Unrestricted etcd Access
How attackers exploit unrestricted access to etcd to retrieve Kubernetes secrets and take control of the cluster.
How attackers exploit unrestricted access to etcd to retrieve Kubernetes secrets and take control of the cluster.