Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Whatsapp Issues Zero-Click Exploit Emergency Updates iOS and Macos Device Targeting

Whatsapp Issues Zero-Click Exploit Emergency Updates iOS and Macos Device Targeting

A crack is formed in partnership between meta and scale AI

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Microsoft warns that the default helm chart could leave Kubernetes apps exposed to data leaks
Identity

Microsoft warns that the default helm chart could leave Kubernetes apps exposed to data leaks

userBy userMay 6, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 6, 2025Ravi LakshmananCloud Security / DevOps

Microsoft warns that while deploying Kubernetes, it can use pre-made templates such as out-of-the-box Helm charts to open the door to misunderstanding and leak valuable data.

“These ‘plug and play’ options greatly simplify the setup process, but in many cases they prioritize ease of use over security,” says Michar Katchinskiy and Yossi Weizman of Microsoft Defender for Cloud Research Team.

“The result is that many applications will be deployed incorrectly by default, exposing sensitive data, cloud resources, or the entire environment to attackers.”

Helm is a Kubernetes package manager that allows developers to package, configure, and deploy applications and services into Kubernetes clusters. It is part of the Cloud Native Computing Foundation (CNCF).

Cybersecurity

A Kubernetes application package consists of a helm package format called a chart. This is a YAML manifest and template used to describe the Kubernetes resources and configuration required for app deployment.

Microsoft pointed out that open source projects often include default manifests or predefined helm charts that prioritize ease of use over security, leading to two major concerns in particular.

Rack by default for proper built-in authentication or authorization to expose services from outside without proper network restrictions

As a result, organizations using these projects without reviewing the YAML manifest or helm chart will inadvertently expose their applications to attackers. This can have serious consequences if deployed applications facilitate queries for sensitive APIs or allow management actions.

Some of the identified projects that could put a Kubernetes environment at risk of attacks are:

Apache Pinot, which exposes the main components of OLAP Datastore, Pinot-Controller and Pinot-Broker to the Internet via Kubernetes Loadbalancer Services, is now available to access IP addresses and new users by exposing the app’s interface through an external IP address, without authentication, by default, without authentication. Code execution selenium grid. This exposes node port services to a specific port across all nodes in a Kubernetes cluster, and makes external firewall rules the only line of defense

Cybersecurity

To mitigate the risks associated with such misconceptions, we recommend reviewing and modifying security best practices, periodically scanning for face-to-face interfaces, and monitoring your running containers for malicious and suspicious activity.

“In many cases, when using default settings, the internal use of many containerized applications often comes from misunderstood workloads,” the researchers said. “Relying on a ‘Defal by Concent’ setup poses a serious security risk. ”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Article70%: Joanne Barratt-Conference News
Next Article How much does Donald Trump’s tariff cost our family? | Donald Trump News
user
  • Website

Related Posts

Whatsapp Issues Zero-Click Exploit Emergency Updates iOS and Macos Device Targeting

August 30, 2025

Whatsapp Issues Zero-Click Exploit Emergency Updates iOS and Macos Device Targeting

August 30, 2025

Researchers warn Sitecore exploit chain linking cache addiction and remote code execution

August 29, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Whatsapp Issues Zero-Click Exploit Emergency Updates iOS and Macos Device Targeting

Whatsapp Issues Zero-Click Exploit Emergency Updates iOS and Macos Device Targeting

A crack is formed in partnership between meta and scale AI

Tiktok now allows users to send voice memos and images via DMS

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Unlocking Tomorrow’s Health: Medical Device Integration

Web 3.0’s Promise: What Sir Tim Berners-Lee Envisions for the Future of the Internet

TwinH’s Paves Way at Break The Gap 2025

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.