News

Kubernetes nodes/proxy GET → RCE: how “telemetry” permissions can compromise a cluster

A subtle (and frankly surprising) Kubernetes authorization behavior has resurfaced as a practical cluster-compromise path: an identity granted nodes/proxy access with an HTTP Get can be leveraged to execute commands in Pods across the cluster—effectively turning what many teams treat as “read-only node telemetry access”…

0
NirmataTemplate Ritesh KubeCon 24

Introducing Nirmata Control Hub: DevSecOps Automation at Scale with Policy-as-Code

As modern enterprises embrace cloud-native technologies and hybrid multi-cloud environments, the complexity of managing security and compliance is reaching unprecedented levels. Each cloud platform comes with hundreds of services, adding layers of complexity to already intricate architectures. Containers have become the default packaging for modern…

0