{"id":41951,"date":"2021-07-23T14:00:00","date_gmt":"2021-07-23T14:00:00","guid":{"rendered":"http:\/\/01140a9f-aac2-464a-9a82-37564da9fac3"},"modified":"2021-07-23T14:00:00","modified_gmt":"2021-07-23T14:00:00","slug":"researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\/","title":{"rendered":"Researchers find new attack vector against Kubernetes clusters via misconfigured Argo Workflows instances"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/hub\/i\/r\/2021\/07\/23\/07367b4b-a168-423d-9a55-9e041eb2f38c\/thumbnail\/770x578\/d2c83ea38a11ff9bf8ba53457861836a\/researchers-find-new-attack-vector-cybersecurity.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Analysts with cybersecurity company Intezer have found that cybercriminals are now going after a new attack vector against Kubernetes clusters via misconfigured Argo Workflows instances.<\/p>\n<p>Intezer security researchers Ryan Robinson and Nicole Fishbein <a href=\"https:\/\/www.intezer.com\/blog\/container-security\/new-attacks-on-kubernetes-via-misconfigured-argo-workflows\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">wrote a report<\/a> detailing the attack, noting that they have already found infected nodes. The two said the attacks were concerning because there are hundreds of misconfigured deployments, and attackers have been detected dropping crypto-miners like the Kannix\/ Monero-miner through this attack vector.<\/p>\n<p>&#8220;We have detected exposed instances of Argo Workflows that belong to companies from different sectors including technology, finance and logistics. Argo Workflows is an open-source, container-native workflow engine designed to run on K8s clusters. Argo Workflows instances with misconfigured permissions allow threat actors to run unauthorized code on the victim&#8217;s environment,&#8221; Robinson and Fishbein said.&nbsp;<\/p>\n<p>&#8220;Exposed instances can contain sensitive information such as code, credentials and private container image names. We also discovered that in many instances, permissions are configured, which allow any visiting user to deploy workflows. We also detected that threat actors are targeting some misconfigured nodes.&#8221;<\/p>\n<p>Some cyber-attackers have been able to take advantage of misconfigured permissions that give them access to an open Argo dashboard where they can submit their own workflow.<\/p>\n<p>The &#8220;Kannix\/ Monero-miner,&#8221; according to the researchers, requires little skill to use, and the report notes that other security teams have discovered large-scale cryptocurrency mining attacks against Kubernetes clusters.<\/p>\n<p>&#8220;In Docker Hub, there are still a number of options for Monero mining that attackers can use. A simple search shows that there are at least 45 other containers with millions of downloads,&#8221; the study said.&nbsp;<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>Fishbein and Robinson urge users to access the Argo Workflows dashboard from an unauthenticated incognito browser outside of corporate environments as a way to check if instances are misconfigured.&nbsp;<\/p>\n<p>Administrators can also query the API of an instance and check the status code.&nbsp;<\/p>\n<p>Yaniv Bar-Dayan, CEO of Vulcan Cyber, explained that the complexity and scale inherent to enterprise cloud deployments means that there will be breaches due to human error.&nbsp;<\/p>\n<p>&#8220;Misconfiguration is just one type of risk-inducing vulnerability, and cloud is just one attack vector that needs to be tracked and mitigated. If security teams can understand and prioritize risk created by cloud misconfigurations alongside IT infrastructure and application vulnerabilities, they have a shot at reducing risk and improving the security posture of business,&#8221; Bar-Dayan added.&nbsp;<\/p>\n<p>&#8220;Cloud security can no longer be someone else&#8217;s problem, and it is not enough to ask if cloud infrastructure by itself is secure. We must ask the same about our applications, traditional infrastructure and networks.&#8221;<\/p>\n<p>Coalfire managing principal Andrew Barratt noted that orchestration platforms are an interesting attack surface due to their ability to perform.&nbsp;<\/p>\n<p>Barratt said they could allow an adversary to perform very sophisticated lateral attacks entirely leveraging the scale of native cloud services. While he is not against using them, he said it is now important for them to be seen as a sophisticated attack platform with many capabilities and typically elevated privileges and the ability to build and deploy resources with an immediate cost associated.&nbsp;<\/p>\n<p>&#8220;These vulnerabilities have been around for a long time, and security teams are already aware of them to some degree, regardless of platform &#8212; be it virtualization, physical data centers or the public cloud and the many different service offerings,&#8221; said Michael Cade, a senior global technologist with Kasten.<\/p>\n<p>&#8220;This is not going to be the only vulnerability that is found within Kubernetes environments or wider operating systems.&#8221;<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The report notes that other security teams have discovered large-scale cryptocurrency mining attacks against Kubernetes clusters.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":41952,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-41951","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Researchers find new attack vector against Kubernetes clusters via misconfigured Argo Workflows instances 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Researchers find new attack vector against Kubernetes clusters via misconfigured Argo Workflows instances 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-23T14:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Researchers find new attack vector against Kubernetes clusters via misconfigured Argo Workflows instances\",\"datePublished\":\"2021-07-23T14:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\\\/\"},\"wordCount\":606,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\\\/\",\"name\":\"Researchers find new attack vector against Kubernetes clusters via misconfigured Argo Workflows instances 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances.jpg\",\"datePublished\":\"2021-07-23T14:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Researchers find new attack vector against Kubernetes clusters via misconfigured Argo Workflows instances\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Researchers find new attack vector against Kubernetes clusters via misconfigured Argo Workflows instances 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\/","og_locale":"en_US","og_type":"article","og_title":"Researchers find new attack vector against Kubernetes clusters via misconfigured Argo Workflows instances 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-07-23T14:00:00+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Researchers find new attack vector against Kubernetes clusters via misconfigured Argo Workflows instances","datePublished":"2021-07-23T14:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\/"},"wordCount":606,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\/","url":"https:\/\/www.threatshub.org\/blog\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\/","name":"Researchers find new attack vector against Kubernetes clusters via misconfigured Argo Workflows instances 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances.jpg","datePublished":"2021-07-23T14:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/07\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/researchers-find-new-attack-vector-against-kubernetes-clusters-via-misconfigured-argo-workflows-instances\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Researchers find new attack vector against Kubernetes clusters via misconfigured Argo Workflows instances"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=41951"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41951\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/41952"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=41951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=41951"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=41951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}