Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

New Linux flaws allow password hash theft via core dumps in Ubuntu, Rhel, Fedora

Gaza “The Most Hungry Place on Earth”, All People at Risk of Hungry, United Nations Warning | Israeli-Palestinian Conflict News

Hegseth warns about China’s threat as Beijing’s Top Brass Skip Singapore Summit | Military News

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Microsoft warns that the default helm chart could leave Kubernetes apps exposed to data leaks
Identity

Microsoft warns that the default helm chart could leave Kubernetes apps exposed to data leaks

userBy userMay 6, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 6, 2025Ravi LakshmananCloud Security / DevOps

Microsoft warns that while deploying Kubernetes, it can use pre-made templates such as out-of-the-box Helm charts to open the door to misunderstanding and leak valuable data.

“These ‘plug and play’ options greatly simplify the setup process, but in many cases they prioritize ease of use over security,” says Michar Katchinskiy and Yossi Weizman of Microsoft Defender for Cloud Research Team.

“The result is that many applications will be deployed incorrectly by default, exposing sensitive data, cloud resources, or the entire environment to attackers.”

Helm is a Kubernetes package manager that allows developers to package, configure, and deploy applications and services into Kubernetes clusters. It is part of the Cloud Native Computing Foundation (CNCF).

Cybersecurity

A Kubernetes application package consists of a helm package format called a chart. This is a YAML manifest and template used to describe the Kubernetes resources and configuration required for app deployment.

Microsoft pointed out that open source projects often include default manifests or predefined helm charts that prioritize ease of use over security, leading to two major concerns in particular.

Rack by default for proper built-in authentication or authorization to expose services from outside without proper network restrictions

As a result, organizations using these projects without reviewing the YAML manifest or helm chart will inadvertently expose their applications to attackers. This can have serious consequences if deployed applications facilitate queries for sensitive APIs or allow management actions.

Some of the identified projects that could put a Kubernetes environment at risk of attacks are:

Apache Pinot, which exposes the main components of OLAP Datastore, Pinot-Controller and Pinot-Broker to the Internet via Kubernetes Loadbalancer Services, is now available to access IP addresses and new users by exposing the app’s interface through an external IP address, without authentication, by default, without authentication. Code execution selenium grid. This exposes node port services to a specific port across all nodes in a Kubernetes cluster, and makes external firewall rules the only line of defense

Cybersecurity

To mitigate the risks associated with such misconceptions, we recommend reviewing and modifying security best practices, periodically scanning for face-to-face interfaces, and monitoring your running containers for malicious and suspicious activity.

“In many cases, when using default settings, the internal use of many containerized applications often comes from misunderstood workloads,” the researchers said. “Relying on a ‘Defal by Concent’ setup poses a serious security risk. ”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Article70%: Joanne Barratt-Conference News
Next Article How much does Donald Trump’s tariff cost our family? | Donald Trump News
user
  • Website

Related Posts

New Linux flaws allow password hash theft via core dumps in Ubuntu, Rhel, Fedora

May 31, 2025

US DOJ seizes four domains that support cybercrime crypto services in global operations

May 31, 2025

Rust-based Eddiestealer malware steals browser data using Clickfix Captcha Trick

May 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

New Linux flaws allow password hash theft via core dumps in Ubuntu, Rhel, Fedora

Gaza “The Most Hungry Place on Earth”, All People at Risk of Hungry, United Nations Warning | Israeli-Palestinian Conflict News

Hegseth warns about China’s threat as Beijing’s Top Brass Skip Singapore Summit | Military News

US DOJ seizes four domains that support cybercrime crypto services in global operations

Trending Posts

Gaza “The Most Hungry Place on Earth”, All People at Risk of Hungry, United Nations Warning | Israeli-Palestinian Conflict News

May 31, 2025

Hegseth warns about China’s threat as Beijing’s Top Brass Skip Singapore Summit | Military News

May 31, 2025

Chinese Navy conducts combat patrols near the contested shallows of the South China Sea | South China Sea News

May 31, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Top Startup and Tech Funding News for the Week Ending May 30, 2025

Where LLMS retrieves real-time data behind AI searches (and why it’s more important than you think)

SpaceX’s Journey to Mars: How Spaceships Use Hohmann Orbital’s Movement from Earth to Mars (and the Physics Behind)

zircuit allows for top-up of non-curative wallets for crypto.com visa cards

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.