Jan. 25, 2024, 4:42 p.m. | Eswar

GBHackers On Security gbhackers.com

Researchers have discovered a new loophole in Google Kubernetes Engine (GKE), which threat actors can utilize with a Google account to take over the misconfigured Kubernetes Cluster.  Threat actors can further use these compromised clusters for crypto mining, DoS (denial of service), and data theft. This loophole is dubbed “Sys:all” and affects more than 250,000 […]


The post Google Kubernetes Flaw Let Any Google User Control the Cluster appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security …

account can cluster clusters compromised computer security control crypto crypto mining data data theft denial of service dos engine flaw gke google google account google kubernetes engine kubernetes mining misconfigured researchers service theft threat threat actors vulnerability

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC