Kubernetes Hacking: From Weak Applications to Cluster Control
58,881
Published 2023-04-18
π₯ YOUTUBE ALGORITHM β‘ Like, Comment, & Subscribe!
π SUPPORT THE CHANNEL β‘ jh.live/patreon
π€ SPONSOR THE CHANNEL β‘ jh.live/sponsor
π FOLLOW ME EVERYWHERE β‘ jh.live/discord β jh.live/twitter β jh.live/linkedin β jh.live/instagram β jh.live/tiktok
π₯ SEND ME MALWARE β‘ jh.live/malware