Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about this year’s current uses and emerging risks of the cloud. Also, find out what new vulnerability was found in containers.
This week a new vulnerability was published that highlights the biggest security weakness of containers: they are loosely isolated sharing the same host operating system.
A security vulnerability has been disclosed for a flaw in RunC, Docker and Kubernetes’ container runtime, which can be used to attack any host system running containers.
While the power of the cloud and benefits like flexibility and productivity are continuing to grow, there are some risks to be aware of.
Cybersecurity risks to utilities’ systems increased in 2018, with more intrusions into those networks and malware that infected those systems, according to a new report from a threat assessment firm released Thursday.
80 percent of IT business leaders anticipate a critical breach or successful cyberattack over the coming year, according to Trend Micro’s Cyber Risk Index (CRI).
While conducting a routine log check, Trend Micro noticed an interesting script from one of our honeypots downloading a binary connected to a domain.
In a credential stuffing data breach, hackers automatically feed thousands or millions of username and password combinations obtained from other breaches into a website in order to fraudulently gain access to user accounts.
Dating app Coffee Meets Bagel announced that an unauthorized party gained access to an undisclosed amount of user data, but didn’t make off with any sensitive information like credit card numbers or passwords.
Trend Micro found EXE files in the wild delivering a malicious payload that overrides Mac’s built-in protection mechanisms such as Gatekeeper.
Two weeks out from the longest government shutdown in United States history, government employees are still scrambling to mitigate impacts on federal cybersecurity defenses.
Trend Micro dives into the cybercriminal underground to see how the tactics and techniques used to attack financial organizations have changed over the years.
The location of data that disappeared during the Equifax breach in 2017 has remained a mystery, and the prevailing theory today is that the data was stolen by a nation-state for spying purposes, not by criminals looking to cash in on stolen identities.
Are you surprised that a nation-state is theorized responsible for the Equifax breach? Why or why not? Share your thoughts in the comments below or follow me on Twitter to continue the conversation: @JonLClay.
The post This Week in Security News: Cloud Risks and Container Vulnerability appeared first on .