What Are Application Containers And How Do I Secure Them?

You may have wondered what application containers are, let alone how to secure them. The National Institute of Standards and Technology (NIST) sets out to explain the benefits and security concerns with application container technologies in the latest Special Publication (SP 800-190) Application Container Security Guide.

Continue Reading What Are Application Containers And How Do I Secure Them?

Tizi backdoor mobile threat

Google security researchers discovered a backdoor family of malware called Tizi with capabilities to root some Android devices and exploit older vulnerabilities in targeted attacks against mainly African countries to include Kenya, Nigeria, and Tanzania.

Continue Reading Tizi backdoor mobile threat

FALLCHILL RAT cyber threat

The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) issued a joint technical alert on updated threat intelligence on a remote administration tool (RAT) dubbed FALLCHILL used by the North Korean government.

Continue Reading FALLCHILL RAT cyber threat