Jack Mannino, chief executive officer at application security provider nVisium LLC, noted that “combined with weakness in access control and isolation, this is a good way to gain a foothold into a cluster and establish command and control. As more production workloads move to cloud-native, the complexity of securing clusters, software development pipelines and cloud architectures becomes incredibly difficult, as the attack surface significantly expands.”
Newly detected malware targets Kubernetes clusters for cryptocurrency mining
by Brian Anderson | Feb 4, 2021 | press | 0 comments
