RedHunt Labs Blog

Attack Surface Management – Risks of an Exposed Docker Image

Attack Surface Management – Risks of an Exposed Docker Image

By default, every image pushed to the Docker Hub through your free account appears in the public registry by default. This business strategy of Docker Inc. to engage more people into purchasing their paid subscriptions puts the free users at risk. Once an attacker finds exposed docker images related to your organisation, there is plenty of information which can be used by the attacker to cause damage to the organisation’s security posture. 

Read More
Attack Surface Management – Risks of an Exposed Docker Image
Technology
Umair Nehri

Attack Surface Management – Risks of an Exposed Docker Image

By default, every image pushed to the Docker Hub through your free account appears in the public registry by default. This business strategy of Docker Inc. to engage more people into purchasing their paid subscriptions puts the free users at risk. Once an attacker finds exposed docker images related to your organisation, there is plenty of information which can be used by the attacker to cause damage to the organisation’s security posture. 

Read More »
Exposed open port
Technology
Umair Nehri

Attack Surface Management – Risks of an Exposed Service / Port 

Open ports help applications serve their purpose correctly. However, certain services running on ports exposed to the internet may pose security risks. 

In this blog, we will cover the risks of an Exposed Service / Port and how it can overall impact the overall Attack Surface of your organization.

Read More »
Untitled design 1
Project Resonance
Umair Nehri

The Current State of Security, Privacy and Attack Surface on Android: Scanning Apps for Secrets and More – Wave 8

Our research shows that secret leakage is still an issue developers must be addressed with secure development practices. We recommend that developers ensure that any cloud computing solutions they integrate into their apps are correctly configured to avoid the leakage of sensitive information and prevent threats for both the organization and end-users. We recommend that end-users pay attention to what permissions their favourite apps require for everyday usage and check if they are even needed to combat predatory practices.

Read More »

Explore our Blogs

Share in your network

Tweet
LinkedIn
Facebook
Reddit
WhatsApp