What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
WiredThreatLevel.webp 2021-02-24 12:00:00 Gig Workers Gather Data to Check the Algorithm\'s Math (lien direct) Drivers for Uber, Lyft, and other firms are building apps to compare their mileage with pay slips. One group is selling the data to government agencies. Uber
WiredThreatLevel.webp 2021-02-19 22:17:48 The UK Is the Latest Country to Tighten the Screws on Uber (lien direct) The country's highest court ruled that the 25 drivers who filed a lawsuit should be considered workers and entitled to minimum wage and vacations. Uber Uber
TroyHunt.webp 2021-02-19 17:14:54 UK Supreme Court says Uber drivers are not independent contractors (lien direct) Uber's "gig economy" business model is under attack around the world. Uber Uber
TroyHunt.webp 2021-02-18 18:12:18 Uber: Bankrupt engineer Levandowski is hiding millions from creditors (lien direct) Judge views Levandowski's financial antics with an "incredibly jaundiced eye." Uber
WiredThreatLevel.webp 2021-02-11 14:00:00 Aurora Partners With Toyota on Self-Driving Sienna Taxis (lien direct) The autonomous vehicle startup purchased Uber's struggling self-driving technology division in December. Uber
AlienVault.webp 2021-02-11 11:00:00 The Kubernetes API Server: Exploring its security impact and how to lock it down (lien direct) This blog was written by an independent guest blogger. Organizations are increasingly turning to Kubernetes to manage their containers. As reported by Container Journal, 48% of respondents to a 2020 survey said that their organizations were using the platform. That’s up from 27% two years prior. These organizations could be turning to Kubernetes for the many benefits it affords them. As noted in its documentation, Kubernetes comes with the ability to distribute the container network traffic so as to keep organizations’ applications up and running. The platform is also capable of moving the actual state of any deployed containers to a desired state specified by the user as well of replacing and killing containers that don’t respond to a health check. The double-edged growth of Kubernetes clusters The benefits mentioned above trace back to the advantage of the Kubernetes cluster. At a minimum, a cluster consists of a control plane for maintaining the cluster’s desired state and a set of nodes for running the applications and workloads. Clusters make it possible for organizations to run containers across a group of machines in their environment. There’s just one problem: the number of clusters under organizations’ management is on the rise. This growth in clusters creates network complexity that complicates the task of securing a Kubernetes environment. As StackRox explains in a blog post: That’s because in a sprawling Kubernetes environment with several clusters spanning tens, hundreds, or even thousands of nodes, created by hundreds of different developers, manually checking the configurations is not feasible. And like all humans, developers can make mistakes – especially given that Kubernetes configuration options are complicated, security features are not enabled by default, and most of the community is learning how to effectively use components including Pod Security Policies and Security Context, Network Policies, RBAC, the API server, kubelet, and other Kubernetes controls. The last thing that organizations want to do is enable a malicious actor to authorize their Kubernetes environment. This raises an important question: how can organizations make sure they’re taking the necessary security precautions? Look to the Kubernetes API Server Organizations can help strengthen the security of their Kubernetes environment by locking down the Kubernetes API server. Also known as kube-apiserver, the Kubernetes API server is the frontend of the control plane that exposes the Kubernetes API. This element is responsible for helping end users, different parts of the cluster and external elements communicate with one another. A compromise of the API server could enable attackers to manipulate the communication between different Kubernetes components. This could include having them communicate with malicious resources that are hosted externally. Additionally, they could leverage this communication channel to spread malware like cryptominers amongst all the pods, activity which could threaten the availability of the organization’s applications and services. Fortunately, organizations can take several steps to secure the Kubernetes API server. Presented below are a few recommendations. Stay on top of Kubernetes updates From time to time, Kubernetes releases a software update that patches a vulnerability affecting the Kubernetes API server. It’s important that administrators implement those fixes on a timely basis. Otherwise, they could give malici Malware Vulnerability Uber
itsecurityguru.webp 2021-02-10 16:48:33 Researcher manages to hack into 35 tech firms (lien direct) Security researcher, Alex Birsan had an idea last year while working with Justin Gardner, another researcher. This idea led to him being able to gain access to over 35 major tech companies’ internal systems in a supply chain attack. Among these were Microsoft, Apple, Netflix and Uber. This particular supply chain attack is so sophisticated, […] Hack Uber
no_ico.webp 2021-02-10 13:12:44 Microsoft, Uber And Tesla Amongst Tech Companies Vulnerable To New Automated Supply Chain Attack – Expert Insight (lien direct) A novel form of software supply chain attack has been uncovered by ethical hacker Alex Birsan, who managed to breach the systems of over 35 major tech companies, including Microsoft,… Uber Uber
The_Hackers_News.webp 2021-02-10 04:57:14 Dependency Confusion Supply-Chain Attack Hit Over 35 High-Profile Companies (lien direct) In what's a novel supply chain attack, a security researcher managed to breach over 35 major companies' internal systems, including that of Microsoft, Apple, PayPal, Shopify, Netflix, Yelp, Tesla, and Uber, and achieve remote code execution. The technique, called dependency confusion or a substitution attack, takes advantage of the fact that a piece of software may include components from a mix Uber
SecurityAffairs.webp 2021-02-09 22:27:22 Microsoft February 2021 Patch Tuesday fixes 56 bugs, including an actively exploited Windows zero-day (lien direct) Microsoft February 2021 Patch Tuesday addresses 56 vulnerabilities, including a flaw that is known to be actively exploited in the wild. Microsoft February 2021 Patch Tuesday security updates address 56 CVEs in multiple products, including Windows components, .NET Framework, Azure IoT, Azure Kubernetes Service, Microsoft Edge for Android, Exchange Server, Office and Office Services and […] Uber
bleepingcomputer.webp 2021-02-09 13:04:16 (Déjà vu) Researcher hacks over 35 tech firms in novel supply chain attack (lien direct) A researcher managed to hack systems of over 35 major tech companies including Microsoft, Apple, PayPal, Shopify, Netflix, Tesla, Yelp, Tesla, and Uber in a novel software supply chain attack. For his ethical hacking research efforts, the researcher has been awarded over $130,000 in bug bounties. [...] Hack Uber Uber
bleepingcomputer.webp 2021-02-09 13:04:16 Researcher hacks Microsoft, Apple, more in novel supply chain attack (lien direct) A researcher managed to hack systems of over 35 major tech companies including Microsoft, Apple, PayPal, Shopify, Netflix, Tesla, Yelp, Tesla, and Uber in a novel software supply chain attack. For his ethical hacking research efforts, the researcher has been awarded over $130,000 in bug bounties. [...] Hack Uber Uber
CVE.webp 2021-02-05 22:15:12 CVE-2021-21303 (lien direct) Helm is open-source software which is essentially "The Kubernetes Package Manager". Helm is a tool for managing Charts. Charts are packages of pre-configured Kubernetes resources. In Helm from version 3.0 and before version 3.5.2, there a few cases where data loaded from potentially untrusted sources was not properly sanitized. When a SemVer in the `version` field of a chart is invalid, in some cases Helm allows the string to be used "as is" without sanitizing. Helm fails to properly sanitized some fields present on Helm repository `index.yaml` files. Helm does not properly sanitized some fields in the `plugin.yaml` file for plugins In some cases, Helm does not properly sanitize the fields in the `Chart.yaml` file. By exploiting these attack vectors, core maintainers were able to send deceptive information to a terminal screen running the `helm` command, as well as obscure or alter information on the screen. In some cases, we could send codes that terminals used to execute higher-order logic, like clearing a terminal screen. Further, during evaluation, the Helm maintainers discovered a few other fields that were not properly sanitized when read out of repository index files. This fix remedies all such cases, and once again enforces SemVer2 policies on version fields. All users of the Helm 3 should upgrade to the fixed version 3.5.2 or later. Those who use Helm as a library should verify that they either sanitize this data on their own, or use the proper Helm API calls to sanitize the data. Tool Uber
no_ico.webp 2021-02-05 18:53:56 New Malware Hijacks Kubernetes Clusters To Mine Monero – Experts Insight (lien direct) Yesterday researchers from Palo Alto Networks' Unit 42 published their discovery of a never-before-seen malware, dubbed Hildegard, that is being used by the TeamTNT threat group to target Kubernetes clusters.… Malware Threat Uber ★★★★
SecurityAffairs.webp 2021-02-05 16:44:53 TeamTNT group uses Hildegard Malware to target Kubernetes Systems (lien direct) The TeamTNT hacker group has been employing a new piece of malware, dubbed Hildegard, to target Kubernetes installs. The hacking group TeamTNT has been employing a new piece of malware, dubbed Hildegard, in a series of attacks targeting Kubernetes systems. Early this year, researchers from Trend Micro discovered that the TeamTNT botnet was improved with the ability to steal […] Malware Uber
SecurityWeek.webp 2021-02-04 16:07:37 New \'Hildegard\' Malware Targets Kubernetes Systems (lien direct) The hacking group referred to as TeamTNT has been employing a new piece of malware in a recently started campaign targeting Kubernetes environments, security researchers with Palo Alto Networks' Unit 42 reveal. Malware Uber
Kaspersky.webp 2021-02-03 20:50:54 New Malware Hijacks Kubernetes Clusters to Mine Monero (lien direct) Researchers warn that the Hildegard malware is part of 'one of the most complicated attacks targeting Kubernetes.' Malware Uber
ComputerWeekly.webp 2021-02-03 12:00:00 Crypto malware targets Kubernetes clusters, say researchers (lien direct) Researchers warn that the Hildegard malware is part of 'one of the most complicated attacks targeting Kubernetes.' Malware Uber
CVE.webp 2021-01-21 17:15:14 CVE-2020-8567 (lien direct) Kubernetes Secrets Store CSI Driver Vault Plugin prior to v0.0.6, Azure Plugin prior to v0.0.10, and GCP Plugin prior to v0.2.0 allow an attacker who can create specially-crafted SecretProviderClass objects to write to arbitrary file paths on the host filesystem, including /var/lib/kubelet/pods. Uber
CVE.webp 2021-01-21 17:15:14 CVE-2020-8568 (lien direct) Kubernetes Secrets Store CSI Driver versions v0.0.15 and v0.0.16 allow an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that contain other Kubernetes Secrets. Uber
CVE.webp 2021-01-21 17:15:14 CVE-2020-8570 (lien direct) Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executing the client code. Uber
CVE.webp 2021-01-21 17:15:14 CVE-2020-8569 (lien direct) Kubernetes CSI snapshot-controller prior to v2.1.3 and v3.0.2 could panic when processing a VolumeSnapshot custom resource when: - The VolumeSnapshot referenced a non-existing PersistentVolumeClaim and the VolumeSnapshot did not reference any VolumeSnapshotClass. - The snapshot-controller crashes, is automatically restarted by Kubernetes, and processes the same VolumeSnapshot custom resource after the restart, entering an endless crashloop. Only the volume snapshot feature is affected by this vulnerability. When exploited, users can’t take snapshots of their volumes or delete the snapshots. All other Kubernetes functionality is not affected. Uber
CVE.webp 2021-01-21 17:15:13 CVE-2020-8554 (lien direct) Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to users) of a LoadBalancer service can set the status.loadBalancer.ingress.ip to similar effect. Uber
CVE.webp 2021-01-20 22:15:11 CVE-2020-26278 (lien direct) Weave Net is open source software which creates a virtual network that connects Docker containers across multiple hosts and enables their automatic discovery. Weave Net before version 2.8.0 has a vulnerability in which can allow an attacker to take over any host in the cluster. Weave Net is supplied with a manifest that runs pods on every node in a Kubernetes cluster, which are responsible for managing network connections for all other pods in the cluster. This requires a lot of power over the host, and the manifest sets `privileged: true`, which gives it that power. It also set `hostPID: true`, which gave it the ability to access all other processes on the host, and write anywhere in the root filesystem of the host. This setting was not necessary, and is being removed. You are only vulnerable if you have an additional vulnerability (e.g. a bug in Kubernetes) or misconfiguration that allows an attacker to run code inside the Weave Net pod, No such bug is known at the time of release, and there are no known instances of this being exploited. Weave Net 2.8.0 removes the hostPID setting and moves CNI plugin install to an init container. Users who do not update to 2.8.0 can edit the hostPID line in their existing DaemonSet manifest to say false instead of true, arrange some other way to install CNI plugins (e.g. Ansible) and remove those mounts from the DaemonSet manifest. Vulnerability Uber
InfoSecurityMag.webp 2021-01-20 18:25:00 Trump Pardons Google Trade Secret Thief (lien direct) Former Waymo exec who passed Google trade secret to Uber pardoned by outgoing US president Uber Uber
WiredThreatLevel.webp 2021-01-20 14:00:00 Social Media Bans Are Really, Actually, Shockingly Common (lien direct) Booting Trump didn't set a precedent. From Yelp to Uber to Airbnb, platforms regularly ban users and content, but too often behind the scenes. Uber Uber
Kaspersky.webp 2021-01-19 20:20:03 Rob Joyce to Take Over as NSA Cybersecurity Director (lien direct) Joyce will replace Anne Neuberger, who is now deputy national security advisor for the incoming Biden administration. Uber
CVE.webp 2021-01-15 21:15:13 CVE-2021-21251 (lien direct) OneDev is an all-in-one devops platform. In OneDev before version 4.0.3 there is a critical "zip slip" vulnerability. This issue may lead to arbitrary file write. The KubernetesResource REST endpoint untars user controlled data from the request body using TarUtils. TarUtils is a custom library method leveraging Apache Commons Compress. During the untar process, there are no checks in place to prevent an untarred file from traversing the file system and overriding an existing file. For a successful exploitation, the attacker requires a valid __JobToken__ which may not be possible to get without using any of the other reported vulnerabilities. But this should be considered a vulnerability in `io.onedev.commons.utils.TarUtils` since it lives in a different artifact and can affect other projects using it. This issue was addressed in 4.0.3 by validating paths in tar archive to only allow them to be in specified folder when extracted. Vulnerability Guideline Uber
CVE.webp 2021-01-15 20:15:12 CVE-2021-21243 (lien direct) OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, a Kubernetes REST endpoint exposes two methods that deserialize untrusted data from the request body. These endpoints do not enforce any authentication or authorization checks. This issue may lead to pre-auth RCE. This issue was fixed in 4.0.3 by not using deserialization at KubernetesResource side. Guideline Uber
AlienVault.webp 2021-01-14 11:00:00 Security context: The starting point for how Kubernetes Pod security works (lien direct) This blog was written by an independent guest blogger. Organizations are increasingly adopting Kubernetes to manage their containerized workloads and services, but Kubernetes security incidents are on the rise, as well. In the fall 2020 edition of the “State of Container and Kubernetes Security” report, for instance, 91% of respondents told StackRox that they had recently adopted Kubernetes. Three quarters of survey participants went on to reveal that they had deployed the container orchestration platform in their production environments. Even so, nine out of 10 respondents told the company that their organizations had suffered a security incident in their container and Kubernetes environments over the last 12 months. Subsequently, nearly half (44%) of respondents said that they had delayed moving an application into production due to their security concerns. These findings highlight the need for organizations to strengthen their Kubernetes security. They can do this by focusing on the security of their pods. StackRox explains why in a blog post: Securing pods, and the containers that run as part of them, is a critical aspect of protecting your Kubernetes environments. Among other reasons, pods and containers are the individual units of compute that are ultimately subject to adversarial techniques that may be used as part of any attack on your Kubernetes clusters. Since pods are also the smallest resource you can deploy and manage in Kubernetes, applying security at this level ensures greater fine-grained controls that are scoped to individual application components. Organizations can specifically use Pod Security Policies (PSPs) to strengthen their pod security. Before that even happens, they need to figure out what they want to define within those PSPs. That’s where security context comes into play. What are security contexts? According to Kubernetes’ documentation, security contexts define the privileges and access control settings for a selected pod or container. These settings include Linux Capabilities through which users can specify whether to give a process some privileges but not those of a root user. They also include AllowPrivilegeEscalation, or controls through which users can make a process more privileged than its parent process. Additional examples of security contexts are available here. To set up security contexts, users need to have a Kubernetes cluster and the kubectl command-line tool configured to communicate with that cluster. They can then include the “securityContext” field in the specification for their pod or container. This action applies whatever security settings they want to their selected resource. Moving on with Pod Security Policies Once they know the security context, organizations can create a Pod Security Policy. Kubernetes notes elsewhere on its website that a PSP functions as a cluster-level resource that defines the security conditions under which a pod is allowed to run. Such a policy encapsulates and enforces one or more security contexts chosen by the user. Uber
InfoSecurityMag.webp 2021-01-08 16:49:00 Red Hat to Acquire StackRox (lien direct) Kubernetes-native security startup StackRox to be acquired by open source solution provider Red Hat Uber
SecurityWeek.webp 2021-01-07 23:37:05 Red Hat Buys Container Security Firm StackRox (lien direct) Red Hat on Thursday snapped up container and Kubernetes security startup StackRox, a deal that speeds up its ambitions in the enterprise cloud market. Financial terms of the deal were not announced. Uber
Kaspersky.webp 2021-01-07 22:21:27 Biden to Appoint Cybersecurity Advisor to NSC – Report (lien direct) Anne Neuberger will join the National Security Council, according to sources. Uber
TechRepublic.webp 2021-01-07 19:58:21 Amazon, Disney, and Uber reveal remote interviewing and hiring processes (lien direct) TechRepublic takes an exclusive look at key HR trends and predictions from some of the most recognizable companies. Uber Uber
ArsTechnica.webp 2021-01-05 22:33:31 Court says Uber can\'t hold users to terms they probably didn\'t read (lien direct) Adding a link to a registration page isn't good enough, court says. Uber Uber
Pirate.webp 2021-01-01 10:59:21 GKE Auditor – Detect Google Kubernetes Engine Misconfigurations (lien direct) GKE Auditor – Detect Google Kubernetes Engine MisconfigurationsGKE Auditor is a Java-based tool to detect Google Kubernetes Engine misconfigurations, it aims to help security and development teams streamline the configuration process and save time looking for generic bugs and vulnerabilities. The tool consists of individual modules called Detectors, each scanning for a specific vulnerability. Installing and Using GKE Auditor to Detect Google Kubernetes Engine Misconfigurations Installation git clone https://github.com/google/gke-auditor cd ./gke-auditor/ ./build.sh Usage The tool has to be built by running the build.sh script first. Read the rest of GKE Auditor – Detect Google Kubernetes Engine Misconfigurations now! Only available at Darknet. Tool Uber
WiredThreatLevel.webp 2020-12-22 13:00:00 Uber and Lyft\'s Gig Work Law Could Expand Beyond California (lien direct) The companies are backing proposals in other states that would give workers the ability to form unions-but still consider them contractors, not employees. Uber
The_Hackers_News.webp 2020-12-16 05:41:20 What is Geocoding? - How to Find Coordinates of An Address (lien direct) How can your app hook into a geocoding service that offers forward and reverse geocoding and an auto-completion facility? Geocoding turns a location name or address into geocoordinates. The service gets used by thousands of applications like Uber and Grubhub to track and plot their map data. Yet, it can also help web development by enhancing UX through reverse geocoding. Not to mention Uber
PaloAlto.webp 2020-12-12 00:00:19 CRN 2020 Hottest Cybersecurity Products Include CN-Series Firewall (lien direct) Find out why CN-Series, the industry's first NGFW for Kubernetes environments, is considered one of the hottest cybersecurity products of 2020. Uber
TechRepublic.webp 2020-12-10 16:23:06 How to install Kubernetes on Ubuntu Server without Docker (lien direct) Now that Docker is being deprecated in Kubernetes, you'll need to know what to do in order to deploy the container orchestrator. Jack Wallen shows you one path to take. Uber
itsecurityguru.webp 2020-12-08 12:21:41 A Guide to Kubernetes Security (lien direct) Organizations are bringing a variety of new technologies into their IT infrastructure as they continue to undergo their digital transformations. Many are embracing containers and Kubernetes, in particular. In a 2020 report, for instance, 56% of surveyed organizations expected their use of containers to increase within the next 12 months, wrote The Enterprisers Project. Another […] Uber
bleepingcomputer.webp 2020-12-08 09:20:00 All Kubernetes versions affected by unpatched MiTM vulnerability (lien direct) The Kubernetes Product Security Committee has provided advice on how to temporarily block attackers from exploiting a vulnerability that could enable them to intercept traffic from other pods in multi-tenant Kubernetes clusters in man-in-the-middle (MiTM) attacks. [...] Vulnerability Uber
WiredThreatLevel.webp 2020-12-07 21:06:56 Uber Gives Up on the Self-Driving Dream (lien direct) The ride-hail giant invested more than $1 billion in autonomous vehicles. Now, it's selling the unit to Aurora, which makes self-driving tech. Uber ★★★★★
WiredThreatLevel.webp 2020-12-04 13:00:00 How The Tumult of 2020 Will Shape the Future of Ride Sharing (lien direct) This week, we talk about the new legal and social realities that Lyft, Uber, the scooter companies, and bike-share companies will face once the pandemic ends. Uber
TechRepublic.webp 2020-12-03 21:00:00 Kubernetes: A cheat sheet (lien direct) Kubernetes is a series of open source projects for automating the deployment, scaling, and management of containerized applications. Find out why the ecosystem matters, how to use it, and more. Uber
no_ico.webp 2020-12-02 12:20:16 Expert Insight: Docker Malware Is Now Common – Devs Need To React Accordingly (lien direct) Towards the end of 2017, there was a major shift in the malware scene. As cloud-based technologies became more popular, cybercrime gangs began targeting Docker and Kubernetes systems. Most of… The ISBuzz Post: This Post Expert Insight: Docker Malware Is Now Common – Devs Need To React Accordingly Malware Uber
AlienVault.webp 2020-12-02 12:00:00 How to secure a Kubernetes cluster (lien direct) This blog was written by an independent guest blogger. More and more organizations are adopting Kubernetes, but they’re encountering security challenges along the way. In the fall 2020 edition of its “State of Container and Kubernetes Security” report, for instance, StackRox found that nearly 91% of surveyed organizations had adopted Kubernetes, with a majority (75%) of participants revealing that they had deployed the container orchestration platform into their production environments. Even so, nine in 10 respondents said that they had experienced a security incident involving a misconfiguration, vulnerability or runtime error in their container and Kubernetes environments over the last 12 months. Nearly half (44%) went on to say that they had delayed moving an application into production as a result of their security concerns. These findings highlight the need for organizations to ensure their Kubernetes configurations complement their security requirements. As part of this process, administrators can focus in on protecting their clusters, which are part of the Kubernetes architecture. After defining what a cluster is, this blog post will explore the two sets of components that exist within a cluster and provide guidance on how organizations can secure those components along the way. Understanding the Kubernetes cluster On its website, Kubernetes says that customers get a cluster—or a set of one or more worker machines called “nodes” that are responsible for running a containerized application—whenever they deploy Kubernetes. These nodes host pods, groups of one or more containers which function as the application workload’s components. Ultimately, Kubernetes makes it possible for administrators to manage the nodes and the cluster more generally, including events that affect either, by using the control plane. Administrators can secure a Kubernetes cluster by specifically directing their efforts to the control plane and the worker nodes. The control plane Within the control plane, administrators can focus their security measures on five components: kube-apiserver, etcd, kube-scheduler, kube-controller-manager and cloud-controller-manager. kube-apiserver The kube-apiserver is the main implementation of a Kubernetes API server within a Kubernetes deployment. It scales horizontally as administrators deploy more instances of kube-apiserver to balance traffic within their environments. As the front end for the Kubernetes control plane, the API server potentially exposes the Kubernetes API. Administrators can secure this element by upgrading to the newest version of Kubernetes and by applying updates, thereby closing security gaps. From there, administrators can restrict access to the Kubernetes API server by setting up authentication for Kubernetes API clients and ensuring all API traffic is encrypted using TLS. etcd A key value store, etcd functions as the backing store for all Kubernetes cluster data. Administrators might want to consider having a back-up plan for that data. Similar to the kube-apiserver, they can once again turn to encryption, authentication and access control as a means of gaining visibility over read and write access to that data store. kube-scheduler Within the control plane, administrators can use the kube-scheduler component to function for newly created pods that don’t have an a Vulnerability Uber
TechRepublic.webp 2020-12-01 17:12:00 Kubernetes will deliver the app store experience for enterprise software, says Weaveworks CEO (lien direct) Commentary: Google Cloud, Red Hat, and now AWS are serving up Kubernetes in a way that will make it dramatically easier to deploy and consume enterprise software, says the CEO of Weaveworks. Uber
WiredThreatLevel.webp 2020-11-30 12:00:00 Ride-Hail Companies Are Making Life Harder for Scooters (lien direct) Officials in many cities feel they couldn't rein in Uber and Lyft. Now, they're being stricter with other innovative forms of transportation. Uber
TechRepublic.webp 2020-11-25 14:50:14 Experts share tips on how to get prepared for Kubernetes jobs (lien direct) More and more employers are looking for people with Kubernetes experience. Here are the skills you need to jump-start your career. Uber
Last update at: 2024-05-09 22:10:02
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter