this post was submitted on 20 May 2024
14 points (100.0% liked)

Pulse of Truth

1620 readers
28 users here now

Cyber Security news and links to cyber security stories that could make you go hmmm. The content is exactly as it is consumed through RSS feeds and wont be edited (except for the occasional encoding errors).

This community is automagically fed by an instance of Dittybopper.

founded 2 years ago
MODERATORS
 

An on-by-default endpoint in ubiquitous logging service Fluent Bit contains an oversight that hackers can toy with to rattle most any cloud environment.

all 2 comments
sorted by: hot top controversial new old
[–] mozz@mbin.grits.dev 2 points 1 year ago

However, Tenable noted, developing such an exploit would require a good deal of effort, being customized to the target's particular operating system and architecture.

Technically, this statement isn't wrong, but if it's meant as anything other than some friendly reassurance so that people can relax as they patch, then I have bad news for the writer about how memory corruption bugs operate