Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the techniques hackers use to remain anonymous after compromising a Kubernetes cluster in this 25-minute conference talk by Lorenzo Fontana from Sysdig. Delve into the second phase of a cyberattack, focusing on how malicious actors conceal their presence and activities. Learn about various hiding methods, including tampering with audit logs, evading deep packet inspection, concealing processes and containers, exploiting unconventional file storage locations, and masking network connections. Gain insights into the broader picture of post-compromise stealth tactics employed by cybercriminals in Kubernetes environments, enhancing your understanding of cluster security challenges and potential countermeasures.