Get a Pentest and security assessment of your IT network.

News

Google Online Security Blog: Expanding our work with the open source security community

Break out of a containerized environment running on a Kubernetes pod and, read one of two secret flags: One flag is on the same pod, and the other one is in another KuberNETes pod in a different namespace. Flags will be changed often, and participants need to submit the secret flag as proof of successful exploitation. Bugs that affect the lab GKE environment that can lead to stealing both flags will be rewarded up to 10,000 USD, but we will review each report on a case-by-case basis. The lab environment does not store any data (such as the commands or files used to exploit it)”]

Source: https://security.googleblog.com/2020/05/expanding-our-work-with-open-source.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Who and why is attacking companies in the Nordic Countries?

News

Shamoon Malware, cyber espionage tool, cyber weapon or