logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Researcher Publishes PoC Exploit for Privilege Escalation Flaw (CVE-2023-0179) in Linux Kernel
  • ProxyNotShell, OWASSRF, TabShell: Patch Your Microsoft Exchange Servers Now
  • Vulnerability Summary for the Week of January 23, 2023
  • What SOCs Need to Know About Water Dybbuk, A BEC Actor Using Open-Source Toolkits
  • New High-Severity Vulnerabilities Discovered in Cisco IOx and F5 BIG-IP Products

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2018-25078 (man-db) 26 January 2023
  • CVE-2018-25073 (tsn-ranksystem) 11 January 2023
  • CVE-2019-19034 (manageengine_assetexplorer) 23 March 2020
  • CVE-2019-20627 (autoupdater.net) 23 March 2020
  • CVE-2019-15510 (manageengine_desktop_central) 23 March 2020

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

How to Use AWS IAM Role on AWS EKS PODs

Posted on 5 April 2021

From dzone.com

Attach IAM Role to the Kubernetes POD

It’s possible to attach an IAM role in a Kubernetes POD without using third-party software, such as kube2iam and kiam. This is thanks to the integration between AWS IAM and Kubernetes ServiceAccount, following the approach of IAM Roles for Service Accounts (IRSA).

Read more…

Posted in News

Post navigation

Previous post: Firmware attacks, a grey area in cybersecurity of organizations
Next post: The SolarWinds hack timeline: Who knew what, and when?
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.