

NB528: IP Fabric Adds Firewall Rule Simulation; Extreme Networks Debuts Agentic AI in Platform ONE
May 27, 2025
Dive into the critical vulnerabilities in Kubernetes Gardener and the alarming misuse of CNAME records to spread malware. Discover how IP Fabric's new firewall rule simulation can reshape network management. The discussion also covers the impact of AI innovations in troubleshooting network issues, alongside the challenges posed by cybercrime. Finally, unpack Zoom's fiscal performance and its competitive strategies against Microsoft Teams. It's a whirlwind of cybersecurity, network enhancements, and corporate strategies!
AI Snips
Chapters
Transcript
Episode notes
Patch Kubernetes Gardener Now
- Update Kubernetes Gardener immediately to patch high-severity privilege escalations.
- These vulnerabilities allow admin users on certain clusters to control entire cluster infrastructure.
Abandoned CNAMEs Enable Malware
- Threat actors hijack abandoned CNAME DNS records for malware and spam distribution.
- Neglected DNS housekeeping creates significant security risks with trusted domain misuse.
Use IP Fabric Security Features
- Use IP Fabric's firewall rule simulation before deploying rules to avoid traffic disruption.
- Leverage its CVE-path mapping to prioritize vulnerability management based on real network risk.