all InfoSec news
Post-exploiting a compromised etcd – Full control over the cluster and its nodes
Nov. 7, 2023, 8 a.m. | Luis Toro Puig
NCC Group Research Blog research.nccgroup.com
architecture cluster components compromised containers control exploiting framework kubernetes make up nodes plane roles services workers workloads
More from research.nccgroup.com / NCC Group Research Blog
Non-Deterministic Nature of Prompt Injection
2 weeks, 4 days ago |
research.nccgroup.com
LTair: The LTE Air Interface Tool
1 month, 2 weeks ago |
research.nccgroup.com
The Development of a Telco Attack Testing Tool
1 month, 2 weeks ago |
research.nccgroup.com
Jobs in InfoSec / Cybersecurity
Professional Services Resident Consultant / Senior Professional Services Resident Consultant - AMS
@ Zscaler | Bengaluru, India
Head of Security, Risk & Compliance
@ Gedeon Richter Pharma GmbH | Budapest, HU
Unarmed Professional Security Officer - County Hospital
@ Allied Universal | Los Angeles, CA, United States
Senior Software Engineer, Privacy Engineering
@ Block | Seattle, WA, United States
Senior Cyber Security Specialist
@ Avaloq | Bioggio, Switzerland
Senior Cyber Software Engineer
@ Draper | Cambridge, MA, United States