During the day, I spend my time analyzing Terraform code, Kubernetes object configuration files, and identifying common security issues. When the sun sets, I put on my hoodie, fire up Linux VMs and debuggers to look under the hood of technologies that make up the cloud native ecosystem. In this post, we will explore how Kubernetes container isolation impacts privilege escalation attacks. We will u
![Kernel privilege escalation | Snyk Blog | Snyk](https://cdn-ak-scissors.b.st-hatena.com/image/square/61f78ec997360d8561b625dfe17f4018f4a57829/height=288;version=1;width=512/https%3A%2F%2Fsnyk.io%2Fwp-content%2Fuploads%2FKernel.png)