Kubernetes Deployments Around the World Show Vulnerabilities

  /     /     /  
Publicated : 23/11/2024   Category : security


Kubernetes Deployments Around the World Show Vulnerabilities


Kubernetes owners who expose APIs to the Internet are leaving their systems open to hackers.



New research on Kubernetes security suggests that hundreds of installations worldwide have been hijacked for cryptomining — most due to a combination of recent reported vulnerabilities and Kubernetes APIs exposed to the Internet with no authentication required for access.
Kubernetes combines groups of containers into structures called pods. According to Binary Edges report, By having this exposed, an attacker can not only see what is running on the Pods, but also execute commands on the Pods themselves.
In addition to exposing Kubernetes APIs for use by cryptominers, the report also says the scanned instances can expose critical data and passwords.
Read more 
here
.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Kubernetes Deployments Around the World Show Vulnerabilities