Latest Security News about container security

Privilege escalation vulnerability in MicroK8s allows a low privilege user with local access to obtain root access to the host by provisioning a privileged container. Fixed in MicroK8s 1.15.3.

Overview : Privilege escalation vulnerability in MicroK8s allows a low privilege user with local access to obtain root access to the host by provisioning a privileged container. Fixed in MicroK8s 1.15.3. MICROK8S - PRIVILEGE ESCALATION (CVE-2019-15789) Sep 10 2019 MicroK8s prior to v1.15.3 included a privilege escalation vulnerability, allowing a low privilege user to obtain [...]

Data Center Security Privilege Escalation

Overview : Symantec Data Center Security Manager Component, prior to 6.8.2 (aka 6.8 MP2), may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user. CVE-2020-5832   [...]

Latest Security vulnerabilities in Cisco products

Overview : Cisco IOS XE Software NAT Session Initiation Protocol Application Layer Gateway Denial of Service Vulnerability  CWE-399/ CVE-2019-12646 A vulnerability in the Network Address Translation (NAT) Session Initiation Protocol (SIP) Application Layer Gateway (ALG) of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. Cisco Catalyst […]

Kubernetes WAF for API security in the cloud

As most of the applications are moving to cloud , there are many factors which needs to be addressed . Reliability, Data management, Scalability, Cost and Security . Among all these , 37%  focus is on security . Cyber security is the #1 concern in almost all the cloud deployments . These days all the […]

Kubernetes Cyber Security

Kubernetes Cyber SecurityKubernetes Cyber Security using AI powered Next Generation kubeWAF How kubeWAF Works KubeWAF  is an Enterprise Grade Native Container Security Solution. It intelligently analyses the requests parsed to your API Endpoints and send only legitimate traffic to the pods and blocks any attack vectors How to Secure your Kubernetes Container Upgrade to the [...]