Attacking Kubernetes: Offensive Recon and Attack Path Analysis with CDK, Kubehound, and Kubescape
Part 1 - Lab setup, attacker simulation, and finding exploitable misconfigurations

Search for a command to run...
Articles tagged with #security
Part 1 - Lab setup, attacker simulation, and finding exploitable misconfigurations

Securing AI: Microsoft Shares Key Research Findings

EU Cyber Resilience Act Explained by a Cybersecurity Professional

Introduction Application security was supposed to be a safety net. Lately, it feels more like quicksand. Modern AppSec teams are swamped by an endless stream of alerts. The report found on thehackernews.com prompted me to think about this issue (http...

Identify and manage security risks in software architecture

Introduction Infrastructure as code (IaC), also known as software-defined infrastructure, allows the configuration and deployment of infrastructure components faster with consistency by allowing them to be defined as a code and also enables repeatabl...
