A Shmoocon presentation points out several weaknesses built in to Kubernetes configurations and how a researcher can exploit them.
from Dark Reading: https://ift.tt/39bCubr
via IFTTT
A Shmoocon presentation points out several weaknesses built in to Kubernetes configurations and how a researcher can exploit them.
from Dark Reading: https://ift.tt/39bCubr
via IFTTT