hack::soho | 29 Jan | Secure YAML, Insecure Clusters: Breaking Kubernetes Without Exploits

Join us for an evening of fun at this month’s hack::soho taking place 29 January, 6pm – 9pm GMT, set up to be a loose networking environment where cyber security professionals can chat, get some complimentary food & drink, and discuss rising global trends.

This month’s hack::soho features a talk from IOActive Senior Security Consultant Simon Robin. The abstract of the talk, ‘Secure YAML, Insecure Clusters: Breaking Kubernetes Without Exploits,’ is below!

hack::soho is a monthly event hosted at our London, UK office for the cybersecurity and hacking community to discuss all things security over food and refreshments. We welcome you to invite others in your circle to extend our collective network.

Spots are limited, so please use real contact details to confirm your registration. We will not sell, distribute, or use your contact information outside of sending you details about upcoming hack::soho meetups.

Not able to make it in person? No worries! Register and sign up to attend the livestream presentation portion of the event starting at 7pm GMT: https://hacksoho.live/Stream-January

ABSTRACT

Kubernetes security is increasingly reduced to static configuration reviews and misconfiguration scanners. While these tools provide value, they are often treated as authoritative indicators of real security posture. In this talk, we will show how Kubernetes clusters with clean scan results can still be compromised through realistic attack paths that require no kernel exploits, no zero-days, and no exotic techniques. Drawing on academic research, real incidents, and offensive security experience, we demonstrate how attackers chain legitimate Kubernetes features into high-impact compromises.