Kubernetes is complex, powerful… and surprisingly easy to mess up. In this talk, we’ll take a guided tour through the dark alleys of Kubernetes misconfigurations, privilege escalations, and real-world attack vectors. You’ll see live demos of how attackers exploit innocent-looking setups — and more importantly, how you can detect, prevent, and recover from them.