{"id":4465,"date":"2023-04-26T21:57:06","date_gmt":"2023-04-27T04:57:06","guid":{"rendered":"https:\/\/zed.inguardians.com\/wp-content\/uploads\/2023\/04\/CSCO-W08-Attacking-and-Detecting-Attacks-on-Kubernetes-Clusters-1.pdf"},"modified":"2023-04-26T21:57:30","modified_gmt":"2023-04-27T04:57:30","slug":"csco-w08-attacking-and-detecting-attacks-on-kubernetes-clusters-1","status":"inherit","type":"attachment","link":"https:\/\/zed.inguardians.com\/presentations\/attacking-and-detecting-attacks-on-kubernetes-clusters-rsa2023\/attachment\/csco-w08-attacking-and-detecting-attacks-on-kubernetes-clusters-1\/","title":{"rendered":"Attacking-and-Detecting-Attacks-on-Kubernetes-Clusters"},"author":7,"comment_status":"open","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":""},"description":{"rendered":"