Jan. 25, 2024, 4:42 p.m. | Eswar

GBHackers On Security gbhackers.com

Researchers have discovered a new loophole in Google Kubernetes Engine (GKE), which threat actors can utilize with a Google account to take over the misconfigured Kubernetes Cluster.  Threat actors can further use these compromised clusters for crypto mining, DoS (denial of service), and data theft. This loophole is dubbed “Sys:all” and affects more than 250,000 […]


The post Google Kubernetes Flaw Let Any Google User Control the Cluster appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security …

account can cluster clusters compromised computer security control crypto crypto mining data data theft denial of service dos engine flaw gke google google account google kubernetes engine kubernetes mining misconfigured researchers service theft threat threat actors vulnerability

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Associate Compliance Advisor

@ SAP | Budapest, HU, 1031

DevSecOps Engineer

@ Qube Research & Technologies | London

Software Engineer, Security

@ Render | San Francisco, CA or Remote (USA & Canada)

Associate Consultant

@ Control Risks | Frankfurt, Hessen, Germany

Senior Security Engineer

@ Activision Blizzard | Work from Home - CA