In this section, you will learn about some attack scenarios involving Kubernetes clusters, from known attacks and CVEs to mitigation and prevention strategies.
The following chapters are included in this section:
Chapter 12, Analyzing and Detecting Crypto-Mining Attacks