Technology
In this article we are exploring the breakout of a pod, to gain access to a node. This is performed by attackers to elevate their privileges in a Kubernetes environment.
![Escalating Privileges in Kubernetes: Pod Breakout & Node Access](https://www.covertswarm.com/wp-content/uploads/2024/04/shutterstock_1918723166-1-640x312.jpg)
K8s – Pod to Node Escape Techniques
In this article we are exploring the breakout of a pod, to gain access to a node. This is performed…
![](https://www.covertswarm.com/wp-content/uploads/2024/01/rfid.SC_-640x427.webp)
Uncloaking Radio Frequency Identification (RFID)
Demystify RFID with insights on components, tag types, modulation, and use cases. A concise guide to the intricate world of…
![](https://www.covertswarm.com/wp-content/uploads/2024/01/shutterstock_258726044_50-640x427.webp)
Gaining Initial Access in a Kubernetes Environment (part 2)
Explore initial access in Kubernetes: Uncover application vulnerabilities, compromised images, and cloud credential misuse in Kubernetes environments.
![](https://www.covertswarm.com/wp-content/uploads/2024/01/shutterstock_268450493_50-640x427.webp)
Exploring the Kubernetes Architecture from an Offensive Viewpoint (part 1)
Explore the essentials of Kubernetes: From its Google origins to a key tool in modern cloud-native development, learn about its…
![software developer](https://www.covertswarm.com/wp-content/uploads/2023/09/shutterstock_696061426-640x427.jpg)
The trials and tribulations of secure software development
Discover effective strategies for managing third-party libraries, tackling security challenges & handling technical debt in secure software development.
![](https://www.covertswarm.com/wp-content/uploads/2023/07/taylor-grote-L3qUP8MpExc-unsplash-640x427.jpg)
AI voice impersonation: voice-based authentication just got owned
Does the voice you recognize at the end of the phone really belong to the person you think it is?…
![Man using laptop](https://www.covertswarm.com/wp-content/uploads/2023/03/New-Project-83-640x294.png)
Improving organisational awareness with enhanced Automated Reconnaissance
In the realm of cybersecurity, understanding the vulnerabilities in a system is crucial for any organisation to secure its digital…
![will on a rollercoaster](https://www.covertswarm.com/wp-content/uploads/2023/03/Will-on-the-Rollercoaster-640x294.png)
Avoiding the Cyber Risk Rollercoaster
Over 100 global brands subscribe to CovertSwarm's Constant Cyber Attack service to out pace their genuine security threats.
![Chatgpt logo](https://www.covertswarm.com/wp-content/uploads/2021/03/New-Project-10-640x294.png)
ChatGPT in the wrong hands….
CovertSwarm took a look at how ChatGPT could be subverted and used by a malicious actor to employ AI to…