Palo Alto Network’s cybersecurity recently outlined two vulnerabilities it found in Google Kubernetes Engine (GKE) that, individually, don’t represent much of a threat. However, if a threat actor who already had access to a Kubernetes cluster were to combine the two, they could potentially escalate their privileges and eventually take over the cluster, which could..
The post GKE Case Highlights Risks of Attackers Chaining Vulnerabilities appeared first on Security Boulevard.
This article has been indexed from Security Boulevard