Cybersecurity News – Hackers Aim No Worse Than Cupid

Take a glance at the most discussed cybersecurity news of the week. Happy Valentine’s Scam …
The post Cybersecurity News – Hackers Aim No Worse Than Cupid appeared first on EdGuards – Security for Education.
The post Cybersecurity News – … Continue reading Cybersecurity News – Hackers Aim No Worse Than Cupid

#TripwireBookClub – Pentesting Azure Applications

For the final book purchase of 2018, members of VERT decided to read “Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments,” written by Matt Burrough and published by No Starch Press. Matt has spent nearly… Continue reading #TripwireBookClub – Pentesting Azure Applications

Assess Your Risks

We talk a lot about phishing, vishing, smishing, and impersonation here at SECOM, and there is a good reason for that. Those are the primary services we provide as a company for our clients. Not all clients use all of our services, and some companies d… Continue reading Assess Your Risks

Kubernetes: unauth kublet API 10250 basic code exec

Unauth API access (10250)
Most Kubernetes deployments provide authentication for this port. But it’s still possible to expose it inadvertently and it’s still pretty common to find it exposed via the “insecure API service” option.

Everybody who … Continue reading Kubernetes: unauth kublet API 10250 basic code exec

Kubernetes: unauth kublet API 10250 token theft & kubectl

Kubernetes: unauthenticated kublet API (10250) token theft & kubectl access & exec
kube-hunter output to get us started:
do a curl -s https://k8-node:10250/runningpods/ to get a list of running pods
With that data, you can craft your post… Continue reading Kubernetes: unauth kublet API 10250 token theft & kubectl