News

A key enhancement in Kubernetes 1.34 provides network operators with fine-grained control over traffic routing decisions within clusters.
Because the unauthorized requests are made over an established connection, they do not appear in the Kubernetes API server audit logs or server log.
The second vulnerability, CVE-2019-11253, renders the Kubernetes API server vulnerable to a denial-of-service attack, according to the bug report.
More than 380,000 Kubernetes API servers allow some kind of access to the public internet, making the popular open-source container-orchestration engine for managing cloud deployments an easy ...
This article provides an insight into the creation of the Ambassador open source API gateway for Kubernetes, and discusses the technical challenges and lessons learned from building a developer ...
There are a number of ways to secure your Kubernetes cluster, including restricting access to the API server, providing secure access at scale, and auditing Kubernetes access. Teleport can help with ...
The attacker attempts to gain a foothold in a Kubernetes environment by scanning for a misconfigured API server that would allow unauthenticated requests from users with privileges.
Microsoft on Tuesday announced the 'general availability' (GA) commercial release of Windows Server containers for use with the Azure Kubernetes Service (AKS).