Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Warns Default Helm Charts Could Leave Kubernetes Apps Exposed to Data Leaks

Microsoft Warns Default Helm Charts Could Leave Kubernetes Apps Exposed to Data Leaks

Posted on May 6, 2025May 9, 2025 By CWS

Might 06, 2025Ravie LakshmananCloud Safety / DevOps
Microsoft has warned that utilizing pre-made templates, similar to out-of-the-box Helm charts, throughout Kubernetes deployments might open the door to misconfigurations and leak beneficial information.
“Whereas these ‘plug-and-play’ choices tremendously simplify the setup course of, they usually prioritize ease of use over safety,” Michael Katchinskiy and Yossi Weizman from the Microsoft Defender for Cloud Analysis group stated.
“Because of this, a lot of functions find yourself being deployed in a misconfigured state by default, exposing delicate information, cloud assets, and even the complete setting to attackers.”
Helm is a bundle supervisor for Kubernetes that enables builders to bundle, configure, and deploy functions and providers onto Kubernetes clusters. It is a part of the Cloud Native Computing Basis (CNCF).

Kubernetes software packages are structured within the Helm packaging format known as charts, that are YAML manifests and templates used to explain the Kubernetes assets and configurations essential to deploy the app.
Microsoft identified that open-source tasks usually embrace default manifests or pre-defined Helm charts that prioritize ease of use over safety, significantly main to 2 main considerations –
Exposing providers externally with out correct community restrictionsLack of sufficient built-in authentication or authorization by default

Because of this, organizations utilizing these tasks with out reviewing YAML manifests and Helm charts can find yourself inadvertently exposing their functions to attackers. This will have severe penalties when the deployed software facilitates querying delicate APIs or allowing administrative actions.
A number of the recognized tasks that would put Kubernetes environments vulnerable to assaults are as follows –

Apache Pinot, which exposes the OLAP datastore’s foremost elements, pinot-controller and pinot-broker, to the web through Kubernetes LoadBalancer providers with none authentication by default
Meshery, which exposes the app’s interface through an exterior IP tackle, thereby permitting anybody with entry to the IP tackle to enroll with a brand new person, achieve entry to the interface, and deploy new pods, finally leading to arbitrary code execution
Selenium Grid, which exposes a NodePort service on a particular port throughout all nodes in a Kubernetes cluster, making exterior firewall guidelines the one line of protection

To mitigate the dangers related to such misconfigurations, it is suggested to evaluation and modify them in response to safety greatest practices, periodically scan publicly going through interfaces, and monitor working containers for malicious and suspicious actions.
“Many in-the-wild exploitations of containerized functions originate in misconfigured workloads, usually when utilizing default settings,” the researchers stated. “Counting on ‘default by comfort’ setups pose a major safety threat.”

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Apps, Charts, Data, Default, Exposed, Helm, Kubernetes, Leaks, Leave, Microsoft, Warns

Post navigation

Previous Post: Entra ID Data Protection: Essential or Overkill?
Next Post: The Silent Drivers Behind 2025’s Worst Breaches

Related Posts

What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive The Hacker News
Scattered Spider Hacker Arrests Halt Attacks, But Copycat Threats Sustain Security Pressure Scattered Spider Hacker Arrests Halt Attacks, But Copycat Threats Sustain Security Pressure The Hacker News
Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions The Hacker News
Why Offensive Security Training Benefits Your Entire Security Team Why Offensive Security Training Benefits Your Entire Security Team The Hacker News
Orchid Security Enhances Enterprise Identity Observability Orchid Security Enhances Enterprise Identity Observability The Hacker News
How To Automate Ticket Creation, Device Identification and Threat Triage With Tines How To Automate Ticket Creation, Device Identification and Threat Triage With Tines The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark