1
Post-exploiting a compromised etcd – Full control over the cluster and its nodes
(research.nccgroup.com)
/r/netsec is a community-curated aggregator of technical information security content. Our mission is to extract signal from the noise — to...