An incorrect configuration allows any user to inject a Trojan into the cluster.
The information security company Orca Security has discovered a vulnerability in the Google Kubernetes Engine (GKE), which allows attackers with a Google account to gain control over a Kubernetes cluster. The...