In this live demo, we will use Ezuri, a memory loader, to penetrate K8s live environments, load a fileless malware, undetected by common security tools, and steal SSL keys.

But not to worry, we will also show how you can take measure against it.