Cybersecurity News Everyday
Cybersecurity News Everyday @TweetThreatNews ·
CVE-2020-8561 exploits an SSRF flaw in Kubernetes API server’s ValidatingWebhookConfiguration and profiling endpoints to expose full responses. Requires cluster-admin creds to escalate impact. #KubernetesSecurity #SSRF #CVE20208561 ift.tt/LEbouZ0
Unpatchable Vulnerabilities of Kubernetes: CVE-2020-8561 | Datadog Security Labs

This article explains CVE-2020-8561, an unpatchable Kubernetes vulnerability that combines an SSRF vector via ValidatingWebhookConfiguration objects with the API server's profiling endpoints to...

From hendryadrian.com
80
Gomboo AI
Gomboo AI @GombooAi ·
K8s RBAC тохируулсан ч Pod Security Standards мартвал — дотроос нь эвдэж болно. `privileged` container + hostPID=true = node takeover. Baseline profile MINIMUM. Production-д Restricted policy enforce хий, exceptions тус бүрийг audit хий. 🐻 #KubernetesSecurity #RBAC
9
X CyberSec
X CyberSec @xcybersecnews ·
🚨 Heads up, Docker & Kubernetes users! A critical Trivy hack is unleashing an infostealer via Docker, spreading as a worm, and wiping Kubernetes clusters. This isn't just a leak, it's a wipe! #Cybersecurity #KubernetesSecurity thehackernews.com/2026/03/trivy-…
Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper

Trivy supply chain attack pushed malicious Docker images on March 22, enabling credential theft and worm spread, impacting cloud environments.

From thehackernews.com
33
Kubegrade
Kubegrade @kubegrade ·
North Korean hackers exploit Kubernetes to steal crypto assets in a sophisticated cloud breach, per Google. Discover strategies to safeguard your clusters now: the420.in/north-korea-un… #KubernetesSecurity
Hackers Exploit Kubernetes and Cloud SQL in Sophisticated Crypto Theft

A cyber intrusion attributed to a suspected North Korean threat group reveals how attackers can move from a developer’s personal device to corporate cloud infrastructure, exploiting DevOps workflow…

From the420.in
25
nivelepsilon
nivelepsilon @FpeSre ·
🔐 Analysing Kubernetes RBAC as a pivotal security paradigm, this study elucidates hierarchical access control mechanisms to fortify cluster integrity. #KubernetesSecurity 🔒 #RBAC #CyberDefence nivelepsilon.com/2023/12/25/und…
Understanding Kubernetes RBAC: Safeguarding Your Cluster - Blog NivelEpsilon

Role-Based Access Control (RBAC) stands as a cornerstone for securing and managing access within the Kubernetes ecosystem. Think of Kubernetes as a bustling city, with myriad services, pods, and...

From nivelepsilon.com
2
TechDemocracy
TechDemocracy @techdemocracy ·
Replying to @techdemocracy
Learn how organizations can strengthen identity governance in Kubernetes environments: techdemocracy.com/resources/non-… #IdentitySecurity #KubernetesSecurity #ZeroTrust #CloudSecurity #Cybersecurity
Non-Human Identities in Kubernetes | Zero-Trust Strategy

Discover how a zero-trust strategy can secure non-human identities in Kubernetes. Protect sensitive data with prevention, detection, and recovery. Know more!

From techdemocracy.com
3