Flowmon Anomaly Detection System from Kemp now contains Indicators of Compromise (IoC) for the SUNBURST trojan specifically. Users of the Flowmon network detection and response (NDR) tool can check if they are under attack and set up measures to detect SUNBURST. This December, the world shook at the news of several US government bodies falling victim to a highly sophisticated attack.
Earlier this month the Kubernetes project discovered a security issue affecting multitenant clusters: If a potential attacker can already create or edit services and pods, then they may be able to intercept traffic from other pods (or nodes) in the cluster. An attacker that is able to create a ClusterIP service and set the spec.externalIPs field can intercept traffic to that IP.
Having good observability is vital to the health of your cloud infrastructure and applications, and a key element to using that information effectively is being able to create dashboards with relevant metrics. Today we are announcing a new dashboard creation experience from Cloud Monitoring that allows you to generate a greater variety of visualization types, introduces better flexibility for dashboard layouts, and makes data manipulation easier so you can create dashboards that better fit your needs.