
Research
5 Malicious Chrome Extensions Enable Session Hijacking in Enterprise HR and ERP Systems
Five coordinated Chrome extensions enable session hijacking and block security controls across enterprise HR and ERP platforms.
This repository is deprecated, and will soon be archived. Instructions for the new operator can be found here.
The Vitess Operator provides automation that simplifies the administration of Vitess clusters on Kubernetes.
The Operator installs a custom resource for objects of the custom type VitessCluster. This custom resource allows you to configure the high-level aspects of your Vitess deployment, while the details of how to run Vitess on Kubernetes are abstracted and automated.
A typical VitessCluster object might expand to the following tree once it's fully deployed. Objects in bold are custom resource kinds defined by this Operator.
Once the Operator is installed, you can create VitessCluster objects in any namespace as long as the etcd operator is runing in that namespace or is running clusterwide mode.
kubectl apply -R -f deploy
kubectl apply -f my-vitess.yaml
Wait until the cluster is ready:
kubectl get vitessclusters -o 'custom-columns=NAME:.metadata.name,READY:.status.phase'
You should see:
NAME PHASE
vitess Ready
Start a kubectl proxy:
kubectl proxy --port=8001
Then visit:
http://localhost:8001/api/v1/namespaces/default/services/vt-zone1-vtctld:web/proxy/app/
# Delete the VitessCluster and etcd objects
kubectl delete -f my-vitess.yaml
# Uninstall the Vitess Operator
kubectl delete -R -f deploy
kubectl apply -f deploy/crdsoperator-sdk up localkubectl create -f my-vitess.yamlFAQs
Unknown package
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Five coordinated Chrome extensions enable session hijacking and block security controls across enterprise HR and ERP platforms.

Research
Node.js patched a crash bug where AsyncLocalStorage could cause stack overflows to bypass error handlers and terminate production servers.

Research
/Security News
A malicious Chrome extension steals newly created MEXC API keys, exfiltrates them to Telegram, and enables full account takeover with trading and withdrawal rights.