New Advanced Linux VoidLink Malware Targets Cloud and container Environments

Cybersecurity researchers have disclosed details of a previously undocumented and feature-rich malware framework codenamed VoidLink that’s specifically designed for long-term, stealthy access to Linux-based cloud environments According to a new report from Check Point Research, the cloud-native Linux malware framework comprises an array of custom loaders, implants, rootkits, and modular plugins that enable its operators…

Read More

3 best secure container images for modern applications

Modern software delivery depends on the reliability, integrity, and security of container images. As organisations migrate to microservices, automated CI/CD pipelines, and multi-cloud architectures, the container image becomes more than a packaging mechanism, it becomes a security boundary. A single vulnerability embedded in an image can replicate in clusters, environments, and deployments, creating widespread risk…

Read More