Navigating the Cloud: Exploring Lateral Movement Techniques 7,825 people reacted Navigating the Cloud: Exploring Lateral Movement Techniques By Eden Elazar February 28, 2024 at 3:00 AM 28 12 min. read
Dual Privilege Escalation Chain: Exploiting Monitoring and Service Mesh Configurations and Privileges in GKE to Gain Unauthorized Access in Kubernetes 6,978 people reacted Dual Privilege Escalation Chain: Exploiting Monitoring and Service Mesh Configurations and Privileges in GKE to Gain Unauthorized Access in Kubernetes By Shaul Ben Hai December 27, 2023 at 6:00 AM 33 11 min. read
Exploring a Critical Risk in Google Workspace's Domain-Wide Delegation Feature 5,443 people reacted Exploring a Critical Risk in Google Workspace's Domain-Wide Delegation Feature By Zohar Zigdon November 30, 2023 at 3:00 PM 19 10 min. read
Compromised Cloud Compute Credentials: Case Studies From the Wild 55,682 people reacted Compromised Cloud Compute Credentials: Case Studies From the Wild By Dror Alon December 8, 2022 at 3:00 PM 48 9 min. read
TeamTNT Actively Enumerating Cloud Environments to Infiltrate Organizations 56,519 people reacted TeamTNT Actively Enumerating Cloud Environments to Infiltrate Organizations By Nathaniel Quist June 4, 2021 at 6:00 AM 18 13 min. read