March 14, 2024, 4:51 p.m. | Black Hat

Black Hat www.youtube.com

...This talk will explore the concept of a container-focused rootkit and how it can be used to conduct and hide malicious activity occurring on a Kubernetes cluster. First, we'll discuss the basic anatomy of a rootkit, and then dive into the specifics of this container-based rootkit, including the consequences of such an attack. Finally, we will explore strategies for mitigating the risks associated with a Kubernetes-based rootkit attack, including best practices for securing your cluster and detecting and responding to …

attack basic can cluster concept consequences container discuss dive hide kubernetes malicious rootkit

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC