Summary

Total Articles Found: 2

Top sources:

Top Keywords:

Top Authors

Top Articles:

  • How attackers use exposed Prometheus server to exploit Kubernetes clusters
  • EMERALDWHALE: 15k Cloud Credentials Stolen in Operation Targeting Exposed Git Config Files

How attackers use exposed Prometheus server to exploit Kubernetes clusters

Published: 2022-07-05 14:00:38

Popularity: 24

Author: Miguel Hernández

Keywords:

  • Docker
  • Kubernetes
  • Prometheus
  • You might think that your metrics are harmless from a security point of view. Well, that’s not true, and in... The post How attackers use exposed Prometheus server to exploit Kubernetes clusters appeared first on Sysdig.

    ...more

    EMERALDWHALE: 15k Cloud Credentials Stolen in Operation Targeting Exposed Git Config Files

    Published: 2024-10-31 12:31:50

    Popularity: None

    Author: Miguel Hernández

    🤖: "Cloud hack fail"

    EMERALDWHALE is an operation targeting exposed Git configurations, resulting in more than 15,000 cloud service credentials stolen.

    ...more

    end