In recent weeks, we have seen first-hand the importance of having early detection capabilities, the correct implementation of security measures,...
Read more...
Nowadays, for most of us, smartphones have become a vital device, something that we have at hand almost all the time. They come with a phone number...
Read more...
Much has been said recently about the abuse of Docker APIs exposed to the internet. These references all talk about the main Docker API that...
Read more...
In January of this year we found an EoP (Escalation of Privileges) or LPE (Local Privilege Escalation) in the Dropbox Windows application. The bug was...
Read more...
Humans have used features such as face, voice, and gait for thousands of years to recognize each other, but only recently, humans have started using...
Read more...
A network policy is a specification of how groups of pods are allowed to communicate with each other and other network endpoints. The Kubernetes...
Read more...
The previous articles about Docker security have discussed many security features that can be applied at container's runtime. Those features, such as...
Read more...
In the previous article we talked about authentication in Kubernetes using TLS certificates. Once the user or service account is authenticated, the...
Read more...
In a Kubernetes cluster, the kube-apiserver is the main component of the Control Plane, all the actions that occur within the cluster go through this...
Read more...
When a security assessment on a mobile application is being carried out (specifically on Android) there are two main roads an analyst can take:
...
Read more...