Vulnerability gave attackers with access to a pod a way to obtain credentials and other secrets.
Follow Dark Reading:
 August 21, 2024
LATEST SECURITY NEWS & COMMENTARY
Azure Kubernetes Bug Lays Open Cluster Secrets
Vulnerability gave attackers with access to a pod a way to obtain credentials and other secrets.
IRGC-Linked Hackers Package Modular Malware in Monolithic Trojan
Charming Kitten goes retro and consolidates its backdoor into a tighter package, abandoning the malware framework trend.
US Intelligence Blames Iran for Hack on Trump Campaign
Feds confirmed Iran's involvement in the email attack against Roger Stone after Microsoft, Google reported Iranian APT action against both presidential campaigns.
Toyota Customer, Employee Data Leaked in Confirmed Data Breach
The company has released little information on the breach, but claims it's been in contact with the individuals affected.
Chinese Wi-Fi Router Vendor Draws US Congressional Ire
Two congressmen want the US Commerce Department to examine the company's goods and decide if they pose a threat.
Human Nature Is Causing Our Cybersecurity Problem
By moving beyond guidelines and enforcing accountability, encouraging innovation, and prioritizing the safety and well-being of our communities in the digital age, we can build a more secure software future.
Name That Toon: Security Games
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
(Sponsored Article) Why CISOs Need Application Detection and Response
Server-side applications and APIs handle sensitive data but are poorly defended, making them tempting cybercrime targets.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Every Google Pixel Phone Has a Verizon App that Doubles As a Backdoor
What is a Verizon Wireless demo store app doing on non-Verizon phones, and why is it a vehicle to an attacker?

National Public Data Confirms Massive Breach
Cyber incidents like this highlight the need for tougher action on companies that fail to adequately protect consumer data.

A Critical Look at the State Department's Risk Management Profile
The US needs to seize this moment to set a global standard for responsible and ethical AI, ensuring that technological progress upholds and advances human rights.

MORE
PRODUCTS & RELEASES
EDITORS' CHOICE
Multiple Microsoft Apps for macOS Vulnerable to Library Injection Attacks
Outlook, Teams, PowerPoint, OneNote, Excel, and Word undermine macOS's strict user permission-based privacy and security protections.
LATEST FROM THE EDGE

Researchers Highlight How Poisoned LLMs Can Suggest Vulnerable Code
CodeBreaker technique can create code samples that poison the output of code-completing LLMs, resulting in vulnerable — and undetectable — code suggestions.
LATEST FROM DR TECHNOLOGY

How Can Organizations Navigate SEC's Cyber Materiality Disclosures?
Inconsistencies and lack of information in cybersecurity disclosures highlight the need for organizations to establish a robust materiality assessment framework.
LATEST FROM DR GLOBAL

Africa's Economies Feel Pain of Cybersecurity Deficit
While the combined gross domestic product (GDP) of African nations grew fivefold in two decades, a lack of cybersecurity is holding back gains — although the jury is out on how much.
WEBINARS
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.