Attackers exploit command execution privilege within a pod to access sensitive information in AKS clusters.
View full story…