Kubesploit – Telegram
Kubesploit
1.95K subscribers
824 photos
128 videos
1.61K links
News and links on Kubernetes security curated by the @Learnk8s team
Website: https://kubesploit.io/
Download Telegram
2 Widespread attacks (Man-in-the-Middle, Cryptojacking attack) on your containerized wnvironment and 7 rules to prevent it

Read more: https://itnext.io/2-widespread-attacks-on-your-containerized-environment-and-7-rules-to-prevent-it-957aa7dfa5e0
Verifying Container image signatures in Kubernetes using Notary or Cosign or both

More https://medium.com/sse-blog/verify-container-image-signatures-in-kubernetes-using-notary-or-cosign-or-both-c25d9e79ec45
A HIGH severity vulnerability was found in Kubernetes in which users may be able to create a container with subpath volume mounts to access files & directories outside of the volume, including on the host filesystem

More: https://armosec.io/blog/kubescape-checks-if-kubernetes-exposed-to-k8s-symlink-vulnerability-cve202125741
In this blog, you will explore advanced persistent threat techniques used in container attacks, learn how rootkits work, and how adversaries are using them to attack cloud native environments.

Read more: https://blog.aquasec.com/advanced-persistent-threat-techniques-container-attacks
A Security Review of Docker Official Images: Which Do You Trust?

👉 https://blog.aquasec.com/docker-official-images
Forwarded from Daniele Polencic
👋 We’ve updated the Kubernetes instance calculator to include the recent change from the AWS-CNI. EC2 instances can have more pods than before, and that means running pods becomes cheaper.
You can find the calculator here: https://learnk8s.io/kubernetes-instance-calculator
Top Open Source Kubernetes security tools of 2021

Read on https://cloud.redhat.com/blog/top-open-source-kubernetes-security-tools-of-2021
How to secure your Kubernetes control plane and node components

Read more: https://cncf.io/blog/2021/08/20/how-to-secure-your-kubernetes-control-plane-and-node-components
Detect Malicious Behaviour on Kubernetes API Server through gathering Audit Logs by using FluentBit

https://falco.org/blog/detect-malicious-behaviour-on-kubernetes-api-server-through-gathering-audit-logs-by-using-fluentbit-part-2
This repository contains various use cases of Kubernetes Network Policies and sample YAML files to leverage in your setup. If you ever wondered how to drop/restrict traffic to applications running on Kubernetes, this is for you

Read on: https://github.com/ahmetb/kubernetes-network-policy-recipes
Curiefense extends Envoy proxy to defend against a variety of threats, including SQL and command injection, cross site noscripting (XSS), account takeovers (ATOs) and more

Read on https://github.com/curiefense/curiefense
Vault-CRD is a custom resource definition for holding secrets that are stored in HashiCorp Vault and kept up to date with Kubernetes secrets

Read more: https://github.com/DaspawnW/vault-crd
“Another LDAP” provides Authentication and Authorization for your applications running on Kubernetes

👉 https://github.com/dignajar/another-ldap
Peirates, a Kubernetes penetration tool, enables an attacker to escalate privilege and pivot through a Kubernetes cluster

Read on https://github.com/inguardians/peirates
Forwarded from Daniele Polencic
Quick update!
We’ve updated the Kubernetes troubleshooting flowchart to include translations in Spanish, Mandarin, Korean and Portuguese. Many thanks to @elnemesisdivina @yorchveintemil @usernametoken Marcelo & Hoon Jo! 👏👏👏

You can download the poster here: https://learnk8s.io/troubleshooting-deployments
Kubestriker is a platform-agnostic tool designed to tackle Kubernetes cluster security issues due to misconfigurations and will help strengthen the overall IT infrastructure of any organisation

https://github.com/vchinnipilli/kubestriker