Feb. 13, 2024, 7:24 p.m. | Thomas Tan

Security Boulevard securityboulevard.com

Intro The Kubernetes documentation describes operators as “software extensions to Kubernetes that use custom resources to manage applications and their components.” These operators automate application resource deployment and management with custom controllers tied to one or more custom resource definitions. Custom controllers create bespoke attack surfaces that attackers can target when they can control custom resource data. […]


The post Exploiting Kubernetes through Operator Injection appeared first on Praetorian.


The post Exploiting Kubernetes through Operator Injection appeared first on …

application applications attack attackers attack surfaces can components control controllers definitions deployment documentation exploiting extensions injection kubernetes manage management operators resource resources software target vulnerabilities vulnerability research

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)