Beyond the surface - Exploring attacker persistence strategies in Kubernetes
I’ve been doing a talk on Kubernetes post-exploitation for a while now and one of requests has been for a blog post to refer back to, which I’m finally getting around to doing now!