March 14, 2024, 4:51 p.m. | Black Hat

Black Hat www.youtube.com

...This talk will explore the concept of a container-focused rootkit and how it can be used to conduct and hide malicious activity occurring on a Kubernetes cluster. First, we'll discuss the basic anatomy of a rootkit, and then dive into the specifics of this container-based rootkit, including the consequences of such an attack. Finally, we will explore strategies for mitigating the risks associated with a Kubernetes-based rootkit attack, including best practices for securing your cluster and detecting and responding to …

attack basic can cluster concept consequences container discuss dive hide kubernetes malicious rootkit

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Senior Security Researcher, SIEM

@ Huntress | Remote Canada

Senior Application Security Engineer

@ Revinate | San Francisco Bay Area

Cyber Security Manager

@ American Express Global Business Travel | United States - New York - Virtual Location

Incident Responder Intern

@ Bentley Systems | Remote, PA, US

SC2024-003533 Senior Online Vulnerability Assessment Analyst (CTS) - THU 9 May

@ EMW, Inc. | Mons, Wallonia, Belgium