<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Kubernetes in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Kubernetes/m-p/16876#M1968</link>
    <description>&lt;P&gt;Even if you don't run Kubernetes (and I know &lt;A href="https://community.isc2.org/t5/Tech-Talk/Kube-Cluster-and-Container-security/m-p/16866" target="_blank"&gt;some of you do&lt;/A&gt;), you probably need to pay attention to their security bug.&amp;nbsp; See, Kubernetes is an infrastructure component of a lot of cloud systems--and, nowadays, who isn't running, storing, or managing something in the cloud?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The &lt;A href="https://nakedsecurity.sophos.com/2018/12/05/kubernetes-cloud-computing-bug-could-rain-data-for-attackers/" target="_blank"&gt;flaw&lt;/A&gt;, in brief, allows anyone to submit a malformed request to Kubernetes pods over the API.&amp;nbsp; Rather than simply being ignored, this allows the attacker to then submit further requests without any authorization checking.&amp;nbsp; Which means that attackers can do pretty much anything with the pods.&amp;nbsp; Which means they can get at pretty much anything you've got on the cloud that is managed via Kubernetes.&amp;nbsp; Or that anyone is managing on your behalf using Kubernetes ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The bug is now fixed.&amp;nbsp; If you run Kubernetes make sure you are updated to the latest level.&amp;nbsp; If you don't run Kubernetes, find out if anyone you rely on does ...&lt;/P&gt;</description>
    <pubDate>Mon, 09 Oct 2023 09:02:08 GMT</pubDate>
    <dc:creator>rslade</dc:creator>
    <dc:date>2023-10-09T09:02:08Z</dc:date>
    <item>
      <title>Kubernetes</title>
      <link>https://community.isc2.org/t5/Industry-News/Kubernetes/m-p/16876#M1968</link>
      <description>&lt;P&gt;Even if you don't run Kubernetes (and I know &lt;A href="https://community.isc2.org/t5/Tech-Talk/Kube-Cluster-and-Container-security/m-p/16866" target="_blank"&gt;some of you do&lt;/A&gt;), you probably need to pay attention to their security bug.&amp;nbsp; See, Kubernetes is an infrastructure component of a lot of cloud systems--and, nowadays, who isn't running, storing, or managing something in the cloud?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The &lt;A href="https://nakedsecurity.sophos.com/2018/12/05/kubernetes-cloud-computing-bug-could-rain-data-for-attackers/" target="_blank"&gt;flaw&lt;/A&gt;, in brief, allows anyone to submit a malformed request to Kubernetes pods over the API.&amp;nbsp; Rather than simply being ignored, this allows the attacker to then submit further requests without any authorization checking.&amp;nbsp; Which means that attackers can do pretty much anything with the pods.&amp;nbsp; Which means they can get at pretty much anything you've got on the cloud that is managed via Kubernetes.&amp;nbsp; Or that anyone is managing on your behalf using Kubernetes ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The bug is now fixed.&amp;nbsp; If you run Kubernetes make sure you are updated to the latest level.&amp;nbsp; If you don't run Kubernetes, find out if anyone you rely on does ...&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:02:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Kubernetes/m-p/16876#M1968</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2023-10-09T09:02:08Z</dc:date>
    </item>
  </channel>
</rss>

