About

Synopsis

This white paper compares common methods of protection against attackers' tactics used in the four Kubernetes attacks so far in 2023: Dero Cryptocurrency Miner, Monero Cryptocurrency Miner,  Scarleteel, and RBAC-Buster. 

Learn how you to protect your organization from this year's attacks and how to prepare for what's to come.

Key takeaways: 

  • If you are relying on admission control, or reverse-engineering detection that relies on runtime events, when the next attack comes, you either won’t detect it at all, or you’ll detect it too late
  • To detect these and other attacks, you need a real-time, combined view of Kubernetes risk.

Share  this Post

DOWNLOAD

Whitepaper Download Closed

This document is no longer available for download. Check our resources page for other helpful information

Synopsis

Synopsis

This white paper compares common methods of protection against attackers' tactics used in the four Kubernetes attacks so far in 2023: Dero Cryptocurrency Miner, Monero Cryptocurrency Miner,  Scarleteel, and RBAC-Buster. 

Learn how you to protect your organization from this year's attacks and how to prepare for what's to come.

Key takeaways: 

  • If you are relying on admission control, or reverse-engineering detection that relies on runtime events, when the next attack comes, you either won’t detect it at all, or you’ll detect it too late
  • To detect these and other attacks, you need a real-time, combined view of Kubernetes risk.

Share  this Post

REGISTER

This webinar has closed.

This asset is no longer available for download.

Release Date:
August 31, 2023
SYNOPSIS

Synopsis

This white paper compares common methods of protection against attackers' tactics used in the four Kubernetes attacks so far in 2023: Dero Cryptocurrency Miner, Monero Cryptocurrency Miner,  Scarleteel, and RBAC-Buster. 

Learn how you to protect your organization from this year's attacks and how to prepare for what's to come.

Key takeaways: 

  • If you are relying on admission control, or reverse-engineering detection that relies on runtime events, when the next attack comes, you either won’t detect it at all, or you’ll detect it too late
  • To detect these and other attacks, you need a real-time, combined view of Kubernetes risk.

Share  this Post

The Speakers

No items found.
SYNOPSIS

Synopsis

This white paper compares common methods of protection against attackers' tactics used in the four Kubernetes attacks so far in 2023: Dero Cryptocurrency Miner, Monero Cryptocurrency Miner,  Scarleteel, and RBAC-Buster. 

Learn how you to protect your organization from this year's attacks and how to prepare for what's to come.

Key takeaways: 

  • If you are relying on admission control, or reverse-engineering detection that relies on runtime events, when the next attack comes, you either won’t detect it at all, or you’ll detect it too late
  • To detect these and other attacks, you need a real-time, combined view of Kubernetes risk.

Share  this Post

Put RAD’s AI To Work