Kubernetes • 3 min • 29/09/22 Kubernetes webhook used by attackers How can an attacker use malicious admission controllers to settle in your Kubernetes cluster without you being aware of it?