Feb. 13, 2024, 7:24 p.m. | Thomas Tan

Security Boulevard securityboulevard.com

Intro The Kubernetes documentation describes operators as “software extensions to Kubernetes that use custom resources to manage applications and their components.” These operators automate application resource deployment and management with custom controllers tied to one or more custom resource definitions. Custom controllers create bespoke attack surfaces that attackers can target when they can control custom resource data. […]


The post Exploiting Kubernetes through Operator Injection appeared first on Praetorian.


The post Exploiting Kubernetes through Operator Injection appeared first on …

application applications attack attackers attack surfaces can components control controllers definitions deployment documentation exploiting extensions injection kubernetes manage management operators resource resources software target vulnerabilities vulnerability research

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Officer Hospital Laguna Beach

@ Allied Universal | Laguna Beach, CA, United States

Sr. Cloud DevSecOps Engineer

@ Oracle | NOIDA, UTTAR PRADESH, India

Cloud Operations Security Engineer

@ Elekta | Crawley - Cornerstone

Cybersecurity – Senior Information System Security Manager (ISSM)

@ Boeing | USA - Seal Beach, CA

Engineering -- Tech Risk -- Security Architecture -- VP -- Dallas

@ Goldman Sachs | Dallas, Texas, United States