Practical Look at Horizontal Privileges Escalation in Kubernetes
This articles will cover a real-world scenario of how an hackers will try to escalate privileges horizontally in a kubernetes cluster. Taking a particular attention to Grafana.
Overview of email security
Email remains a primary channel for exchanging information. However, the convenience of email also opens doors to potential security threats.
Mastering JWT authentication
authentication
jwt
refresh-token
Working in cybersecurity, I have recently spent some time doing technology watch and developing my skills on a recurring topic when developing web and mobile applications: authentication.
Why DevOps guys have to care about cybersecurity
Have you ever heard of DevSecOps? probably. But can you assure that you understand what it is and what are its daily challenges, would you imagine that its main challenge is actually: you
Why you should check out Go as a hacker?
A years ago, I did a quick intervention in a cybersecurity conference. I talked about golang and how it can be useful for hackers. At the time, I was a beginner in golang, but I was already convinced that it was a language that could be useful for hackers. Severals cybersecurity projects and tools developped, I'm still convinced. Here is why.
Microservices for the win
microservice
architecture
DevOps
During my studies as a DevOps engineer, I had the chance to get involved in many concepts and challenges around the web, from the architecture of an application to the management of its infrastructure and of course its development. Today, I want to share with you what I learned from this experience and what I retain from this development approach.