Let me share a funny story on how I discovered the key to decrypt Costa Rica's ID card with the help of a 100-year-old lady that was 5,000 kilometers away from me.
Leer màs...
In recent weeks, we have seen first-hand the importance of having early detection capabilities, the correct implementation of security measures,...
Leer màs...
Nowadays, for most of us, smartphones have become a vital device, something that we have at hand almost all the time. They come with a phone number...
Leer màs...
Much has been said recently about the abuse of Docker APIs exposed to the internet. These references all talk about the main Docker API that...
Leer màs...
In January of this year we found an EoP (Escalation of Privileges) or LPE (Local Privilege Escalation) in the Dropbox Windows application. The bug was...
Leer màs...
Humans have used features such as face, voice, and gait for thousands of years to recognize each other, but only recently, humans have started using...
Leer màs...
A network policy is a specification of how groups of pods are allowed to communicate with each other and other network endpoints. The Kubernetes...
Leer màs...
The previous articles about Docker security have discussed many security features that can be applied at container's runtime. Those features, such as...
Leer màs...
In the previous article we talked about authentication in Kubernetes using TLS certificates. Once the user or service account is authenticated, the...
Leer màs...
In a Kubernetes cluster, the kube-apiserver is the main component of the Control Plane, all the actions that occur within the cluster go through this...
Leer màs...