Kubernetes vulnerability allows RCE on Windows endpoints (CVE-2023-3676)

Three high-severity Kubernetes vulnerabilities (CVE-2023-3676, CVE-2023-3893, CVE-2023-3955) could allow attackers to execute code remotely and gain control over all Windows nodes in the Kubernetes cluster. About the vulnerabilities CVE-2023-3676, disc… Continue reading Kubernetes vulnerability allows RCE on Windows endpoints (CVE-2023-3676)

Can kubernetes pods in the same or different namespace sniff the packets of other pods?

Since the pods share the same subnet, is it possible that one pod can sniff the network packets of other pods? Please explain the reason.
Note: I created 3 pods in the same namespace, on one pod I ran tcpdump to sniff the packets, and then… Continue reading Can kubernetes pods in the same or different namespace sniff the packets of other pods?

VMware Explore 2023: Keynote Highlights

Explore enterprise applications and infrastructure, AI, tools for the remote workforce, machine learning, and more from VMware Explore 2023. Continue reading VMware Explore 2023: Keynote Highlights

Kubernetes clusters face widespread attacks across numerous organizations

In this Help Net Security video, Assaf Morag, Lead Threat Intelligence Analyst at Aqua Security, discusses research that discovered openly accessible and unprotected Kubernetes clusters belonging to more than 350 organizations, open-source projects, an… Continue reading Kubernetes clusters face widespread attacks across numerous organizations

Cryptomining and Malware Flourish on Misconfigured Kubernetes Clusters

By Habiba Rashid
Aquasec Investigation Exposes Alarming Rise in Kubernetes Misconfigurations Leading to Catastrophic Breaches.
This is a post from HackRead.com Read the original post: Cryptomining and Malware Flourish on Misconfigured Kubernetes Clusters
Continue reading Cryptomining and Malware Flourish on Misconfigured Kubernetes Clusters

Scarleteel Threat Targets AWS Fargate, Launches DDoS and Cryptojacking Campaigns

The Scarleteel threat targets AWS Fargate environments for data theft and more malicious types of attacks such as cryptojacking and DDoS. Learn how to mitigate this threat. Continue reading Scarleteel Threat Targets AWS Fargate, Launches DDoS and Cryptojacking Campaigns