Wednesday, October 23, 2019

Docker worm spreads cryptojacker via exposed hosts

 
Security Digest
Information security news and advice from TechTarget's network | October 23, 2019
TechTarget
FEATURED STORY
Exposed Docker hosts open the door for cryptojacking
by Beth Pariseau and Michael Heller, Senior Reporters

Security researchers discovered a new Docker worm that has been targeting exposed hosts in order to spread cryptojacking malware to other containers.(SearchSecurity.com)

Advertisement
NEWS
 
Malware detection methods struggle to keep up with evolving threats

Experts discuss the increasingly complex methods of malware detection needed when dealing with everything from low-level attackers to advanced persistent threat groups.

(SearchSecurity.com)

 
Bugcrowd launches Attack Surface Management platform

The new platform provides an extra layer of testing by sending its findings to Bugcrowd's crowdsourced security testing tools.

(SearchSecurity.com)

 
Sophos acquisition bid presents potential growth, peril

Private equity firm Thoma Bravo made an offer to acquire Sophos for approximately $3.9 billion. Analysts discuss what the deal might mean for the endpoint security vendor.

(SearchSecurity.com)

 
Brexit: Withdrawal agreement lists EU IT data link beyond transition

The document lists the system-to-system IT and network connectivity that will be required after the U.K. leaves the European Union.

(ComputerWeekly.com)

EXPERT ADVICE
 
How should I choose a cybersecurity insurance provider?

To vet potential cybersecurity insurance providers, there are a few questions every customer should ask. Learn more about the questions to ask and how to get the answers you need.

(SearchSecurity.com)

 
DevSecOps model requires security to get out of its comfort zone

Shifting from DevOps to DevSecOps isn't always easy, with the transition requiring changes to culture, processes and people. Here's how security can help lead the charge.

(SearchSecurity.com)

 
Netscout CSO speaks to third-party risk, security gender gap

Veteran CSO at Netscout Deb Briggs recaps her fireside chat with Cisco CSO Edna Conway at FutureCon 2019, including their discussion on third-party risk and the gender gap in the security industry.

(SearchSecurity.com)

 
How to address cloud IAM challenges

Cloud services are major players in most companies now and can have a major impact on the management of access and identity governance. Learn how to handle cloud IAM challenges.

(SearchSecurity.com)

 
Is a cybersecurity insurance policy a worthy investment?

Variables such as third-party business partners create unique cyberthreats for organizations. Find out when a cybersecurity insurance policy is a wise investment to prevent risk.

(SearchSecurity.com)

 
Heed 5 security operations center best practices before outsourcing

Understanding the five steps needed to ensure security operations center best practices will help organizations decide whether to outsource their SOC initiatives.

(SearchSecurity.com)

 
The difference between AES and DES encryption

Choosing to encrypt confidential data with AES or DES encryption is an important cybersecurity matter. Learn about the important differences between AES and DES.

(SearchSecurity.com)

 
Putting blockchain technology to good use

Experts share their views on the best and most effective ways information security professionals can use blockchain technology.

(ComputerWeekly.com)

About This E-Newsletter
The Security Digest is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: