A Shmoocon presentation points out several weaknesses built in to Kubernetes configurations and how a researcher can exploit them.
...moreTotal Articles Found: 7
Top sources:
Top Keywords:
Top Authors
Top Articles:
Published: 2020-02-04 15:45:00
Popularity: 75
Author: Curtis Franklin Jr. Senior Editor at Dark Reading
A Shmoocon presentation points out several weaknesses built in to Kubernetes configurations and how a researcher can exploit them.
...morePublished: 2019-08-12 21:30:00
Popularity: 131
Author: Curtis Franklin Jr. Senior Editor at Dark Reading
Attackers can use vulnerable drivers to escalate privilege and execute malicious code in every part of the system.
...morePublished: 2019-07-19 17:30:00
Popularity: 164
Author: Curtis Franklin Jr. Senior Editor at Dark Reading
A code backdoor in a package on the Python Package Index demonstrates the importance of verifying code brought in from code repositories.
...morePublished: 2019-06-27 18:45:00
Popularity: 183
Author: Curtis Franklin Jr. Senior Editor at Dark Reading
The dependency trees of modern software-development make smaller open-source projects vulnerable to hackers sabotaging code.
...morePublished: 2019-06-27 22:30:00
Popularity: 73
Author: Curtis Franklin Jr. Senior Editor at Dark Reading
Alphabet's enterprise cybersecurity division will become part of the Google security portfolio.
...morePublished: 2019-05-30 22:00:00
Popularity: 211
Author: Curtis Franklin Jr. Senior Editor at Dark Reading
A old vulnerability in Alpine Linux containers has spread and propagated to as much as 20% of the containers on the Docker Store.
...morePublished: 2019-05-29 21:00:00
Popularity: 287
Author: Curtis Franklin Jr. Senior Editor at Dark Reading
Under very specific conditions, code running in a Docker container could access files anywhere on a server, according to a new CVE.
...more