Security A-Z
-
An attack where a threat actor uses a reverse proxy to intercept communication between a user and an authentication service in real time, capturing session cookies and bypassing multi-factor authentication. AiTM phishing represents a major escalation in identity threats targeting cloud and SaaS environments.
-
A Kubernetes control plane component that embeds cloud-specific logic, bridging cluster operations with cloud provider APIs for managing load balancers, storage volumes, and node lifecycle. It is the key abstraction layer that allows Kubernetes to work consistently across AWS, Azure, GCP, and other providers.
-
A cybersecurity attack where an LLM is tricked into following hidden malicious instructions embedded in external data it processes, such as documents, emails, or uploaded files. This technique poisons the data the model retrieves, exploiting the inability of LLMs to distinguish trusted instructions from untrusted content.
-
A piece of code that intercepts requests to the Kubernetes API server before an object is persisted, acting as a gatekeeper that enforces security, governance, and operational policies. Admission controllers can validate or mutate resources, blocking non-compliant workloads before they enter the cluster.
-
A social engineering technique where attackers repeatedly send MFA push notifications to a target's device until they approve the request out of exhaustion. Used in the 2022 Uber and Cisco breaches, this attack exploits human psychology rather than cryptographic weakness, and has evolved alongside defenses like number matching.
-
A Linux container, typically in Kubernetes, that is granted nearly all capabilities of the host system's root user, removing the isolation boundary between the container and the underlying node. From a security perspective, a compromised privileged container gives an attacker direct access to the host kernel, filesystem, and network.
-
A Kubernetes mechanism that automatically adds a secondary container to a Pod at creation time. From an offensive perspective, an attacker with sufficient cluster privileges can inject malicious sidecar containers into trusted workloads to intercept traffic, steal credentials, and maintain persistent access.
Pwned Labs
Your cloud security training ground
Experience, real-world, byte sized cloud security labs for training cyber warriors. From beginners to pros, our engaging platform allows you to secure your defenses, ignite your career and stay ahead of threats.