by Manoj Ahuje | Apr 6, 2021 | Blog, Calico, Cloud Security, Kubernetes, Threat Research
Since the release of CVE-2020-8554 on GitHub this past December, the vulnerability has received widespread attention from industry media and the cloud security community. This man-in-the-middle (MITM) vulnerability affects Kubernetes pods and underlying hosts, and all...
by Manoj Ahuje | Mar 31, 2021 | Blog, Calico Enterprise, Cloud Security, Kubernetes, Threat Research
In April 2020, MalwareHunterTeam found a number of suspicious files in an open directory and posted about them in a series of tweets. Trend Micro later confirmed that these files were part of the first cryptojacking malware by TeamTNT, a cybercrime group that...
by Manoj Ahuje | Sep 30, 2020 | Blog, Calico Enterprise, Cloud Security, Threat Research
Kubernetes has become the world’s most popular container orchestration system and is taking the enterprise ecosystem by storm. At this disruptive moment it’s useful to look back and review the security threats that have evolved in this dynamic landscape....
by John Armstrong | Jul 9, 2020 | Blog, Calico, Cloud Security, Kubernetes
We’re excited to announce that the latest release of Calico includes encryption for data-in-transit. Calico is the open source networking and network security solution for containers, virtual machines, and host-based workloads, offering connectivity and security for...
by Manoj Ahuje | Mar 17, 2020 | Anomaly Detection, Calico Enterprise, Cloud Security, Machine Learning, Threat Research
Introduction 2020 is predicted to be an exciting year with more organizations adopting Kubernetes than ever before. As critical workloads with sensitive data migrate to the cloud, we can expect to encounter various Advanced Persistent Threats (APT) targeting that...
by Manoj Ahuje | Dec 12, 2019 | Calico Enterprise, Cloud Security, Security
Organizations are rapidly moving more and more mission-critical applications to Kubernetes (K8s) and the cloud to reduce costs, achieve faster deployment times, and improve operational efficiencies, but are struggling to achieve a strong security posture because of...