Cloud Native Live: Hacking Kubernetes

Using fileless malware to breach K8s, bypassing common security tools and stealing your secrets

About this event

In this live demo, we will use Ezuri, a memory loader, to penetrate K8s live environments, load a fileless malware, undetected by common security tools, and steal SSL keys.

But not to worry, we will also show how you can take measure against it.