Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

kubernetes

Securing the software supply chain, with Kim Lewandowski: Lock and Code S03E13

20 June 2022

At the start of the global coronavirus pandemic, nearly everyone was forced to learn about the “supply chain.” Immediate stockpiling by …

Tags Chainguard, Codes, Containers, Google, kubernetes

Detect Log4j Vulnerability Using ACS

4 February 2022

In this article, I will discuss how to detect Log4j vulnerability using Red Hat Advanced Cluster Security or ACS, which will help you to …

Tags Containers, Detect, Google, IT, kubernetes

What Does 2022 Have in Store for Cybersecurity and Cloud Security Specialists?

5 January 2022

Cloud adoption and industry transformation are accelerating as the world looks for efficiency. Let’s face it, 2022 promises to be another …

Tags Containers, Containers (Cloud Computing), Google, kubernetes, Open Source

Scanning for Vulnerabilities in Cloud-Native Applications

20 July 2021

With the increasing adoption of cloud-native principles, tools and platforms, security risks also increase, but they can be mitigated using …

Tags Containers, Containers (Cloud Computing), Google, IT, kubernetes

4 things to know to secure your new kubernetes environment

2 July 2021

Security professionals are challenged with securing physical devices, networks, cloud, BYOD, IOT and against internal and external threats. …

Tags Containers, Google, kubernetes, Open Source, Open Source Software

How to use oauth2-proxy for central authentication

8 June 2021

This blog post will show you how to use one central oauth2-proxy as authentication proxy for multiple services inside your Kubernetes …

Tags Containers, Google, How, kubernetes, Microservices

Ubuntu in the wild – 13th of April 2021

13 April 2021

The Ubuntu in the wild blog post ropes in the latest highlights about Ubuntu and Canonical around the world on a bi-weekly basis. It is a …

Tags Containers, Google, IT, kubernetes, WSL

API Security Weekly: Issue #120

11 February 2021

This week, we take a look at the security issues in cheap video doorbells and security cameras, as well as tutorials and webinars on …

Tags Containers, Google, Issues, IT, kubernetes

How to Help Your Security Team Help You

13 August 2020

KubeCon + CloudNativeCon and Prisma from Palo Alto Networks sponsored this post, in anticipation of the virtual KubeCon + CloudNativeCon …

Tags Containers, Google, Help, How, kubernetes

CNCF Webinar: Five Recently-Unearthed Kubernetes Security Vulnerabilities

3 August 2020

As Kubernetes grows in popularity, it has attracted the attention of more security researchers, who probe the software looking for …

Tags CNCF, Containers, Google, kubernetes, Security Pro

The New Stack Context: Operators Can Be a Security Hazard

31 July 2020

A few years back, Kubernetes was in full development and many of its basic concepts were still evolving, so security was not a huge …

Tags Containers, Context, Google, kubernetes, Operators

Build, Deploy, Runtime: The 3 Stages of Kubernetes Security

28 July 2020

Kubernetes security is an issue for many organizations. In a 2020 report covered by TechRepublic, 94% of respondents revealed that their …

Tags Builds, Containers, Deploy, Google, kubernetes

Security With Falco

17 July 2020

Securing a container platform is a multi-step process spanning from development to production. The process of securing containers is …

Tags Container Security, Containers, DevOps, Google, kubernetes

Why DevOps teams need to take container security seriously [Q&A]

17 July 2020

Earlier this year hackers were able to exploit container platform Kubernetes to install cryptomining software in Microsoft Azure. Fei …

Tags Articles, Containers, Google, kubernetes, Open Source
Post navigation
Older posts
Page1 Page2 … Page11 Next →
Cookie-Free

NVD

  • CVE-2022-2736 – A vulnerability was found in SourceCodester Company Website CMS. It has been classified as …11 August 2022
  • CVE-2022-2770 – A vulnerability, which was classified as critical, was found in SourceCodester Simple Onli …11 August 2022
  • CVE-2022-20244 – In Bluetooth, there is a possible out of bounds write due to a missing bounds check. This …11 August 2022
  • CVE-2022-20372 – In exynos5_i2c_irq of (TBD), there is a possible out of bounds write due to a use after fr …11 August 2022
  • CVE-2022-20403 – Product: AndroidVersions: Android kernelAndroid ID: A-207975764References: N/A …11 August 2022
  • CVE-2022-35665 – Adobe Acrobat Reader versions 22.001.20169 (and earlier), 20.005.30362 (and earlier) and 1 …11 August 2022

EXPLOITS

  • ThingsBoard 3.3.1 ‘description’ – Stored Cross-Site Scripting (XSS)9 August 2022
  • ThingsBoard 3.3.1 ‘name’ – Stored Cross-Site Scripting (XSS)9 August 2022
  • Feehi CMS 2.1.1 – Stored Cross-Site Scripting (XSS)9 August 2022
  • Prestashop blockwishlist module 2.1.0 – SQLi9 August 2022
  • PAN-OS 10.0 – Remote Code Execution (RCE) (Authenticated)9 August 2022
  • uftpd 2.10 – Directory Traversal (Authenticated)3 August 2022

SECURELIST

  • OpenTIP, command line edition11 August 2022
  • VileRAT: DeathStalker’s continuous strike at foreign and cryptocurrency exchanges10 August 2022
  • Andariel deploys DTrack and Maui ransomware9 August 2022
  • Targeted attack on industrial enterprises and public institutions8 August 2022
  • DDoS attacks in Q2 20223 August 2022
  • LofyLife: malicious npm packages steal Discord tokens and bank card data28 July 2022
Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »