Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Microsoft warns the default helmets can leave Kubernetes applications that are subjected to data leak
Global Security

Microsoft warns the default helmets can leave Kubernetes applications that are subjected to data leak

AdminBy AdminMay 6, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


06 May 2025Red LakshmananCloud security / devops

Microsoft warned that use pre -made templates such as leaving the box during the box for the way Kubernetes The deployment can open the door for incorrect conditions and valuable leaks.

“While these” connecting and players “options greatly simplify the process of setting, they often prefer the simplicity of security,” Michael Katchinsky and Josi Wezman from Defender for Cloud Research Team – Note.

“As a result, a large number of applications are ultimately unfolding in incorrect default setting, exposing the attackers that expose sensitive data, cloud resources, or even the whole environment.”

Helm is a package manager for Kubernetes, which allows developers to pack, customize and deploy applications and services on the kubernetes. This is part of the Cloud Native Computing Fund (CNCF).

Cybersecurity

Kubernetes app packets built in a packing helmet called graphswhich are manifestos of YAML and templates used to describe the resources and configurations of the Kubernetes required to deploy the application.

Microsoft noted that open source projects often include default manifestations or pre-defined helmets that prioritize prostate use in the field of security, in particular, leading to two major problems-

  • Exposing services outside without proper network restrictions
  • Lack of proper built -in authentication or default resolution

As a result, the organization that uses these projects without reviewing the images of YAML, and the charts of the helmet can be unintentional to expose their applications to the attackers. This may have serious consequences if the expanded application facilitates the sensitive API requests or allowing administrative actions.

Some of the identified projects that could subjugate the Cober -yadniya under threat of attacks – the following –

  • Apache Pinot which expose Basic components of Datastore Datastore, Pinot Control and Pinot-Broker, online through Kubernetes Loadbalancer services without default default
  • The net that expose Application interface through external IP -Drace, allowing anyone who has access to IP -Drace, subscribe with a new user, access the interface and deploy new pods, resulting in an arbitrary code
  • Selevius network that expose NODEPORT Service at a certain port in all knots in the cluster kubernetes, making the external firewall rules a single line of defense
Cybersecurity

To mitigate the risks associated with such incorrect guidances, it is recommended to revise and change them according to the best security practices, periodically scanning the interfaces and control the work of containers for malicious and suspicious activities.

“Many input-exploiting container applications originate in the improperly tuned load, often when using the default settings,” the researchers said. “Based on” default on convenience “, they create a significant risk of safety.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.