers and regulators The social media giant announced its own stablecoin in June 2019 backed by a host of big names in the finance sector as a means for customers to send and receive payments without the need for a banki.. |
Python founder Guido van Rossum joins Microsoft (2020-11-13) | Renowned programmer and founder of the Python programming language Guido van Rossum has come out of retirement to join Microsofts development team More than a year after announcing his retirement van Rossum has decided to take up a role with the companys Development Division with a view to making Python generally better to use and not just for Windows 10 SEE MORE The ultimate guide to becoming a p.. |
IT Pro 20/20: Why tech can’t close the diversity gap (2020-12-01) | Welcome to the tenthissue ofIT Pro 20/20 ourdigital magazine that brings all of the previous months most important tech issues into clear view Diversity has always been a challenge for the technology industry Its one of those few industries that struggles to maintain a varied talent pool with white males still taking the single biggest share of the employee demographic This is a problem weve known.. |
Survey finds web app attacks are up 800% compared to 2019 (2020-11-23) | Web application attacks have increased by over 800% according to the State of the Web Security for H1 2020 report Published by CDN and cloud security provider CDNetworks the report found that during the first half of this year web application attacks which use malformed requests or injected payloads to steal data modify data or obtain privileges illicitly increased nine times relative to H1 2019 C.. |
17 Windows 10 problems - and how to fix them (2019-11-04) | Windows is the best-selling and most popular operating system in the world In the last forty years the OS has been central to both business and consumer computing as the glue to run various computing functions for many Most people whether at work or at home have used a version of Windows in one form or another The Microsoft system is almost everywhere barring MacOS and Linux The latest version Win.. |
What is public key infrastructure (PKI)? (2020-05-27) | One of the most important elements of digital encryption and cryptography is public key infrastructure PKI which is an essential component of security technology PKI governs the management and deployment of digital certification and public key encryption by establishing the roles policies and procedures required This crucial element is normally deployed to keep information conveyed through digital.. |
What is phishing? (2018-09-18) | Balanced scepticism is anundervalued trait these days Treating every email with the same scrutiny is obviously a tiring job but sadly individuals not doing so is why phishing is such a successful hacking technique It is a rather personalattack method attempting to trick you into believing that a trusted source - the taxman your employer even your friends - needs something from you This could be in.. |
NHS Test and Trace suffers second software glitch in a week (2020-11-04) | More than 7000 people have been given the wrong dates for self-isolation due to another software glitch plaguingthe UKs Test and Trace app Users of the service that had come into contact with a person that had tested positive for coronavirus were given incorrect start and end dates for quarantine according to Sky News SEE MORE The NHS has yet to assess the risks of holding Test and Trace data for .. |