ContentPosts from @astrolemonade..
Link
@faun shared a link, 2 months ago

GitHub becomes go-to platform for malware delivery across Europe

Phishingschemes run rampant in Europe, withAdobecatching 29% of the hits andMicrosofthandling 26%. Meanwhile,GitHubemerges as the unlikely kingpin of malware delivery, flexing a 16% monthly rise. When it comes to AI, GenAI hacks its way to 91% usage. Yet, 25% still slam the door in Grok AI's face, o..

GitHub becomes go-to platform for malware delivery across Europe
Link
@faun shared a link, 2 months ago

Shift Left with Confidence: A Practical Guide to DevSecOps Using GitHub Actions for Python Projects

GitHub Actions turns your Python projects into armored tanks, shifting security left to catch skeletons in your code's closet. It scans for secrets, polices package licenses, and hunts down bugs before they even think of moving in. Automated unit tests, Docker scans, vulnerability checks—your CI/CD ..

Link
@faun shared a link, 2 months ago

New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

Wiz Researchpoked around in over150,000 cloud accountsand unearthed some jaw-dropping screw-ups in data exposure and pitiful access control...

Link
@faun shared a link, 2 months ago

Automatically prioritize security issues from different tools with an LLM

Security backlogs resemble a garage sale—clutter everywhere and sorted more by desperation than priority. Here’s whereLLMsswoop in for smart triage. Choose your weapon: "naive" for speed, "bubble" for depth, orElofor that sweet balance. This way, you can organize chaos with logic, anchoring decision..

Automatically prioritize security issues from different tools with an LLM
Link
@faun shared a link, 2 months ago

How Red Hat just quietly, radically transformed enterprise server Linux

Old-school package pain fizzles out with the rise of 🚀immutable Linuxserving swift updates and rock-solid security. Bonus: Red Hat's jumping in with both feet!..

How Red Hat just quietly, radically transformed enterprise server Linux
Link
@faun shared a link, 2 months ago

Amazon EKS and Amazon EKS Distro now supports Kubernetes version 1.33

Kubernetes 1.33struts onto the scene with stablesidecar containers, topology-aware routing, and pod topology spread constraints. No beta testing anymore; it's fully unleashed onAWS EKS...

Amazon EKS and Amazon EKS Distro now supports Kubernetes version 1.33
Link
@faun shared a link, 2 months ago

AI Runs Best On Cloud Native—Who's Managing the Kubernetes Platform?

AI workloads thrive on cloud-native platforms like Kubernetes because they offer the scalability, portability, and speed needed for modern machine learning—but building and running this infrastructure is highly complex and distracts from core AI work. The post argues that unless your business is inf..

Link
@faun shared a link, 2 months ago

What’s New in Networking for Kubernetes in the Isovalent Platform 1.17

The Isovalent Platform 1.17 release brings major upgrades to Kubernetes networking, including a new standalone Egress Gateway, dynamic BGP features, enhanced multi-tenant security policies, and smoother Calico-to-Cilium migrations. This version also introduces easier observability with integrated Ti..

Link
@faun shared a link, 2 months ago

Announcing new Model Context Protocol (MCP) Servers for AWS Serverless and Containers - AWS

AWS's Model Context Protocol (MCP) servers arm AI code assistantsto deftly wrangle AWS Lambda, ECS, and EKS. They launch apps at warp speed.MCP servers cram in AWS best practices and operational secrets,freeing you from infrastructure drudgery. You get to dive straight into crafting the heart of you..

Announcing new Model Context Protocol (MCP) Servers for AWS Serverless and Containers - AWS
Link
@faun shared a link, 2 months ago

The Risk of Default Configuration: How Out-of-the-Box Helm Charts Can Breach Your Cluster

Apache Pinot's Helm setup is a welcome mat for troublemakers.It throws the doors open to critical services without bothering to ask, "Who goes there?" It's the kind of oversight attackers savor.Meshery and Selenium join the party too.Their default settings flirt with disaster, leaving the gates ajar..

The Risk of Default Configuration: How Out-of-the-Box Helm Charts Can Breach Your Cluster