Remove blogs tag container security
article thumbnail

How to overcome Docker Hub rate limiting using AWS ECR and AWS CloudFormation

Xebia

In this blog post, you will see how AWS ECR and AWS CloudFormation overcome the rate limiting imposed by Docker Hub and provide full control over your base images. The popular registry Docker Hub is home to thousands of useful container images, used by many software delivery processes. library/python Tag 3.7 library/python:3.7

AWS 130
article thumbnail

How to make your web application more secure by using Dynamic Application Security Testing (DAST) – PART 2 of Application Security Testing series

Xebia

Introduction Welcome to part two of the Application Security Testing series. Like I mentioned in the previous blog, during this blog series we are going to look at the different types of Application Security Testing and Software Composition Analysis. DAST tests the security of an application by scanning it at runtime.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Unpinnable Actions: How Malicious Code Can Sneak into Your GitHub Actions Workflows

Prisma Clud

When a user pins an action to a full commit hash, the GitHub Actions pipeline downloads a snapshot of the action as a tarball containing all commits up until the pinned commit. Figure 1: GitHub Actions workflow consumes a secure, pinned version of a third-party action. As we discover in our research, no, this assumption is wrong.

article thumbnail

The GitHub Actions Worm: Compromising GitHub Repositories Through the Actions Dependency Tree

Prisma Clud

Get an in-depth look at the attack vectors, technical details and a real-world demo in this blog post highlighting our latest research. But if the owner is deleted, an attacker can register the previous name on GitHub and create a repository containing malicious code. Reference a tag. We’ll soon find out. Reference a branch.

Malware 144
article thumbnail

How To Secure Your IT, OT and IoT Assets With an Exposure Management Platform: Complete Visibility with Asset Inventory and Discovery

Tenable

Visibility serves as the cornerstone of security, offering organizations the means to monitor, analyze, and safeguard their digital infrastructure effectively. Moreover, real-time visibility enables security teams to proactively mitigate threats before they can escalate into a full-blown crisis.

IoT 71
article thumbnail

Handling personal identifiable information in your data

Xebia

In one of my previous blog posts we discussed a number of data and security-related topics. In this blog post, I want to dive a bit deeper into that topic and give a few examples of services that can be used for handling Personal Identifiable Information in your data with AWS. Amazon Macie. Wrapping up.

Data 130
article thumbnail

Cybersecurity Snapshot: CISA Says Midnight Blizzard Swiped U.S. Gov’t Emails During Microsoft Hack, Tells Fed Agencies To Take Immediate Action

Tenable

And the NSA is sharing best practices for data security. Cybersecurity and Infrastructure Security Agency (CISA) in its Emergency Directive 24-02 , sent to federal civilian agencies last week and made public this week. Already, 22% of polled organizations use generative AI for security. And much more!