Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. Other Discussions
  3. The Insider News
  4. Kubernetes' first major security hole discovered

Kubernetes' first major security hole discovered

Scheduled Pinned Locked Moved The Insider News
comhostingclouddevopsdocker
3 Posts 3 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • K Offline
    K Offline
    Kent Sharkey
    wrote on last edited by
    #1

    ZDNet[^]:

    There's now an invisible way to hack into the popular cloud container orchestration system Kubernetes.

    That actually took longer than I thought

    "There is no simple way to detect whether this vulnerability has been used." Yay, team!

    J M 2 Replies Last reply
    0
    • K Kent Sharkey

      ZDNet[^]:

      There's now an invisible way to hack into the popular cloud container orchestration system Kubernetes.

      That actually took longer than I thought

      "There is no simple way to detect whether this vulnerability has been used." Yay, team!

      J Offline
      J Offline
      Joe Woodbury
      wrote on last edited by
      #2

      Kent Sharkey wrote:

      That actually took longer than I thought

      They were busy hacking Quora. And designing new icons.

      1 Reply Last reply
      0
      • K Kent Sharkey

        ZDNet[^]:

        There's now an invisible way to hack into the popular cloud container orchestration system Kubernetes.

        That actually took longer than I thought

        "There is no simple way to detect whether this vulnerability has been used." Yay, team!

        M Offline
        M Offline
        Mark_Wallace
        wrote on last edited by
        #3

        And the best thing about getting into a cloud system is that you don't have to hack into a million computers to steal data from a million users. The cloud should get awards for being the best hackers' productivity tool of the century.

        I wanna be a eunuchs developer! Pass me a bread knife!

        1 Reply Last reply
        0
        Reply
        • Reply as topic
        Log in to reply
        • Oldest to Newest
        • Newest to Oldest
        • Most Votes


        • Login

        • Don't have an account? Register

        • Login or register to search.
        • First post
          Last post
        0
        • Categories
        • Recent
        • Tags
        • Popular
        • World
        • Users
        • Groups