AWS Chain Attack- Thousands of Vulnerable EKS ClustersThe research performed on the boundaries of bug bountyJun 4, 20235Jun 4, 20235
New Vulnerability in Google Colab: Access to Host VMs via Container EscapesThe article discusses a high-risk vulnerability I identified in Google Colab, which starts with accessing the notebook container. This…May 18, 2023May 18, 2023
Taking over “Google Cloud Shell” by utilizing capabilities and KubeletThe research performed on the boundaries of Google BughuntersFeb 21, 20231Feb 21, 20231