DevSecOps Weekly Newsletter, Zeno. Curated DevSecOps news, tutorials, tools and more!
🌐 View in your browser   |  ✍️ Publish on FAUN   |  🦄 Become a sponsor
 
Allow loading remote contents and showing images to get the best out of this email.
Zeno
 
 
⭐ Patrons
 
bridgecrew.io bridgecrew.io
 
Security where code happens for cloud native apps + infrastructure 🔒
 
 
Address cloud security issues right from your CI/CD pipeline, enable automated scanning and inline fixes, and ship secure code fast with Bridgecrew.
 
 
goteleport.com goteleport.com
 
Teleport - the easiest, most secure way to access infrastructure
 
 
The open-source Teleport Access Plane consolidates connectivity, authentication, authorization, and audit into a single platform. Teleport's unique approach is not only more secure but also improves developer productivity. Get started today.
 
 

👉 Spread the word and help developers find you by promoting your projects on FAUN. Get in touch for more information.

 
🐾 From FAUNers
 
faun.dev faun.dev
 
What is Zero Trust Security?
 
 
What is Zero Trust Security and how to implement it?

By @muhammadali642 , Marketing, Wildcard
 
 

👉 Create your FAUN Page if it's not done yet and start sharing your blog posts, news, and tools on FAUN Developer Community, collect badges and more!
 

 
🔗 Stories, Tutorials & Articles
 
bulletproof.co.uk bulletproof.co.uk
 
Understanding the importance of data retention
 
 
This blog will help you understand the importance of data retention, as well as how long personal data should be stored and the consequences of holding onto data for longer than necessary.
 
 
networkcomputing.com networkcomputing.com
 
Getting Started with a Zero-Trust Security Network Model
 
 
In an increasingly perilous world, zero trust for network user verification is more than just a good idea–it's essential.
 
 
lightspin.io lightspin.io
 
AWS RDS Vulnerability Leads to AWS Internal Service Credentials
 
 
Lightspin obtains credentials to an internal AWS service by exploiting a local file read vulnerability on the RDS EC2 instance using the log_fdw extension.
 
 
amazon.com amazon.com
 
A FinTech Roadmap to Data Security and Compliance with VGS and AWS
 
 
In this post, you will see how easy it is to secure your VGS Inbound and Outbound Connections using the VGS software-as-a-service (SaaS) solution, which enables you to collect, protect, and exchange any type of sensitive information.
 
 
csoonline.com csoonline.com
 
Sigma rules explained: When and how to use them to log events
 
 
Sigma rules allow you to detect anomalies in log events and identify suspicious activity.
 
 
geekflare.com geekflare.com
 
What are Man-in-the-Middle attacks and How to Prevent them?
 
 
MITM attacks allow perpetrators to eavesdrop on the communication between a user and an application while making it look as though the communication is proceeding as it should.
 
 
cyble.com cyble.com
 
Exposed Kubernetes clusters
 
 
Cyble analyzes the instances of misconfigured Kubernetes clusters and how they could potentially be exploited by Threat Actors.
 
 
earthly.dev earthly.dev
 
Validate Your YAML (with CUE)
 
 
Cuelang is an extension of YAML and a command-line tool to validate your YAMl file . It is a static type system for configuration . It can be used to detect problems before they happens.
 
 
 
📺 Quick Hits
 
 
✨ Join us for the 7th edition of ContainerDays Hybrid - Europe’s flagship conference gathering cloud-native enthusiasts from around the world. Networking opportunity & great learning experience you can't miss!
 
 
Red Hat released the 2022 State of Kubernetes report based on survey results from over 300 DevOps, engineering, and security professionals. 93% experienced at least one security incident in their Kubernetes environments in the last 12 months, leading to revenue or customer loss for 69%. 
 
 
A new report from Cisco Talos Intelligence Group exposes new tools used in Avos ransomware attacks: The Avos ransomware threat actor has recently updated its tooling, not only using malicious software but also commercial products.
 
 
Microsoft has incorporated additional improvements to address the recently disclosed SynLapse security vulnerability in order to meet comprehensive tenant isolation requirements in Azure Data Factory and Azure Synapse Pipelines.
 
 
Cloud Armor strengthens its defenses with new features to counter advanced L7 attacks and block malicious bots.
 
 
Microsoft announced that the new Microsoft Certified: Cybersecurity Architect Expert certification is now generally available. To earn this certification, you must pass Exam SC-100: Microsoft Cybersecurity Architect, along with one of the prerequisite exams.
 
 
Russia’s invasion of Ukraine shows the importance of supporting infrastructure in countries vulnerable to nation-state cyberattacks, US and EU officials said.
 
 
A remote memory-corruption vulnerability has been disclosed in the latest version of the OpenSSL library. The issue has been identified in OpenSSL version 3.0.4, which was released on June 21, 2022, and impacts x64 systems with the AVX-512 instruction set.
 
 
🎦 Videos, Talks & Presentations
 
youtube.com youtube.com
 
Kubernetes security scanning with Trivy CLI and Trivy Operator
 
 
This video is about Kubernetes cluster scanning. Specifically, you are going to use first the Trivy CLI and then the Trivy Operator to scan your cluster for security issues including vulnerabilities and misconfiguration.
 
 
 
⚙️ Tools, Apps & Software
 
github.com github.com
 
turbot/steampipe-mod-aws-compliance
 
 
Run individual controls or full compliance benchmarks for CIS, PCI, NIST, HIPAA and more across all of your AWS accounts using Steampipe.
 
 
github.com github.com
 
trufflesecurity/trufflehog
 
 
Find credentials all over the place
 
 
github.com github.com
 
wiz-sec/open-cvdb
 
 
An open project to list all publicly known cloud vulnerabilities and CSP security issues
 
 
github.com github.com
 
kris-nova/boopkit
 
 
Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.
 
 

👉 Spread the word and help developers find and follow your Open Source project by promoting it on FAUN. Get in touch for more information.

 
❤️ Thanks for reading
 
 
👋 Keep in touch and follow us on social media:
- 💼LinkedIn
- 📝Medium
- 🐦Twitter
- 👥Facebook
- 📰Reddit
- 📸Instagram

👌 Was this newsletter helpful?
We'd really appreciate it if you could forward it to your friends! You can also donate to help us keep this newsletter going.

🙏 Never miss an issue!
To receive our future emails in your inbox, don't forget to add community@faun.dev to your contacts.

ℹ️ Have a question or feedback?
Feel free to reply to this email. We'd love to hear from you!

🤩 Want to sponsor our newsletter?
Reach out to us at sponsors@faun.dev and we'll get back to you as soon as possible.
 

Zeno #328: How can Exposed Kubernetes Clusters be Exploited
Legend: ✅ = Editor's Choice / ♻️ = Old but Gold / ⭐ = Promoted / 🔰 = Beginner Friendly

You received this email because you are subscribed to FAUN.
🐾 FAUN is a world wide community of developers 👣 We help developers learn and grow by keeping them up with what matters.

You can manage your subscription options here (recommended) or use the old way here (legacy). If you have any problem, read this or reply to this email.

Important: We are gradually migrating to a new system. If you don't create an account on FAUN (here), you will stop receiving our weekly newsletter.