    <meta property="twitter:title" content="6 Common Kubernetes and Container Attack Techniques and How to Prevent Them" />
    <meta property="twitter:description" content="Attacks on Kubernetes and containers are on the rise. Here are some ways to protect against them. Attacks on Kubernetes and containers are on the rise. Here are some ways to protect against them." />
<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Palo Alto Networks Blog</provider_name><provider_url>https://www2.paloaltonetworks.com/blog</provider_url><author_name>Blaithin Underhill</author_name><author_url>https://www2.paloaltonetworks.com/blog/author/blaithin-underhill/</author_url><title>6 Common Kubernetes and Container Attack Techniques and How to Prevent Them</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="gAuYGA6VQ0"&gt;&lt;a href="https://www2.paloaltonetworks.com/blog/cloud-security/6-common-kubernetes-attacks/"&gt;6 Common Kubernetes and Container Attack Techniques and How to Prevent Them&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www2.paloaltonetworks.com/blog/cloud-security/6-common-kubernetes-attacks/embed/#?secret=gAuYGA6VQ0" width="600" height="338" title="&#x201C;6 Common Kubernetes and Container Attack Techniques and How to Prevent Them&#x201D; &#x2014; Palo Alto Networks Blog" data-secret="gAuYGA6VQ0" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www2.paloaltonetworks.com/blog/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.paloaltonetworks.com/blog/wp-content/uploads/2022/01/Working-with-a-View.jpg</thumbnail_url><thumbnail_width>400</thumbnail_width><thumbnail_height>300</thumbnail_height><description>Attacks on Kubernetes and containers are on the rise. Here are some ways to protect against them. Attacks on Kubernetes and containers are on the rise. Here are some ways to protect against them.</description></oembed>
