Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Bradfeld on the “first give” and the art of mentorship (at any age)

June 25, 2025

Calci will close a $185 million round as rival Polymeruk reportedly seeks $200 million

June 25, 2025

Meta is adding an AI-powered overview to WhatsApp

June 25, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Meta is adding an AI-powered overview to WhatsApp

    June 25, 2025

    Sitch's new dating app fuses human matchmaking with AI

    June 25, 2025

    Apple Sports app adds live tennis scores and a redesigned home screen

    June 25, 2025

    Bumble to solve 30% of employees

    June 25, 2025

    Julie Bornstein's Daydream is releasing AI-powered chatbots for fashion-related shopping

    June 25, 2025
  • Crypto

    Calci will close a $185 million round as rival Polymeruk reportedly seeks $200 million

    June 25, 2025

    Stablecoin Evangelist: Katie Haun's Battle of Digital Dollars

    June 22, 2025

    Hackers steal and destroy millions of Iran's biggest crypto exchanges

    June 18, 2025

    Unique, a new social media app

    June 17, 2025

    xNotify Polymarket as partner in the official forecast market

    June 6, 2025
  • Security

    Ring cameras and doorbells now use AI to provide specific descriptions of motion activities

    June 25, 2025

    The US bans WhatsApp from House of Leprancatives Staff Devices

    June 24, 2025

    According to Canada, the carrier was breached by China-related spying hacking

    June 23, 2025

    US insurance giant AFLAC says customer personal data was stolen during a cyber attack

    June 23, 2025

    Iran's government says it will shut down the internet to protect against cyber attacks

    June 20, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    Bradfeld on the “first give” and the art of mentorship (at any age)

    June 25, 2025

    Kleida Martiro leads the AI ​​scale conversation at TC All Stage

    June 25, 2025

    Introducing the release stage that will be released in 2025

    June 25, 2025

    The $1,200 tequila on the all-in-podcast is already sold out

    June 24, 2025

    Katie Haun on genius behavior and what it might mean for the future of code

    June 24, 2025
TechBrunchTechBrunch

KTrust launches automated red team for Kubernetes security

TechBrunchBy TechBrunchFebruary 14, 20244 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


KTrust, a Tel Aviv-based security startup, takes a different approach to Kubernetes security than many competitors in the space. KTrust takes a more proactive approach than just scanning Kubernetes clusters and their configurations for known vulnerabilities. Deploy automated systems to attempt to hack into systems. This allows security teams to focus on the actual attack path, not just the long list of potential security vulnerabilities. So KTrust is essentially a read-in-the-box team. However, research firm Gartner prefers to call it Continuous Threat Exposure Management (CTEM).

Ktrust today came out of stealth and announced a $5.4 million seed funding round led by AWZ Ventures.

Like many Israeli security companies, the management team comes to the company with a wealth of experience. CEO Nadav Toledo previously served as a colonel in the Israel Defense Forces' 8200 Intelligence Unit, where he spent 25 years before founding KTrust. CTO Nadav Aharon-Nov Previously, he served as his CTO for the intelligence and defense company R-MOR. COO Sigalit Shavit previously served as global CIO of publicly traded CyberArk. CBO Snit Mazilik complements the group with extensive business experience, including as CEO of Shanghai-based fashion wholesaler Must Garment Group and managing partner of real estate investment company NOI Ventures. This is an eclectic group of founders, but as Toledo told me, “Everyone brings a different perspective to the board, and it's just a great team.”

As a group, Toledo, Aharon-Nov, and Mazilik began brainstorming different ideas for a security startup. That the team ended up with his Kubernetes is not necessarily surprising, given that Kubernetes is still a rapidly growing ecosystem that many traditional companies are just beginning to adopt.

Image credits: K Trust

“Kubernetes is very complex and very dynamic. We visited organizations and talked to DevOps teams and CISOs. […] We've seen DevOps teams struggle. I've also seen DevSecOps teams struggle because they want him to be the Kubernetes expert, meaning he's in charge of configuring Kubernetes, and on the other hand he wants him to be the security expert. ” Toledo told me.

The team noted that most Kubernetes security solutions take what he calls a “passive scanner approach” that focuses on performing static code analysis. But that results in a lot of alerts, so someone needs to convert these into a work plan. The idea behind KTrust is to take a completely different approach by using automated red team algorithms that proactively explore attack vectors and identify points of compromise in Kubernetes-based systems. . KTrust takes a customer's Kubernetes infrastructure configuration and clones them into a secure sandbox that algorithms can attack.

Image credits: K Trust

This algorithm mimics a real attacker. “By doing this, we find the actual attack vector to exploit and avoid having to retrieve a list of hundreds of unconnected items. We present verified exploits to DevSecOps, but this is a real validation because it was an actual attack,” Toledo explained. While working with a recent client, he said his passive scanners discovered more than 500 vulnerabilities, but by using KTrust's agent-based systems, the team was able to convert this into a real attack. He noted that he was able to narrow it down to about 12 passes.

KTrust allows security teams to see exactly how algorithms attack their systems. When it comes to mitigation, the service provides users with manual mitigation recommendations and can often automate these steps as well.

It is worth noting that the company employs a group of security experts dedicated to discovering new attack vectors. The team has already submitted a number of his CVEs (Common Vulnerabilities and Exposures) for Kubernetes and Argo CD.

“Our investment in KTrust demonstrates our confidence in KTrust’s distinctive Kubernetes security solutions, which meet critical market demands. To ensure deployment, we scale to power DevSecOps globally,” said Yaron Ashkenazi, Managing Partner at AWZ Ventures.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Ring cameras and doorbells now use AI to provide specific descriptions of motion activities

June 25, 2025

The US bans WhatsApp from House of Leprancatives Staff Devices

June 24, 2025

According to Canada, the carrier was breached by China-related spying hacking

June 23, 2025

US insurance giant AFLAC says customer personal data was stolen during a cyber attack

June 23, 2025

Iran's government says it will shut down the internet to protect against cyber attacks

June 20, 2025

According to web surveillance companies, the internet will collapse across Iran

June 18, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Bradfeld on the “first give” and the art of mentorship (at any age)

June 25, 2025

Calci will close a $185 million round as rival Polymeruk reportedly seeks $200 million

June 25, 2025

Meta is adding an AI-powered overview to WhatsApp

June 25, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.