This week's articles
EKS Pod Identity Webhook Deep-Dive
Really interesting deep dive on the EKS Pod Identity Webhook (gives IAM roles to pods) to understand how it works, specifically for non-EKS clusters.
Detecting Microsoft 365 and Azure Active Directory Backdoors
Mandiant study regarding an uptick in incidents involving Microsoft 365 (M365) and Azure Active Directory (Azure AD). Most of these incidents are the result of a phishing email coercing a user to enter their credentials used for accessing M365 into a phishing site.
Artifactory Hacking guide
Guide containing pentest notes regarding JFrog Artifactory, useful to understand some of the attacks that can be performed against it.
Envoy Proxy on Windows Containers
Recently the Envoy proxy announced the Alpha version for the Windows platform! You can find the announcement here
and the instructions to take part in the Windows Alpha here
Rootless containers with Podman: The basics
#docker, #explain, #build
Article explaining the benefits of using containers and Podman (a daemonless, open source, Linux-native tool that provides a command-line interface similar to the docker container engine), introduce rootless containers and why they are important, and then shows how to use rootless containers with Podman with an example.
A Linux sysadmin's introduction to cgroups
First article of a four-part series covering cgroups and resource management, defining cgroups and how they help with resource management and performance tuning.
Introducing API Shield
#cloudflare, #announcement, #defend
Post from Cloudflare introducing "API Shield", a free offering to secure APIs through the use of strong client certificate-based identity and strict schema-based validation.