
5 important security settings you need to review for your GKE clusters
There are some very important settings related to security that you should regularly review in your Google Kubernetes Engine based K8S clusters
There are some very important settings related to security that you should regularly review in your Google Kubernetes Engine based K8S clusters
A quick technical analysis of the AWS CloudShell service that provides a pre-configured shell on the cloud with access to your AWS account.
Docker announced new limits on image pulls from its Hub. We examine how it may impact your K8s operations.
An authentication bypass within Apache Airflow allowed an attacker to login as any user in the Airflow system. Post exploitation within the app, led to a full cloud account compromise on AWS.
A new vulnerability named CVE-2020-15257 has been discovered in the networking namespace. Our blog covers the details.
A walkthrough of the slides covered as part of our Star Wars Day special webinar on IAM policy misconfigurations that can lead to privilege escalations and a takeover of the target AWS account.