
Part 1: Mapping the MITRE ATT&CK framework to your Kubernetes cluster: Initial Access
The MITRE ATT&CK framework provides a knowledgebase of adversary tactics and techniques. In this post, we see how Microsoft applied the attack matrix to K8S.
The MITRE ATT&CK framework provides a knowledgebase of adversary tactics and techniques. In this post, we see how Microsoft applied the attack matrix to K8S.
This is the fifth part of a nine part series on the MITRE ATT&CK framework for Kubernetes, covering the Defense Evasion tactic with examples.
This is the eighth part of a nine part series on the MITRE ATT&CK framework for Kubernetes, covering the Lateral Movement tactic with examples.
Excessive permissions in cloud accounts can significantly increase the attack surface. It is important to understand what permissions are assigned to various users, groups, roles, service accounts versus what permissions they actually need.
This article is a quick introduction to network load balancing and how to create a Network Load Balancer on AWS.
A short blogpost that shows an exploitation scenario where an attacker, who has managed to gain SSRF or code execution capabilities, can leak tokens and escape to the Google Cloud platform.