The runaway success of Kubernetes adoption by enterprise software developers has created motivation for attackers to target these installations with specifically designed exploits that…
Kubernetes
-
-
GKE also supports anonymous access, and requests made to the Kubernetes API without presenting a client certificate or an authorized bearer token will automatically…
-
The latest version of Kubernetes released last month includes patches for an entire class of vulnerabilities that allow attackers to abuse the subPath property…
-
Kubernetes (K8s) clusters belonging to more than 350 organizations, open-source projects, and individuals have been detected as openly accessible and unprotected. More than half…
-
Application SecurityNewsSecurity
Expel announces MDR for Kubernetes with MITRE ATT&CK framework alignment
Security operations provider Expel has announced the general availability of Expel managed detection and response (MDR) for Kubernetes. The firm said the product enables…
-
In the past few years, we’ve seen a rapid increase in container adoption as the go-to strategy for accelerating software development. After all, why…