Kubernetes owners who expose APIs to the Internet are leaving their systems open to hackers.
New research on Kubernetes security suggests that hundreds of installations worldwide have been hijacked for cryptomining — most due to a combination of recent reported vulnerabilities and Kubernetes APIs exposed to the Internet with no authentication required for access.
Kubernetes combines groups of containers into structures called "pods." According to Binary Edge's report, "By having this exposed, an attacker can not only see what is running on the Pods, but also execute commands on the Pods themselves."
In addition to exposing Kubernetes APIs for use by cryptominers, the report also says the scanned instances can expose critical data and passwords.
Read more here.
About the Author(s)
You May Also Like
Securing Code in the Age of AI
April 24, 2024Beyond Spam Filters and Firewalls: Preventing Business Email Compromises in the Modern Enterprise
April 30, 2024Key Findings from the State of AppSec Report 2024
May 7, 2024Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024