Owning system through an exposed Docker interface

About a good year ago I wanted to understand what was this hype surrounding┬áDocker all about. I started playing with containers, resource management and automated deployment. Eventually I felt that the management tool (ideally Web-based) would come in handy, especially […]

NTP DoS reflection attacks

Over the last few years there’s been a significant increase of a specific amplified Distributed Reflection Denial of Service attacks. In addition to Internet Protocol address spoofing these attacks mostly exploit old and unprotected internet services that enable unauthenticated (connectionless) […]