AWS Chain Attack- Thousands of Vulnerable EKS ClustersThe research performed on the boundaries of bug bountyJun 4, 2023A response icon5Jun 4, 2023A response icon5
New Vulnerability in Google Colab: Access to Host VMs via Container EscapesThe article discusses a high-risk vulnerability I identified in Google Colab, which starts with accessing the notebook container. This…May 18, 2023May 18, 2023
Taking over “Google Cloud Shell” by utilizing capabilities and KubeletThe research performed on the boundaries of Google BughuntersFeb 21, 2023A response icon1Feb 21, 2023A response icon1