Remove category docker
article thumbnail

REMnux Tools List for Malware Analysis

Lenny Zeltser

To guide you through the process of examining malware, REMnux documentation lists the installed tools by category. In addition to providing numerous tools as part of the REMnux distro, the project also offers several malware analysis tools as Docker images.

Malware 145
article thumbnail

Log4j Vulnerability Aftermath

Security Affairs

In this blog post, we will talk about various malware categories that attackers are taking advantage of the Log4j vulnerability. Kinsing is a self-propagating crypto mining malware previously targeting misconfigured open Docker Daemon API ports. Figure 3: docker commands to kill already running miners. DDoS botnet payloads.

DDOS 89
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 1: Using Veracode From the Command Line in Cloud9 IDE

Veracode Security

I also leverage Docker and a cloned Java app called Vera demo Java from github.com/veracode/verademo. Since my IDE already has Docker installed, I can pull down all the necessary images. In my case, I noticed that back in November, new Docker hub images were released.) In the Docker hub, I start with the API wrapper.

article thumbnail

Using Veracode From the Command Line in Cloud9 IDE

Veracode Security

I also leverage Docker and a cloned Java app called Vera demo Java from github.com/veracode/verademo. Since my IDE already has Docker installed, I can pull down all the necessary images. In my case, I noticed that back in November, new Docker hub images were released.) In the Docker hub, I start with the API wrapper.

article thumbnail

Application Security for builders and creators?—?part 2

Security Boulevard

As you might know we are planning to use docker and host the micro-services on Google Kubernetes Engine (GKE). But unfortunately, docker or GKE while being excellent virtualization and orchestration technology, cannot protect an application against SQL injection or any application-specific vulnerabilities ”.

article thumbnail

6 New Features This Month

ForAllSecure

This opens Mayhem to new categories of software defects to be reported, such as algorithmic attacks. ZAP API scan is a script packaged with ZAP Docker images tuned for performing active scans against APIs. It can detect the OWASP API Top 10. It is tuned to APIs, so it doesn’t bother looking for things like XSS.

article thumbnail

Why API Security Is Everywhere (Except Where You Need It)

ForAllSecure

Your uncertainty isn’t surprising when everyone’s putting marketing effort behind those terms and shoehorning products into the category even when they don’t fit. A few years back, I was writing similar posts to this when everyone was getting excited about Docker. Or something else entirely. Except, it wasn’t.