







Kubernetes Targeted Attacks in 2023: How to Detect & Respond
About
This 25 minute discussion dives into how to protect against the tactics of the four main Kubernetes-targeted attacks from 2023, including the Dero and Monero cryptocurrency mining campaigns, Scarleteel and RBAC-Buster. We will start by addressing the statistics around the prominence of Kubernetes-targeted attacks and analyzing the attacks themselves.
Key takeaways:
- Baseline requirements for detection and response in Kubernetes in general, based on what we see with these attacks
- Where runtime security or polling intervals scanning Kubernetes misconfigurations leave you exposed
- Why a real-time view of the Kubernetes life cycle is key, connected to runtime, RBAC and more.
Whitepaper Download Closed
This document is no longer available for download. Check our resources page for other helpful information
Synopsis
This 25 minute discussion dives into how to protect against the tactics of the four main Kubernetes-targeted attacks from 2023, including the Dero and Monero cryptocurrency mining campaigns, Scarleteel and RBAC-Buster. We will start by addressing the statistics around the prominence of Kubernetes-targeted attacks and analyzing the attacks themselves.
Key takeaways:
- Baseline requirements for detection and response in Kubernetes in general, based on what we see with these attacks
- Where runtime security or polling intervals scanning Kubernetes misconfigurations leave you exposed
- Why a real-time view of the Kubernetes life cycle is key, connected to runtime, RBAC and more.
This webinar has closed.
This asset is no longer available for download.
This 25 minute discussion dives into how to protect against the tactics of the four main Kubernetes-targeted attacks from 2023, including the Dero and Monero cryptocurrency mining campaigns, Scarleteel and RBAC-Buster. We will start by addressing the statistics around the prominence of Kubernetes-targeted attacks and analyzing the attacks themselves.
Key takeaways:
- Baseline requirements for detection and response in Kubernetes in general, based on what we see with these attacks
- Where runtime security or polling intervals scanning Kubernetes misconfigurations leave you exposed
- Why a real-time view of the Kubernetes life cycle is key, connected to runtime, RBAC and more.
The Speakers
This 25 minute discussion dives into how to protect against the tactics of the four main Kubernetes-targeted attacks from 2023, including the Dero and Monero cryptocurrency mining campaigns, Scarleteel and RBAC-Buster. We will start by addressing the statistics around the prominence of Kubernetes-targeted attacks and analyzing the attacks themselves.
Key takeaways:
- Baseline requirements for detection and response in Kubernetes in general, based on what we see with these attacks
- Where runtime security or polling intervals scanning Kubernetes misconfigurations leave you exposed
- Why a real-time view of the Kubernetes life cycle is key, connected to runtime, RBAC and more.
Put RAD’s AI To Work
