News
Misconfigured permissions for Argo's web-facing dashboard allow unauthenticated attackers to run code on Kubernetes targets, including cryptomining containers.
Threat actors are abusing misconfigured Argo Workflows instances to deploy cryptocurrency miners on Kubernetes (K8s) clusters.
Analysts with cybersecurity company Intezer have found that cybercriminals are now going after a new attack vector against Kubernetes clusters via misconfigured Argo Workflows instances.
Codefresh announces Codefresh Hub for Argo, a community marketplace devoted to helping users optimize Argo Workflow efficiencies.
In 3.4, workflows now include support for automating nested workflows, workflow inventory, workflow always templates, and workflow convergence. What does that mean exactly?
Some results have been hidden because they may be inaccessible to you
Show inaccessible results