Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Senate Republicans deepfaked Chuck Schumer, but X isn’t taking it down

AI tools run on fracked gas and bulldozed land in Texas

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Microsoft warns that the default helm chart could leave Kubernetes apps exposed to data leaks
Identity

Microsoft warns that the default helm chart could leave Kubernetes apps exposed to data leaks

userBy userMay 6, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 6, 2025Ravi LakshmananCloud Security / DevOps

Microsoft warns that while deploying Kubernetes, it can use pre-made templates such as out-of-the-box Helm charts to open the door to misunderstanding and leak valuable data.

“These ‘plug and play’ options greatly simplify the setup process, but in many cases they prioritize ease of use over security,” says Michar Katchinskiy and Yossi Weizman of Microsoft Defender for Cloud Research Team.

“The result is that many applications will be deployed incorrectly by default, exposing sensitive data, cloud resources, or the entire environment to attackers.”

Helm is a Kubernetes package manager that allows developers to package, configure, and deploy applications and services into Kubernetes clusters. It is part of the Cloud Native Computing Foundation (CNCF).

Cybersecurity

A Kubernetes application package consists of a helm package format called a chart. This is a YAML manifest and template used to describe the Kubernetes resources and configuration required for app deployment.

Microsoft pointed out that open source projects often include default manifests or predefined helm charts that prioritize ease of use over security, leading to two major concerns in particular.

Rack by default for proper built-in authentication or authorization to expose services from outside without proper network restrictions

As a result, organizations using these projects without reviewing the YAML manifest or helm chart will inadvertently expose their applications to attackers. This can have serious consequences if deployed applications facilitate queries for sensitive APIs or allow management actions.

Some of the identified projects that could put a Kubernetes environment at risk of attacks are:

Apache Pinot, which exposes the main components of OLAP Datastore, Pinot-Controller and Pinot-Broker to the Internet via Kubernetes Loadbalancer Services, is now available to access IP addresses and new users by exposing the app’s interface through an external IP address, without authentication, by default, without authentication. Code execution selenium grid. This exposes node port services to a specific port across all nodes in a Kubernetes cluster, and makes external firewall rules the only line of defense

Cybersecurity

To mitigate the risks associated with such misconceptions, we recommend reviewing and modifying security best practices, periodically scanning for face-to-face interfaces, and monitoring your running containers for malicious and suspicious activity.

“In many cases, when using default settings, the internal use of many containerized applications often comes from misunderstood workloads,” the researchers said. “Relying on a ‘Defal by Concent’ setup poses a serious security risk. ”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Article70%: Joanne Barratt-Conference News
Next Article How much does Donald Trump’s tariff cost our family? | Donald Trump News
user
  • Website

Related Posts

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

October 17, 2025

North Korean hacker combines BeaverTail and OtterCookie to create advanced JS malware

October 17, 2025

first and last line of defense

October 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Senate Republicans deepfaked Chuck Schumer, but X isn’t taking it down

AI tools run on fracked gas and bulldozed land in Texas

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

Trump’s Energy Department decides to keep at least one Biden-era energy plan in place

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.