Skip to Content

QUESTION The Information Technology industry is a rapidly evolving space, and it is essential for professionals to stay up to date with the latest trends in order to remain competitive. The Information Technology industry is ever-evolving, and so are the skills and technologies that are in high demand. In the current Information Technology (IT) industry, …

Read More about Answered: What technology is currently in high demand in the Information Technology industry?

Updated on 2022-12-13 Uber suffered a data breach after an attacker leaked the employee email addresses, IT asset information, and corporate reports stolen from a third-party vendor, Teqtivity. Read more: Uber suffers new data breach after attack on vendor, info leaked online Updated on 2022-12-12: Uber hacked data leaked online The details of more than …

Read More about Uber hacked data leaked online

Security Command Center Feature Security Health Analytics, a built-in service of Security Command Center, launched the DATAPROC_IMAGE_OUTDATED detector to General Availability. This detector finds clusters created with Dataproc image versions that are affected by security vulnerabilities in the Apache Log4j 2 utility (CVE-2021-44228 and CVE-2021-45046). For more information, see Dataproc vulnerability findings.

Read More about Google Cloud Updates on December 30, 2021

Anthos clusters on VMware Issues When deploying Anthos clusters on VMware releases with a version number of 1.9.0 or higher, that have the Seesaw bundled load balancer in an environment that uses NSX-T stateful distributed firewall rules, stackdriver-operator might fail to create gke-metrics-agent-conf ConfigMap and cause gke-connect-agent Pods to be in a crash loop. The underlying issue is that stateful NSX-T …

Read More about Google Cloud Updates on December 23, 2021

Security Command Center Feature: Event Threat Detection, a built-in service of Security Command Center, launched the Active Scan: Log4j Vulnerable to RCE rule to General Availability. This rule detects active Log4j vulnerabilities by identifying DNS queries for unobfuscated domains that were initiated by supported Log4j vulnerability scanners. For more information, see Event Threat Detection rules.

Read More about Google Cloud Updates on December 21, 2021

Google Kubernetes Engine Changed For GKE versions 1.21 and later, newly created clusters will have the DenyServiceExternalIPs admission controller enabled by default, disabling the use of ExternalIPs Services. For existing clusters, when you upgrade the cluster to GKE version 1.21 or later, the DenyServiceExternalIPs admission controller will not be enabled. Since ExternalIPs Services are not widely …

Read More about Google Cloud Updates on December 20, 2021

Dataproc Changed Dataproc has released the following sub-minor image versions to address an Apache Log4j 2 vulnerability (also see Create a cluster and Recreate and update a cluster for more information). Note: These images supersede the 1.5 and 2.0 images listed in the December 16, 2021 release note: 1.5.53-centos8, 1.5.53-debian10, 1.5.53-ubuntu18, 2.0.27-centos8, 2.0.27-debian10, 2.0.27-ubuntu18 Note: The Geode interpreter for Zeppelin notebooks is not operational in the 1.4.77, 1.5.53, 2.0.27, …

Read More about Google Cloud Updates on December 18, 2021

Cloud Load Balancing Feature: Internal TCP/UDP Load Balancing now allows you to configure a connection tracking policy for the load balancer’s backend service. A connection tracking policy introduces the following new properties to let you customize your load balancer’s connection tracking behavior: Tracking mode Connection persistence on unhealthy backends Idle timeout To learn about how …

Read More about Google Cloud Updates on December 15, 2021
Ads Blocker Image Powered by Code Help Pro

Your Support Matters...

We run an independent site that\'s committed to delivering valuable content, but it comes with its challenges. Many of our readers use ad blockers, causing our advertising revenue to decline. Unlike some websites, we haven\'t implemented paywalls to restrict access. Your support can make a significant difference. If you find this website useful and choose to support us, it would greatly secure our future. We appreciate your help. If you\'re currently using an ad blocker, please consider disabling it for our site. Thank you for your understanding and support.