
Kubernetes RBAC Bypass: When Least Privilege Isn't Actually Configured
How Kubernetes RBAC misconfigurations enable privilege escalation. Real Tesla breach, CVE-2018-1002105, kubectl audit commands, and RBAC hardening playbook.
Posts tagged: Cloud Security

How Kubernetes RBAC misconfigurations enable privilege escalation. Real Tesla breach, CVE-2018-1002105, kubectl audit commands, and RBAC hardening playbook.

How attackers break out of Docker containers using privileged mode, mounted sockets, and CVE exploits. Detection with Falco, hardening with seccomp and …

How a single misconfigured S3 permission exposed millions of records. Real breaches, AWS CLI enumeration commands, CloudTrail detection, and hardening playbook.

Last year AnyConnect went through an interesting transformation, its name changed to Secure Client, and looks like Cisco realized that the amount of information …

My Cisco live experience was focused on 80% Security and 20% Collaboration. One of the sessions I assisted last week was the one related to StealthWatch and …