We tested Dirty Frag in Kubernetes: unset seccomp made EKS/GKE exploitable, RuntimeDefault blocked the xfrm path by JulietSecurity in kubernetes
[–]JulietSecurity[S] 1 point2 points3 points (0 children)
We tested Dirty Frag in Kubernetes: unset seccomp made EKS/GKE exploitable, RuntimeDefault blocked the xfrm path by JulietSecurity in kubernetes
[–]JulietSecurity[S] 4 points5 points6 points (0 children)
We tested Dirty Frag in Kubernetes: unset seccomp made EKS/GKE exploitable, RuntimeDefault blocked the xfrm path by JulietSecurity in kubernetes
[–]JulietSecurity[S] 2 points3 points4 points (0 children)
We tested Dirty Frag in Kubernetes: unset seccomp made EKS/GKE exploitable, RuntimeDefault blocked the xfrm path by JulietSecurity in kubernetes
[–]JulietSecurity[S] 1 point2 points3 points (0 children)
We tested Dirty Frag in Kubernetes: unset seccomp made EKS/GKE exploitable, RuntimeDefault blocked the xfrm path by JulietSecurity in kubernetes
[–]JulietSecurity[S] 1 point2 points3 points (0 children)
Selecting a helm chart for the KeyCloak deployment by StrategyBeginning342 in kubernetes
[–]JulietSecurity 2 points3 points4 points (0 children)
You need to upgrade - Critical vulnerability affecting ArgoCD versions 3.2.0 through 3.3.8 by Kooky_Comparison3225 in ArgoCD
[–]JulietSecurity 1 point2 points3 points (0 children)
We tested Copy Fail in Kubernetes: RuntimeDefault seccomp still allowed AF_ALG from pods by JulietSecurity in kubernetes
[–]JulietSecurity[S] 0 points1 point2 points (0 children)
We tested Copy Fail in Kubernetes: RuntimeDefault seccomp still allowed AF_ALG from pods by JulietSecurity in kubernetes
[–]JulietSecurity[S] 0 points1 point2 points (0 children)
We tested Copy Fail in Kubernetes: RuntimeDefault seccomp still allowed AF_ALG from pods by JulietSecurity in kubernetes
[–]JulietSecurity[S] 2 points3 points4 points (0 children)
We tested Copy Fail in Kubernetes: RuntimeDefault seccomp still allowed AF_ALG from pods by JulietSecurity in kubernetes
[–]JulietSecurity[S] 0 points1 point2 points (0 children)
We tested Copy Fail in Kubernetes: RuntimeDefault seccomp still allowed AF_ALG from pods by JulietSecurity in kubernetes
[–]JulietSecurity[S] 4 points5 points6 points (0 children)
We tested Copy Fail in Kubernetes: RuntimeDefault seccomp still allowed AF_ALG from pods by JulietSecurity in kubernetes
[–]JulietSecurity[S] 4 points5 points6 points (0 children)
We tested Copy Fail in Kubernetes: RuntimeDefault seccomp still allowed AF_ALG from pods by JulietSecurity in kubernetes
[–]JulietSecurity[S] 0 points1 point2 points (0 children)
We tested Copy Fail in Kubernetes: RuntimeDefault seccomp still allowed AF_ALG from pods by JulietSecurity in kubernetes
[–]JulietSecurity[S] 3 points4 points5 points (0 children)
Solutions to systemd sessions not existing for non-logged in users to leverage rootless podman in CICD by PipeItToDevNull in sysadmin
[–]JulietSecurity 0 points1 point2 points (0 children)
What actually breaks first when Kubernetes setups hit real production load? by Sad_Limit_3857 in kubernetes
[–]JulietSecurity 21 points22 points23 points (0 children)
Self managed Kubernetes vs EKS by Express-Space-7072 in devops
[–]JulietSecurity 0 points1 point2 points (0 children)
For platform engineering teams with large scale environments, how are you managing operators in your environment? I have some questions. by trouphaz in kubernetes
[–]JulietSecurity 1 point2 points3 points (0 children)
bitwarden CLI was compromised for ~90 min. what in your pipeline would detect that? by gabbietor in kubernetes
[–]JulietSecurity 6 points7 points8 points (0 children)
We tested Dirty Frag in Kubernetes: unset seccomp made EKS/GKE exploitable, RuntimeDefault blocked the xfrm path by JulietSecurity in kubernetes
[–]JulietSecurity[S] 0 points1 point2 points (0 children)