• Alerts
  • Events
  • DCR
    • Explore Cyware Products
    Alerts Events DCR
    Go to listing page

    How the Sys:All Loophole Allowed Us To Penetrate GKE Clusters in Production

    • Malware and Vulnerabilities
    • January 24, 2024
    • Orca
    An external threat actor in possession of a Google account could misuse this misconfiguration by using their own Google OAuth 2.0 bearer token to seize control of the cluster for follow-on exploitation.
    Read More
    • Google Kubernetes Engine
    • Misconfiguration
    • JWT tokens
    • AWS Keys
    • RBAC Bindings
    Cyware Publisher

    Publisher

    Previous

    Global Retailer BuyGoods.com Leaks User PII, KYC data

    Breaches and Incidents

    Next

    Water Services Giant Veolia North America Hit by Ransom ...

    Breaches and Incidents


    RESOURCES
    Cyber Fusion Center Guide
    EVENTS

    News and Updates, Hacker News

    Get in touch with us now!

    1-855-692-9927


    Download Cyware Social App

    Terms of Use Privacy Policy © 2023