Cloud Native Live: Hacking Kubernetes

CNCF Online Programs
Wed, Mar 17, 12:00 PM (PDT)

Using fileless malware to breach K8s, bypassing common security tools and stealing your secrets

About this event

In this live demo, we will use Ezuri, a memory loader, to penetrate K8s live environments, load a fileless malware, undetected by common security tools, and steal SSL keys.

But not to worry, we will also show how you can take measure against it.

Speaker

  • Ben Hirschberg

    Ben Hirschberg

    ARMO

    VP R&D


  • Organizers

  • Ihor Dvoretskyi

    Ihor Dvoretskyi

    Cloud Native Computing Foundation

    Organizer

    View Profile
  • Kristi Tan

    Kristi Tan

    CNCF

    Organizer

    View Profile
  • Chris Aniszczyk

    Chris Aniszczyk

    Linux Foundation (CNCF)

    Organizer

    View Profile
  • Libby Schulze

    Libby Schulze

    CNCF

    Organizer

    View Profile