Aggregator
CVE-2017-11333 | Xiph.Org libvorbis 1.3.5 WAV File lib/block.c vorbis_analysis_wrote access control (DLA 1368-1 / EDB-42399)
When & Why to Hand Over the Keys to Your Kubernetes Infrastructure
In the constantly maturing landscape of cloud-native technologies, Kubernetes reigns as the de facto standard for container orchestration. However, managing Kubernetes infrastructure can be a complex and resource-intensive task, particularly if your organization doesn’t have a bench of Kubernetes experts in-house (and few do). There are many benefits to handing over the keys to your K8s infrastructure to a managed Kubernetes-as-a-Service provider rather than managing it in-house, but many teams aren’t sure when it makes sense to take one approach over another. Let’s walk through the pros and cons of each approach.
The post When & Why to Hand Over the Keys to Your Kubernetes Infrastructure appeared first on Security Boulevard.
CVE-2006-3682 | awstats 6.5 1.857 Installation awstats.pl cross site scripting (EDB-32870 / Nessus ID 27940)
Log4Shell Vulnerability | Log4j Still Being Exploited | Contrast Security
Three years ago this month, the security world found out about a massive vulnerability in the Log4j library. Log4Shell attacks began within hours. They haven't stopped, because, remarkably, many organizations haven't fixed it.
The post Log4Shell Vulnerability | Log4j Still Being Exploited | Contrast Security appeared first on Security Boulevard.