{"id":38235,"date":"2023-02-04T20:40:40","date_gmt":"2023-02-04T20:40:40","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/04\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\/"},"modified":"2023-02-04T20:41:40","modified_gmt":"2023-02-04T20:41:40","slug":"ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/04\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\/","title":{"rendered":"AI threats and open-source vulnerabilities top host of security issues facing cloud-native community"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<br \/><img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/d15shllkswkct0.cloudfront.net\/wp-content\/blogs.dir\/1\/files\/2023\/02\/Sharma2-horizontal.jpg\" \/><\/p>\n<div>\n<p>It seems that safety issues within the cloud-native world look loads like what\u2019s maintaining practitioners up at evening in the remainder of the know-how ecosystem.<\/p>\n<p>Implementation of <a href=\"https:\/\/siliconangle.com\/2020\/02\/23\/trust-nothing-breaches-mount-radical-approach-cybersecurity-gains-favor\/\">zero-trust security<\/a> within the enterprise, provide chain vulnerability, threats to cryptography from quantum computing, and the rise of highly effective synthetic intelligence engines resembling OpenAI LLC\u2019s\u00a0<a href=\"https:\/\/siliconangle.com\/2023\/01\/19\/chatgpt-wont-give-openai-sustainable-first-mover-advantage\/\">ChatGPT<\/a> are excessive on the record of worries amongst cloud-native safety personnel. Extra issues surrounding continued open-source safety flaws paint an total image for cloud-native as a group underneath escalating assault.<\/p>\n<p>Risk actors comply with progress vectors within the compute world and cloud-native is driving an upward pattern. Throughout the subsequent two years, Gartner has <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2021-11-10-gartner-says-cloud-will-be-the-centerpiece-of-new-digital-experiences\">estimated<\/a> that 95% of recent digital workloads will likely be deployed on cloud-native platforms. The necessity to defend this infrastructure will likely be paramount, which is why the cloud-native safety group is now actively assessing the place probably the most critical dangers reside.<\/p>\n<p>\u201cEveryone seems to be turning into a cloud-native developer,\u201d\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/pritianka\/\">Priyanka Sharma<\/a>\u00a0(pictured), government director and basic supervisor of the Cloud Native Computing Basis, mentioned throughout her keynote remarks on the inaugural <a href=\"https:\/\/events.linuxfoundation.org\/cloudnativesecuritycon-north-america\/\">CloudNativeSecurityCon<\/a> in Seattle on Wednesday. (Extra protection of the occasion from theCUBE, SiliconANGLE Media\u2019s video studio, is <a href=\"https:\/\/www.thecube.net\/events\/linux-foundation\/cloudnativesecuritycon\">available here<\/a>.) \u201cWe\u2019re important to organizations and enterprise in every single place. The teachings in cloud safety have endurance.\u201d<\/p>\n<h3>Worries about ChatGPT<\/h3>\n<p>These classes will want lasting affect as a result of machines are getting smarter. OpenAI\u2019s machine studying mannequin ChatGPT has signaled the <a href=\"https:\/\/siliconangle.com\/2023\/01\/20\/openai-chatgpt-intensifying-competition-data-management-within-supercloud-supercloud2\/\">dawn of a new era<\/a> in synthetic intelligence, one the place highly effective open-source automation instruments have turn into available and simpler to make use of by a mass viewers.<\/p>\n<p>The cloud-native safety group is frightened about ChatGPT. In a presentation on the convention on Wednesday, OpenSSF Normal Supervisor <a href=\"https:\/\/www.linkedin.com\/in\/brianbehlendorf\/\">Brian Behlendorf<\/a>\u00a0described a variety of issues, starting from automated <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/spear-phishing\">spear-fishing attacks<\/a> on open-source initiatives utilizing AI-generated replies to AI-spoofed contributors that place malicious backdoors into supply code. \u201cWe all know that AI fashions might be corrupted,\u201d Behlendorf mentioned.<\/p>\n<p>Points across the potential for corruption have accompanied different current AI advances such because the <a href=\"https:\/\/siliconangle.com\/2021\/06\/29\/githubs-new-copilot-programming-assistant-uses-ai-generate-code\/\">release<\/a> by GitHub of an\u00a0AI programming software named Copilot final 12 months. <a href=\"https:\/\/github.com\/features\/copilot\">Copilot<\/a> generates and suggests strains of code straight inside a programmer\u2019s modifying operate. In January, Microsoft Corp. <a href=\"https:\/\/siliconangle.com\/2023\/01\/17\/microsoft-makes-azure-openai-service-generally-available\/\">announced general availability<\/a> of its Azure OpenAI service that supplied a collection of companies that embrace Codex, a neural community that powers Copilot.<\/p>\n<p>Issues have been expressed by safety researchers over the potential for Copilot to generate exploitable code. One <a href=\"https:\/\/cyber.nyu.edu\/2021\/10\/15\/ccs-researchers-find-github-copilot-generates-vulnerable-code-40-of-the-time\/\">study<\/a> of Copilot by researchers at NYU discovered that the software generated susceptible code 40% of the time.<\/p>\n<p>In the meantime, use of ChatGPT continues to mushroom. In response to a current evaluation, it has turn into the <a href=\"https:\/\/www.zdnet.com\/article\/chatgpt-just-became-the-fastest-growing-app-of-all-time\/\">fastest-growing app<\/a> of all time.<\/p>\n<p>\u201cThe true elephant within the room is the rise of AI and particularly giant language fashions,\u201d\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/mattjarvis08\/\">Matt Jarvis<\/a>, director of developer relations at Snyk Inc., mentioned Thursday. \u201cHundreds of thousands of individuals have been attempting ChatGPT out. The sphere is shifting extremely shortly. It&#8217;s already clear that it\u2019s going to drive huge change.\u201d<\/p>\n<h3>Open-source vulnerability<\/h3>\n<p>The open-source group will depend on a broadly used set of collaborative platforms to construct new initiatives and improve present ones. This extends to areas resembling GitHub, the place a number of notable hacks have been disclosed in current weeks. Over the previous 60 days, Slack worker tokens had been <a href=\"https:\/\/www.cybersecuritydive.com\/news\/slack-tokens-stolen-github-breached\/639721\/\">stolen<\/a>, Okta Inc.\u2019s supply code on GitHub was <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/oktas-source-code-stolen-after-github-repositories-hacked\/\">hacked<\/a>\u00a0and Dropbox Inc. disclosed a <a href=\"https:\/\/thehackernews.com\/2022\/11\/dropbox-breach-hackers-unauthorizedly.html\">breach<\/a> after a malicious actor exfiltrated 130 GitHub repositories.<\/p>\n<p>\u201cIndividuals are nonetheless checking credentials into GitHub,\u201d\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/mattklein123\/\">Matt Klein<\/a>, software program engineer at Lyft Inc. and creator of the open-source mission Envoy, mentioned throughout a panel dialogue hosted on the convention by Tetrate Inc. \u201cIn 2023, that is nonetheless a serious drawback.\u201d<\/p>\n<p>Some of the notable current open-source hacks concerned corruption of the PyTorch machine studying framework. In December, PyTorch builders <a href=\"https:\/\/siliconangle.com\/2023\/01\/02\/pytorch-machine-learning-framework-targeted-cyberattack\/\">identified a security breach<\/a> in a service that hosted third-party extensions to the AI growth software.<\/p>\n<p>The malicious extension is believed to have been downloaded <a href=\"https:\/\/siliconangle.com\/2023\/01\/02\/pytorch-machine-learning-framework-targeted-cyberattack\/\">over 2,300 times<\/a> by open-source customers. \u201cThe attacker abused a belief relationship so as to get their very own code into PyTorch,\u201d <a href=\"https:\/\/www.linkedin.com\/in\/maya-levine\/\">Maya Levine<\/a>, product supervisor at Sysdig Inc., mentioned throughout a presentation on the convention. \u201cWe now have but to know what the true implications of this had been.\u201d<\/p>\n<p>The PyTorch hack demonstrates why corruption within the software program provide chain stays a troubling concern in enterprise IT circles. It took simply <a href=\"https:\/\/www.zdnet.com\/article\/log4j-flaw-this-new-threat-is-going-to-affect-cybersecurity-for-a-long-time\/\">a few hours<\/a> for malicious actors to start launching assaults after researchers <a href=\"https:\/\/builtin.com\/cybersecurity\/log4j-vulerability-explained\">released details<\/a>\u00a0of the Log4j vulnerability in December 2021. Sonatype Inc. produced a <a href=\"https:\/\/www.sonatype.com\/press-releases\/sonatype-finds-700-average-increase-in-open-source-supply-chain-attacks\">study<\/a> final 12 months that documented a 700% common annual improve in software program provide chain assaults over final three years.<\/p>\n<p>For a software program provide chain that was initially constructed on belief, there are actually new instruments rising to mitigate threat. These embrace <a href=\"https:\/\/siliconangle.com\/2022\/01\/25\/quest-for-transparency-tech-world-confronts-urgent-challenge-of-securing-the-software-supply-chain-softwaresupplychain\/\">Tekton Chains<\/a>, a safety subsystem of the Kubernetes Tekton CI\/CD pipeline, and <a href=\"https:\/\/siliconangle.com\/2022\/01\/25\/quest-for-transparency-tech-world-confronts-urgent-challenge-of-securing-the-software-supply-chain-softwaresupplychain\/\">Sigstore<\/a>, a software that automates digital signing and verification of software program parts.<\/p>\n<p>Sigstore was prototyped at Purple Hat Inc. and is a cornerstone of the corporate\u2019s provide chain belief and safety technique. <a href=\"https:\/\/www.sigstore.dev\/\">Partners<\/a> with Purple Hat on the Sigstore mission embrace Google LLC, Hewlett Packard Enterprise Co., VMware Inc. and Cisco Methods Inc.<\/p>\n<p>\u201cTo be able to absolutely implement software program provide chain safety, it&#8217;s important to do it in partnership,\u201d\u00a0<a href=\"https:\/\/www.redhat.com\/en\/authors\/emmy-eide\">Emmy Eide<\/a>, senior supervisor for product safety provide chain at Purple Hat, mentioned Thursday. \u201cWe\u2019ve solely seen success at Purple Hat once we\u2019ve used this partnership strategy. You retain your messaging round threat.\u201d<\/p>\n<h3>Zero belief and quantum<\/h3>\n<p>One strategy embraced by main sectors of the cloud-native safety group to reduce threat is by implementing <a href=\"https:\/\/siliconangle.com\/2020\/02\/23\/trust-nothing-breaches-mount-radical-approach-cybersecurity-gains-favor\/\">zero-trust<\/a> practices. This strategy, which requires the authentication of all customers earlier than granting system entry, has been efficient in lowering cybersecurity threat, in response to <a href=\"https:\/\/www.prnewswire.com\/news-releases\/cybersecurity-leaders-cite-zero-trust-among-most-effective-security-practices-301477722.html\">some studies<\/a>.<\/p>\n<p>Nonetheless, zero belief has additionally emerged as a supply of friction inside organizations as safety researchers battle to manage entry for business-critical purposes they by no means constructed within the first place.<\/p>\n<p>\u201cZero belief for me is to take away implicit belief and be intentional,\u201d\u00a0<a href=\"https:\/\/twitter.com\/kelseyhightower?lang=en\">Kelsey Hightower<\/a>, developer advocate at Google, mentioned Wednesday. \u201cWe attempt to put these laborious shells round all apps. Most safety professionals don\u2019t know what these apps are doing. We find yourself attempting to safe issues we don\u2019t perceive.\u201d<\/p>\n<p>AI, provide chain, open supply and nil belief are present areas of focus for the safety group, however they\u2019re not the one issues. Cloud-native safety researchers are additionally starting to forged a cautious eye at quantum computing and its future implications for public key cryptography.<\/p>\n<p>The priority is that quantum machines could in the end surpass the efficiency limitations of typical computer systems. That has raised the chance that quantum computer systems may ultimately bypass knowledge encryption algorithms, thereby creating a large safety gap.<\/p>\n<p>The know-how trade is already constructing options in anticipation of this risk. In November, SandboxAQ, a startup incubated in Alphabet Inc., <a href=\"https:\/\/siliconangle.com\/2022\/11\/18\/sandboxaq-receives-post-quantum-cryptography-contract-us-air-force\/\">received a contract<\/a> to help the U.S. Air Pressure within the implementation of post-quantum cryptography. Final month, QuSecure Inc. <a href=\"https:\/\/www.businesswire.com\/news\/home\/20230118005268\/en\/QuSecure-Achieves-Critical-Breakthrough-in-Post-Quantum-Encryption-Over-Public-Internet-%E2%80%93-Closes-Loop-for-End-to-End-Quantum-Safe-Data-Security\">unveiled<\/a> what it termed the trade\u2019s first quantum-safe orchestration for shielding encrypted non-public knowledge on any web site or cellular app utilizing quantum-resistant connections.<\/p>\n<p>\u201cThe cycle of know-how change strikes fairly quick and it\u2019s solely getting sooner,\u201d mentioned Snyk\u2019s Jarvis. \u201cWe\u2019re taking place the rabbit gap of discovering one thing we will belief.\u201d<\/p>\n<h5>Picture: Mark Albertson\/SiliconANGLE<\/h5>\n<div class=\"silic-after-content\" id=\"silic-1215091723\">\n<hr style=\"border: 1px solid; color: #d8d8d8; height: 0px; margin-top: 20px;\"\/>\n<h3><span style=\"font-size: 16px;\">Present your assist for our mission by becoming a member of our Dice Membership and Dice Occasion Group of consultants. Be part of the group that features Amazon Net Providers and Amazon.com CEO Andy Jassy, Dell Applied sciences founder and CEO Michael Dell, Intel CEO Pat Gelsinger and lots of extra luminaries and consultants.<\/span><\/h3>\n<\/div><\/div>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\n<br \/><iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/siliconangle.com\/2023\/02\/04\/ai-threats-open-source-vulnerabilities-top-host-security-issues-facing-cloud-native-community\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It seems that safety issues within the cloud-native world look loads like what\u2019s maintaining practitioners up at evening in the remainder of the know-how ecosystem&#8230;.<\/p>\n","protected":false},"author":1,"featured_media":38236,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-38235","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AI threats and open-source vulnerabilities top host of security issues facing cloud-native community - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2023\/02\/04\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI threats and open-source vulnerabilities top host of security issues facing cloud-native community - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2023\/02\/04\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-04T20:40:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-04T20:41:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/02\/Sharma2-horizontal.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"666\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/04\\\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/04\\\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"AI threats and open-source vulnerabilities top host of security issues facing cloud-native community\",\"datePublished\":\"2023-02-04T20:40:40+00:00\",\"dateModified\":\"2023-02-04T20:41:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/04\\\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\\\/\"},\"wordCount\":1330,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/04\\\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/Sharma2-horizontal.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/04\\\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/04\\\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/04\\\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\\\/\",\"name\":\"AI threats and open-source vulnerabilities top host of security issues facing cloud-native community - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/04\\\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/04\\\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/Sharma2-horizontal.jpg\",\"datePublished\":\"2023-02-04T20:40:40+00:00\",\"dateModified\":\"2023-02-04T20:41:40+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/04\\\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/04\\\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/04\\\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/Sharma2-horizontal.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/Sharma2-horizontal.jpg\",\"width\":666,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2023\\\/02\\\/04\\\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI threats and open-source vulnerabilities top host of security issues facing cloud-native community\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI threats and open-source vulnerabilities top host of security issues facing cloud-native community - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/04\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\/","og_locale":"en_US","og_type":"article","og_title":"AI threats and open-source vulnerabilities top host of security issues facing cloud-native community - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/04\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2023-02-04T20:40:40+00:00","article_modified_time":"2023-02-04T20:41:40+00:00","og_image":[{"width":666,"height":408,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/02\/Sharma2-horizontal.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/04\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/04\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"AI threats and open-source vulnerabilities top host of security issues facing cloud-native community","datePublished":"2023-02-04T20:40:40+00:00","dateModified":"2023-02-04T20:41:40+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/04\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\/"},"wordCount":1330,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/04\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/02\/Sharma2-horizontal.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2023\/02\/04\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/04\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\/","url":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/04\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\/","name":"AI threats and open-source vulnerabilities top host of security issues facing cloud-native community - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/04\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/04\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/02\/Sharma2-horizontal.jpg","datePublished":"2023-02-04T20:40:40+00:00","dateModified":"2023-02-04T20:41:40+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/04\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2023\/02\/04\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/04\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/02\/Sharma2-horizontal.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2023\/02\/Sharma2-horizontal.jpg","width":666,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2023\/02\/04\/ai-threats-and-open-source-vulnerabilities-top-host-of-security-issues-facing-cloud-native-community\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"AI threats and open-source vulnerabilities top host of security issues facing cloud-native community"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/38235","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=38235"}],"version-history":[{"count":1,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/38235\/revisions"}],"predecessor-version":[{"id":38237,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/38235\/revisions\/38237"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/38236"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=38235"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=38235"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=38235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}