Главная
Study mode:
on
1
Introduction
2
About Graboid
3
Research Methods
4
Reactive Research
5
Conclusion
6
How can we protect ourselves
7
Best practices
8
Layer of defense
9
Community Services
10
ephemeral workload design
11
Outro
Description:
Explore insights into unsecured Kubernetes clusters in the wild through this conference talk. Discover the findings of Jay Chen and Aviv Sasson from Palo Alto Networks, who uncovered 2,100 unsecured Kubernetes clusters comprising 5,300 nodes, 31,340 CPUs, and 75,270 pods on the internet. Learn about the sensitive data leaks, including access credentials, source code, and PII, from these clusters. Gain knowledge about the honeypot infrastructure used to collect and monitor malicious activities targeting Kubernetes environments. Understand the first malware that exploited Kubelets to compromise Kubernetes, its sophisticated evasion tactics, credential harvesting, lateral movement, and cryptojacking operations. Delve into topics such as Graboid, research methods, reactive research, and best practices for protection. Explore layers of defense, community services, and ephemeral workload design to enhance Kubernetes security.

Insights into Unsecured Kubernetes in the Wild

CNCF [Cloud Native Computing Foundation]
Add to list