Using fileless malware to breach K8s, bypassing common security tools and stealing your secrets
In this live demo, we will use Ezuri, a memory loader, to penetrate K8s live environments, load a fileless malware, undetected by common security tools, and steal SSL keys.
But not to worry, we will also show how you can take measure against it.
ARMO
VP R&D
CONTACT US