Taking the Helm: Navigating Kubernetes Security Risks from Runtime to Source Code
Complete Cloud Security in Minutes – Orca Security
2025-08-06 20:50:00
收藏
According to the Orca 2025 State of Cloud Security Report, 70% of organizations now use Kubernetes (K8s) in their cloud environments. Yet despite its widespread adoption, Kubernetes continues to pose significant security challenges. The report found that 50% of organizations using K8s run at least one unsupported cluster version, and 93% have overprivileged service accounts, […]
The post Taking the Helm: Navigating Kubernetes Security Risks from Runtime to Source Code appeared first on Orca Security.
目录
最新
- Orca Security: A Strong Performer in the 2026 Forrester Wave™ for Cloud Native Application Protection Solutions
- Critical CVE-2026-1731 Vulnerability in BeyondTrust Remote Support and PRA Exposes Systems to Remote Code Execution
- RoguePilot: Exploiting GitHub Copilot for a Repository Takeover
- Getting Ready for the AI Era: A CISO’s Guide to AI Security Strategy
- Path Traversal in Rancher Local Path Provisioner Enables Host Filesystem Compromise Across K3s Clusters
- Shifting Left with Orca MCP: The Developer’s AI Security Partner
- Hacking GitHub Codespaces via VS Code Defaults: A Supply-Chain Attack Vector
- First third-party CNAPP to integrate with Tencent Cloud: Orca expands multi-cloud security and compliance with dynamic risk prioritization baked in