The best tools to detect ARP spoofing

To gain insights into the underlying protocols and strengthen defenses against attacks like ARP spoofing, several tools are available that can assist in network monitoring, analysis, and security.

Check my list of the best tools to hack or detect ARP spoofing, but also other network-based attacks.

Czytaj dalej „The best tools to detect ARP spoofing”

How to securely expose Kubernetes resources to the Internet?

As organizations increasingly adopt cloud-based technologies and distributed development workflows, exposing internal resources such as Kubernetes clusters has become a necessity.

In this article, we will explore the challenges and limitations associated with exposing internal resources and discuss how hackers are attempting to attack these resources.

Also, check examples of code to provide secure Kubernetes configuration.

Czytaj dalej „How to securely expose Kubernetes resources to the Internet?”

How to allow supervisord to run as non-root user?

Supervisor is running as root by default, but it creates security side effects. This opens us to a possibility of executing code as root for users who don’t have root access but do have access to repo that is going to generate supervisor config files in user space.

In order to mitigate that, supervisor should be ran as non-root user.

Czytaj dalej „How to allow supervisord to run as non-root user?”