Summary

Top Articles:

  • What sucks in security? Research findings from 50+ security leaders
  • Cloud Native Maturity Model 2.0
  • Helm completes fuzzing security audit
  • Notes from CloudNativeSecurityCon 2023
  • Ada Logics: CRI-O holistic security audit engagement
  • Open Sourcing runc Security Audit
  • Accelerating Machine Learning with GPUs in Kubernetes using the NVIDIA Device Plugin
  • Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)
  • CNCF & OpenSSF Announce Open Source SecurityCon 2025

Helm completes fuzzing security audit

Published: 2023-03-31 15:00:00

Popularity: 1

Author: Jessie

Keywords:

  • Blog
  • Project post originally published on Helm blog by Adam Korczynski, David Korczynski, and Martin Hickey In the past year, the team at Ada Logics has worked on integrating continuous fuzzing into the Helm core project. This was an effort focused on...

    ...more

    Notes from CloudNativeSecurityCon 2023

    Published: 2023-02-20 16:00:00

    Popularity: None

    Author: Jessie

    Keywords:

  • Blog
  • Guest post originally published on the Nirmata blog by Jim Bugwadia The Cloud Native Computing Foundation (CNCF) held the first ever standalone Cloud Native Security Conference in Seattle on February 1st and 2nd. Here are some of my...

    ...more

    Ada Logics: CRI-O holistic security audit engagement

    Published: 2022-06-06 19:26:36

    Popularity: None

    Author: Jessie

    Keywords:

  • Blog
  • Community post originally on the Ada Logics blog by David Korczynski, Security Research & Security Engineering and Adam Korczynski, Security Engineering & Security Automation, Ada Logics Ada Logics Ltd. recently performed a holistic security audit of CRI-O. CRI-O is...

    ...more

    Cloud Native Maturity Model 2.0

    Published: 2022-05-18 07:00:00

    Popularity: 4

    Author: Jessie

    Keywords:

  • Blog
  • Community post by Danielle Cook, Simon Forster for the Cartographos Working Group KubeCon 2021 in North America saw the launch of the Cloud Native Maturity Model, a model launched by the Cartografos Working Group to help adopters and...

    ...more

    Open Sourcing runc Security Audit

    Published: 2020-01-31 16:00:34

    Popularity: None

    Author: Amye Scavarda Perrin

    Keywords:

  • Blog
  • audit
  • runc
  • 🤖: "Audit alert!"

    Last last year, Cure53 performed a security audit of runc. runc is a CLI tool for spawning and running containers according to the OCI specification.  There were two different focuses... The post Open Sourcing runc Security Audit appeared first on Open Container Initiative.

    ...more

    Accelerating Machine Learning with GPUs in Kubernetes using the NVIDIA Device Plugin

    Published: 2024-04-30 15:00:00

    Popularity: None

    Author: Jessie

    Keywords:

  • Blog
  • Member post originally published on the SuberOrbital blog by Keegan McCallum NVIDIA Device Plugin for Kubernetes plays a crucial role in enabling organizations to harness the power of GPUs for accelerating machine learning workloads. Introduction Generative AI is...

    ...more

    What sucks in security? Research findings from 50+ security leaders

    Published: 2024-12-10 16:00:00

    Popularity: 5

    Author: Clint Gibler

    Keywords:

  • Blog
  • 🤖: "Security sucks"

    A deep dive into what CISOs are actually complaining about

    ...more

    Windows File Explorer Spoofing Vulnerability (CVE-2025-24071)

    Published: 2025-03-19 07:33:50

    Popularity: None

    Author: NSFOCUS

    Keywords:

  • Security Bloggers Network
  • Blog
  • CVE-2025-24071
  • Emergency Response
  • Windows
  • Windows vulnerability
  • 🤖: ""Fake folder found""

    Overview Recently, NSFOCUS CERT detected that Microsoft released a security announcement and fixed the spoofing vulnerability of Windows File Explorer (CVE-2025-24071), with a CVSS score of 7.5. Due to the implicit trust and automatic file parsing behavior of .library-ms files by Windows Explorer, unauthenticated attackers can save files by constructing RAR/ZIP with an embedded malicious […] The post Windows File Explorer Spoofing Vulnerability (CVE-2025-24071) appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.. The post Windows File Explorer Spoofing Vulnerability (CVE-2025-24071) appeared first on Security Boulevard.

    ...more

    CNCF & OpenSSF Announce Open Source SecurityCon 2025

    Published: 2025-03-17 13:00:00

    Popularity: None

    Author: valerie

    Keywords:

  • Blog
  • 🤖: "Security Alert!"

    The Cloud Native Computing Foundation (CNCF) and the Open Source Security Foundation (OpenSSF) are thrilled to introduce Open Source SecurityCon 2025—a premier event focused on strengthening cloud-native and open source software security. This one-day conference, set...

    ...more

    end