Technology
In this article we are exploring the breakout of a pod, to gain access to a node. This is performed by attackers to elevate their privileges in a Kubernetes environment.
K8s – Pod to Node Escape Techniques
In this article we are exploring the breakout of a pod, to gain access to a node. This is performed…
Uncloaking Radio Frequency Identification (RFID)
Demystify RFID with insights on components, tag types, modulation, and use cases. A concise guide to the intricate world of…
Gaining Initial Access in a Kubernetes Environment (part 2)
Explore initial access in Kubernetes: Uncover application vulnerabilities, compromised images, and cloud credential misuse in Kubernetes environments.
Exploring the Kubernetes Architecture from an Offensive Viewpoint (part 1)
Explore the essentials of Kubernetes: From its Google origins to a key tool in modern cloud-native development, learn about its…
The trials and tribulations of secure software development
Discover effective strategies for managing third-party libraries, tackling security challenges & handling technical debt in secure software development.
AI voice impersonation: voice-based authentication just got owned
Does the voice you recognize at the end of the phone really belong to the person you think it is?…
Improving organisational awareness with enhanced Automated Reconnaissance
In the realm of cybersecurity, understanding the vulnerabilities in a system is crucial for any organisation to secure its digital…
Avoiding the Cyber Risk Rollercoaster
Over 100 global brands subscribe to CovertSwarm's Constant Cyber Attack service to out pace their genuine security threats.
ChatGPT in the wrong hands….
CovertSwarm took a look at how ChatGPT could be subverted and used by a malicious actor to employ AI to…