+44 (0)203 88 020 88

Menu

Search

9 March 2019

password attack

Credential Stuffing on the Rise

In a recently published report on the state of the Internet security, Akami Research  notes that they detected an average of 115 million credential stuffing attacks against their clients each day in 2018. Credential Stuffing is, according to OWASP: “the automated injection of breached username/password pairs in order to fraudulently gain access to user accounts. […]

Credential Stuffing on the Rise Read More »

containerd kubernetes exploit

Docker vulnerability allows host root escalation

Docker, along with Kubernetes, Containerd and all the other Linux container technologies that are based on the runc runtime module are affected by CVE-2019-5736  which allows the host runc to be overwritten and consequently obtain root access on the host server. Attackers first need to create a malicious Docker container. When this is installed on any

Docker vulnerability allows host root escalation Read More »

0

No products in the basket.

No products in the basket.