Liz Rice considers several facets where eBPF can help, from dynamic vulnerability patching through super-fast load balancing to multi-cluster networking. By Liz Rice Liz Rice considers several facets where eBPF can help, from dynamic vulnerability patching through super-fast load balancing to multi-cluster networking. By Liz RiceRead More
Two New Git Vulnerabilities Affecting Local Clones and Git Shell Patched
Two Git vulnerabilities affecting local clones and git shell interactive mode in version 2.38 and older have been recently patched. By Sergio De Simone Two Git vulnerabilities affecting local clones and git shell interactive mode in version 2.38 and older have been recently patched. By Sergio De SimoneRead More
Article: Polyglot Microservices Communication Using Dapr on AKS
Dapr is a useful tool for solving several challenges engineers might face. It allows engineering organizations to gain productivity by training developers on a common set of tools and techniques. It also helps adopt standardization in development, deployment, and debugging. By Gaurav Malhotra Dapr is a useful tool for solving several challenges engineers might face. It allows engineering organizations to gain productivity by training developers on a common set of tools and techniques. It also helps adopt standardization in development, deployment, and debugging. By Gaurav MalhotraRead More
Article: Polyglot Microservices Communication Using Dapr on AKS
Dapr is a useful tool for solving several challenges engineers might face. It allows engineering organizations to gain productivity by training developers on a common set of tools and techniques. It also helps adopt standardization in development, deployment, and debugging. By Gaurav Malhotra Dapr is a useful tool for solving several challenges engineers might face. It allows engineering organizations to gain productivity by training developers on a common set of tools and techniques. It also helps adopt standardization in development, deployment, and debugging. By Gaurav MalhotraRead More
Orca Security Report Finds Critical Assets Vulnerable Within Three Steps
A report from Orca Security found security gaps within the assessed cloud environments. These include unencrypted sensitive data, S3 buckets with public READ access, root accounts without multi-factor authentication enabled, and publically accessible Kubernetes API servers. In addition, they found that the average attack path only requires three steps to reach business-critical data or assets. By Matt Campbell A report from Orca Security found security gaps within the assessed cloud environments. These include unencrypted sensitive data, S3 buckets with public READ access, root accounts without multi-factor authentication enabled, and publically accessible Kubernetes API servers. In addition, they found that the average attack path only requires three steps to reach business-critical data or assets. By Matt CampbellRead More


