Click any tag below to further narrow down your results
Links
This repository offers a set of Falco detection rules and configuration files aimed at identifying various Kubernetes attack techniques. It includes scripts for testing these detections by simulating attacker behavior in a controlled environment.
This article explores Kubernetes' architecture and its various attack vectors. It discusses security concerns, threat hunting, and how tools like Falco can help detect and mitigate potential threats within Kubernetes environments.