#informatique : Pentesting #Docker & #Kubernetes
https://blog.cyr3con.ai/docker-kubernetes-part-1-exploitation-in-the-wild
https://blog.cyr3con.ai/docker-kubernetes-part-2-vulnerability-attribution
https://blog.cyr3con.ai/docker-kubernetes-part-3-covid-19-effect
https://blog.cyr3con.ai/docker-kubernetes-part-4-kubernetes-in-detail
https://blog.cyr3con.ai/docker/kubernetes-part-5-docker-in-detail
https://blog.cyr3con.ai/docker/kubernetes-part-6-common-weakness-enumeration-cwe