About

This 25 minute discussion dives into how to protect against the tactics of the four main Kubernetes-targeted attacks from 2023, including the Dero and Monero cryptocurrency mining campaigns, Scarleteel and RBAC-Buster. We will start by addressing the statistics around the prominence of Kubernetes-targeted attacks and analyzing the attacks themselves.

Key takeaways:

  • Baseline requirements for detection and response in Kubernetes in general, based on what we see with these attacks
  • Where runtime security or polling intervals scanning Kubernetes misconfigurations leave you exposed
  • Why a real-time view of the Kubernetes life cycle is key, connected to runtime, RBAC and more.

Share  this Post

DOWNLOAD

Whitepaper Download Closed

This document is no longer available for download. Check our resources page for other helpful information

Synopsis

This 25 minute discussion dives into how to protect against the tactics of the four main Kubernetes-targeted attacks from 2023, including the Dero and Monero cryptocurrency mining campaigns, Scarleteel and RBAC-Buster. We will start by addressing the statistics around the prominence of Kubernetes-targeted attacks and analyzing the attacks themselves.

Key takeaways:

  • Baseline requirements for detection and response in Kubernetes in general, based on what we see with these attacks
  • Where runtime security or polling intervals scanning Kubernetes misconfigurations leave you exposed
  • Why a real-time view of the Kubernetes life cycle is key, connected to runtime, RBAC and more.

Share  this Post

REGISTER

This webinar has closed.

This asset is no longer available for download.

Release Date:
December 6, 2023
SYNOPSIS

This 25 minute discussion dives into how to protect against the tactics of the four main Kubernetes-targeted attacks from 2023, including the Dero and Monero cryptocurrency mining campaigns, Scarleteel and RBAC-Buster. We will start by addressing the statistics around the prominence of Kubernetes-targeted attacks and analyzing the attacks themselves.

Key takeaways:

  • Baseline requirements for detection and response in Kubernetes in general, based on what we see with these attacks
  • Where runtime security or polling intervals scanning Kubernetes misconfigurations leave you exposed
  • Why a real-time view of the Kubernetes life cycle is key, connected to runtime, RBAC and more.

Share  this Post

The Speakers

No items found.
SYNOPSIS

This 25 minute discussion dives into how to protect against the tactics of the four main Kubernetes-targeted attacks from 2023, including the Dero and Monero cryptocurrency mining campaigns, Scarleteel and RBAC-Buster. We will start by addressing the statistics around the prominence of Kubernetes-targeted attacks and analyzing the attacks themselves.

Key takeaways:

  • Baseline requirements for detection and response in Kubernetes in general, based on what we see with these attacks
  • Where runtime security or polling intervals scanning Kubernetes misconfigurations leave you exposed
  • Why a real-time view of the Kubernetes life cycle is key, connected to runtime, RBAC and more.

Share  this Post

Put RAD’s AI To Work