KubePi may allow unauthorized access to system API

### Summary API interfaces with unauthorized access will leak sensitive information /kubepi/api/v1/systems/operation/logs/search /kubepi/api/v1/systems/login/logs/search This vulnerability also exists ...

Continue Reading
KubeOperator allows unauthorized access to system API

### Summary API interfaces with unauthorized access will leak sensitive information /api/v1/clusters/kubeconfig/ ### Details Routes using v1 without any restrictions Directly pass in `downloadKubeconf ...

Continue Reading
CVE-2022-46258

An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed a repository-scoped token with read/write access to modify Action Workflow files without a Workflow sco ...

Continue Reading
​​Microsoft Entra: 5 identity priorities for 2023

Welcome to 2023. After the pandemic upended how we work, learn, play, and manage our lives, we find ourselves more connected than ever, with more convenient access to an ever-wider range of online too ...

Continue Reading
Security Bulletin: B2B API of IBM Sterling B2B Integrator is vulnerable to multiple issues due to FasterXML jackson-databind

## Summary IBM Sterling B2B Integrator has addressed the security vulnerabilities in jackson-databind in B2B API. ## Vulnerability Details ** CVEID: **[CVE-2019-20330]() ** DESCRIPTION: **A lacking of ...

Continue Reading
​​Microsoft Entra: 5 identity priorities for 2023

Welcome to 2023. After the pandemic upended how we work, learn, play, and manage our lives, we find ourselves more connected than ever, with more convenient access to an ever-wider range of online too ...

Continue Reading
Why Do User Permissions Matter for SaaS Security?

[![SaaS Security](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=)]() Earlier this year, threat actors infiltrated [Mailchimp](), the ...

Continue Reading
Kinsing Cryptojacking Hits Kubernetes Clusters via Misconfigured PostgreSQL

[![Kinsing Cryptojacking](data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR42mP8Xw8AAoMBgDTD2qgAAAAASUVORK5CYII=)]() The threat actors behind the **Kinsing** cryptojacking ...

Continue Reading

Back to Main

Subscribe for the latest news: