Below you will find pages that utilize the taxonomy term “Security”
How Malicious NPM Packages Target Solana Private Keys
The recent discovery of malicious npm packages targeting Solana private keys highlights the ever-present threat to developers and users in the cryptocurrency ecosystem. These packages, masquerading as legitimate tools, employed clever exfiltration techniques, including leveraging Gmail as a covert communication channel, to steal sensitive information and drain victims’ wallets. This blog post will dissect the tactics used in these attacks, providing engineers with crucial insights to enhance their security practices.
Securing Your Google Kubernetes Engine Clusters from a Critical Vulnerability
Google Kubernetes Engine (GKE) is a popular container orchestration platform that allows developers to deploy and manage containerized applications at scale. However, a recent security vulnerability has been discovered in GKE that could allow attackers to gain access to clusters and steal data or launch denial-of-service attacks.
The vulnerability is caused by a misunderstanding about the system:authenticated
group, which includes any Google account with a valid login. This group can be assigned overly permissive roles, such as cluster-admin
, which gives attackers full control over a GKE cluster.