Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a conference talk that delves into Kubernetes security vulnerabilities and cryptojacking risks. Learn about the basics of Kubernetes, its potential security flaws, and how attackers can exploit open dashboards. Examine real-world examples of cryptojacking attempts, including a detailed analysis of Micro Kubernetes installations. Gain insights into detection methods through Wireshark screenshots, post requests, and metadata analysis. Understand the importance of securing Kubernetes deployments and protecting against unauthorized cryptocurrency mining operations.