







The Defender's Guide to Protecting Against Kubernetes Attacks in 2023
About
Synopsis
This white paper compares common methods of protection against attackers' tactics used in the four Kubernetes attacks so far in 2023: Dero Cryptocurrency Miner, Monero Cryptocurrency Miner, Scarleteel, and RBAC-Buster.
Learn how you to protect your organization from this year's attacks and how to prepare for what's to come.
Key takeaways:
- If you are relying on admission control, or reverse-engineering detection that relies on runtime events, when the next attack comes, you either won’t detect it at all, or you’ll detect it too late
- To detect these and other attacks, you need a real-time, combined view of Kubernetes risk.
Whitepaper Download Closed
This document is no longer available for download. Check our resources page for other helpful information
Synopsis
Synopsis
This white paper compares common methods of protection against attackers' tactics used in the four Kubernetes attacks so far in 2023: Dero Cryptocurrency Miner, Monero Cryptocurrency Miner, Scarleteel, and RBAC-Buster.
Learn how you to protect your organization from this year's attacks and how to prepare for what's to come.
Key takeaways:
- If you are relying on admission control, or reverse-engineering detection that relies on runtime events, when the next attack comes, you either won’t detect it at all, or you’ll detect it too late
- To detect these and other attacks, you need a real-time, combined view of Kubernetes risk.
This webinar has closed.
This asset is no longer available for download.
Synopsis
This white paper compares common methods of protection against attackers' tactics used in the four Kubernetes attacks so far in 2023: Dero Cryptocurrency Miner, Monero Cryptocurrency Miner, Scarleteel, and RBAC-Buster.
Learn how you to protect your organization from this year's attacks and how to prepare for what's to come.
Key takeaways:
- If you are relying on admission control, or reverse-engineering detection that relies on runtime events, when the next attack comes, you either won’t detect it at all, or you’ll detect it too late
- To detect these and other attacks, you need a real-time, combined view of Kubernetes risk.
The Speakers
Synopsis
This white paper compares common methods of protection against attackers' tactics used in the four Kubernetes attacks so far in 2023: Dero Cryptocurrency Miner, Monero Cryptocurrency Miner, Scarleteel, and RBAC-Buster.
Learn how you to protect your organization from this year's attacks and how to prepare for what's to come.
Key takeaways:
- If you are relying on admission control, or reverse-engineering detection that relies on runtime events, when the next attack comes, you either won’t detect it at all, or you’ll detect it too late
- To detect these and other attacks, you need a real-time, combined view of Kubernetes risk.
Put RAD’s AI To Work
