Leaked Kubernetes Secrets: Impact Assessment and Mitigation Strategies
Source: Blog.Gitguardian
Published:
<p>Threat-intel reports from recent years document campaigns in which attackers obtain AWS IAM credentials from developer workstations, use them to enumerate cloud accounts and access Kubernetes clusters. From there, attackers deploy poisoned container images to move laterally and harvest secrets. T