Tag: kubernetes
-
The Kubernetes gap in CNAPP exploring why many CNAPPs have a Kubernetes gap
Tags: kubernetesFirst seen on securityboulevard.com Jump to article: securityboulevard.com/2024/07/the-kubernetes-gap-in-cnapp-exploring-why-many-cnapps-have-a-kubernetes-gap/
-
Portainer: Open-source Docker and Kubernetes management
Portainer Community Edition is an open-source, lightweight service delivery platform for containerized applications. It enables the management of Dock… First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2024/07/01/portainer-open-source-docker-kubernetes-management/
-
SonarQube 10.6 Release Announcement
Tags: kubernetesThe 10.6 release of SonarQube includes some significant changes, such as autoscaling in Kubernetes, auto-configuration for C and C++ projects, support… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/06/sonarqube-10-6-release-announcement/
-
Sicherheit im Kubernetes-Universum – Funktion und Leistungen von KBOMs beim Schutz von Cloud-Infrastrukturen
First seen on security-insider.de Jump to article: www.security-insider.de/funktion-und-leistungen-von-kboms-beim-schutz-von-cloud-infrastrukturen-a-049f1760aa78bc0b265613ee536bc078/
-
Cryptojacking Campaign Targets Misconfigured Kubernetes Clusters
Cybersecurity researchers have warned of an ongoing cryptojacking campaign targeting misconfigured Kubernetes clusters to mine Dero cryptocurrency.Clo… First seen on thehackernews.com Jump to article: thehackernews.com/2024/06/cryptojacking-campaign-targets.html
-
Leveraging Golden Signals for Enhanced Kubernetes Security
Tags: kubernetesFirst seen on securityboulevard.com Jump to article: securityboulevard.com/2024/06/leveraging-golden-signals-for-enhanced-kubernetes-security/
-
Unsecured Kubernetes clusters subjected to Dero cryptojacking
Tags: kubernetesFirst seen on scmagazine.com Jump to article: www.scmagazine.com/brief/unsecured-kubernetes-clusters-subjected-to-dero-cryptojacking
-
Seccomp for Kubernetes workloads
Seccomp in a nutshell Seccomp, short for Secure Computing Mode, is a security feature in the Linux kernel The post in a nutshell Seccomp, short for Se… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/06/seccomp-for-kubernetes-workloads/
-
How To Streamline Certificate Lifecycle Management In Azure Kubernetes Service (AKS) with AppViewX KUBE+
Kubernetes is an open-source platform designed to simplify application deployment, streamline operations, and help organizations build a resilient inf… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/05/how-to-streamline-certificate-lifecycle-management-in-azure-kubernetes-service-aks-with-appviewx-kube/
-
Veeam verbessert die Kubernetes-native Datensicherung mit neuer Version von Kasten
Veeam Software gibt die Veröffentlichung von im Rahmen des Red Hat Summit 2024 bekannt. Als gleichsam führender A… First seen on netzpalaver.de Jump to article: netzpalaver.de/2024/05/08/veeam-verbessert-die-kubernetes-native-datensicherung-mit-neuer-version-von-kasten/
-
Simplify Certificate Lifecycle Management And Build Security Into OpenShift Kubernetes Engine With AppViewX KUBE+
Kubernetes is an open-source container orchestration platform that automates the deployment, scaling, and management of containerized applications. Bu… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/05/simplify-certificate-lifecycle-management-and-build-security-into-openshift-kubernetes-engine-with-appviewx-kube/
-
Kubernetes RBAC Essentials: How to Enable and Manage Access
As the number of applications and participants grows within your cluster, it may be necessary to evaluate and limit the activities they can perform. F… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/05/kubernetes-rbac-essentials-how-to-enable-and-manage-access/
-
Attackers Leverage Sidecar Container Injection Technique To Stay Stealthy
Kubernetes (K8s) is an open-source container orchestration platform designed to automate application container deployment, scaling, and running. Cont… First seen on gbhackers.com Jump to article: gbhackers.com/sidecar-container-injection-technique/
-
MSPs Play a Key Role in Demystifying Kubernetes
First seen on scmagazine.com Jump to article: www.scmagazine.com/feature/msps-play-a-key-role-in-demystifying-kubernetes
-
Active Kubernetes RCE Attack Relies on Known OpenMetadata Vulns
Once attackers have control over a workload in the cluster, they can leverage access for lateral movement both inside the cluster and to external reso… First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/active-kubernetes-rce-attack-relies-on-known-openmetadata-vulns
-
OpenMetadata Vulnerabilities Exploited to Abuse Kubernetes Clusters for Cryptomining
Microsoft warns that several OpenMetadata vulnerabilities are being exploited to deploy cryptomining malware to Kubernetes environments. The post t wa… First seen on securityweek.com Jump to article: www.securityweek.com/openmetadata-vulnerabilities-exploited-to-abuse-kubernetes-clusters-for-cryptomining/
-
Microsoft finds Kubernetes clusters targeted by OpenMetadata exploits
First seen on scmagazine.com Jump to article: www.scmagazine.com/news/microsoft-finds-kubernetes-clusters-targeted-by-openmetadata-exploits
-
Hackers hijack OpenMetadata apps in Kubernetes cryptomining attacks
In an ongoing Kubernetes cryptomining campaign, attackers target OpenMetadata workloads using critical remote code execution and authentication vulner… First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hackers-hijack-openmetadata-apps-in-kubernetes-cryptomining-attacks/
-
Possible Chinese Hackers Use OpenMetadata to Cryptomine
Hackers Target OpenMetadata Platforms Running on Cloud Kubernetes Environments. Hackers who appear to be Chinese are exploiting vulnerabilities in the… First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/possible-chinese-hackers-use-openmetadata-to-cryptomine-a-24886
-
Microsoft Plugs Gaping Hole in Azure Kubernetes Service Confidential Containers
Patch Tuesday: Microsoft warns that unauthenticated hackers can take complete control of Azure Kubernetes clusters. The post esday: Microsoft warns th… First seen on securityweek.com Jump to article: www.securityweek.com/microsoft-plugs-gaping-hole-in-azure-kubernetes-service-confidential-containers/
-
Zero-Trust-Cloud-Security für Kubernetes
Tenable stellt die in Tenable-Cloud-Security unterstützten CNAPP-Funktionalitäten (Cloud-Native Application Protection Platform) jetzt auch in Onpremi… First seen on netzpalaver.de Jump to article: netzpalaver.de/2024/03/25/zero-trust-cloud-security-fuer-kubernetes/
-
Researchers Detail Kubernetes Vulnerability That Enables Windows Node Takeover
Details have been made public about a now-patched high-severity flaw in Kubernetes that could allow a malicious attacker to achieve remote code execut… First seen on thehackernews.com Jump to article: thehackernews.com/2024/03/researchers-detail-kubernetes.html
-
Kubernetes RCE Vulnerability Allows Remote Code Execution
Tomer Peled, an Akamai cybersecurity security researcher, recently discovered a Kubernetes RCE vulnerability that allows threat actors to remotely exe… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/kubernetes-rce-vulnerability-allows-remote-code-execution/
-
Kubernetes 1.30: A Security Perspective
Tags: kubernetesKubernetes 1.30 marks a significant milestone in the evolution of the widely used orchestration platform, particularly regarding security The post es … First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/kubernetes-1-30-a-security-perspective/
-
Patch Now: Kubernetes RCE Flaw Allows Full Takeover of Windows Nodes
Tags: container, exploit, flaw, kubernetes, open-source, rce, remote-code-execution, update, vulnerability, windowsAttackers can remotely execute code with system privileges by exploiting a vulnerability in the source code of the open source container management sy… First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/patch-now-kubernetes-flaw-allows-for-full-takeover-of-windows-nodes
-
The Future of Kubernetes Network Policy
Introduction In the ever-changing world of Kubernetes security, it’s crucial to stay ahead of threats while maintaining operational The post tion In t… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/the-future-of-kubernetes-network-policy/
-
iX-Praxis-Workshop: Leitfaden für Cloud-Native-Architekturen und Kubernetes
First seen on heise.de Jump to article: heise.de/news/iX-Workshop-Cloud-native-Umgebungen-aufbauen-10-Rabatt-bis-20-02-9633898.html
-
Introducing Runtime-based Vulnerability Management turning vulnerability data into actionable intelligence
Struggling to manage vulnerabilities in your Kubernetes environment? You’re not alone. Traditional vulnerability management tools often leave security… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/02/introducing-runtime-based-vulnerability-management-turning-vulnerability-data-into-actionable-intelligence/
-
How To Monitor Kubernetes Audit Logs
In today’s fast-paced landscape of container orchestration, Kubernetes is a powerful tool for managing and scaling applications. However, ensuring the… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/02/how-to-monitor-kubernetes-audit-logs/

