Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

BlueSky blocks Mississippi services across age guarantee laws

August 24, 2025

Openai warns against SPVs and other “unauthorized” investments

August 23, 2025

Amazon AGI Labs Chief defends his reverse Acquihire

August 23, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    BlueSky blocks Mississippi services across age guarantee laws

    August 24, 2025

    BlueSky blocks Mississippi services across age guarantee laws

    August 22, 2025

    Tiktok denies India's comeback after reporting that the website has been published

    August 22, 2025

    Google makes it easier to edit drive videos with the new VIDS shortcut button

    August 22, 2025

    X brings out the ability to like and follow the free tier of developer APIs

    August 22, 2025
  • Crypto

    Coinbase CEO explains why he fired an engineer who didn't try AI right away

    August 22, 2025

    Your next customer is destroying the 2025 Expo floor

    August 19, 2025

    Crypto Company Gemini File for Winklevoss Twins IPO

    August 16, 2025

    North Korean spies pretending to be remote workers have invaded hundreds of businesses, CloudStrike says

    August 4, 2025

    Telegram's Crypto Wallet will be released in the US

    July 22, 2025
  • Security

    Developers get prison time to disrupt the ex-employer's network with “kill switch”

    August 22, 2025

    Explain why hackers who exposed the North Korean government did that

    August 21, 2025

    Device searches at US borders hit record-breaking records, new data show

    August 20, 2025

    Listen and record all conversations “Always On” Harvard Dropout launches AI smart glasses

    August 20, 2025

    New Zero-Day startup offers $20 million for a tool that can hack your smartphone

    August 20, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    Openai warns against SPVs and other “unauthorized” investments

    August 23, 2025

    Amazon AGI Labs Chief defends his reverse Acquihire

    August 23, 2025

    Y Combinator says Apple's App Store is hampering startup growth

    August 22, 2025

    Beanie baby in the brain rot era

    August 22, 2025

    Procuring multiple rounds of venture capital could be wrong for your startup

    August 21, 2025
TechBrunchTechBrunch

KTrust launches automated red team for Kubernetes security

TechBrunchBy TechBrunchFebruary 14, 20244 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


KTrust, a Tel Aviv-based security startup, takes a different approach to Kubernetes security than many competitors in the space. KTrust takes a more proactive approach than just scanning Kubernetes clusters and their configurations for known vulnerabilities. Deploy automated systems to attempt to hack into systems. This allows security teams to focus on the actual attack path, not just the long list of potential security vulnerabilities. So KTrust is essentially a read-in-the-box team. However, research firm Gartner prefers to call it Continuous Threat Exposure Management (CTEM).

Ktrust today came out of stealth and announced a $5.4 million seed funding round led by AWZ Ventures.

Like many Israeli security companies, the management team comes to the company with a wealth of experience. CEO Nadav Toledo previously served as a colonel in the Israel Defense Forces' 8200 Intelligence Unit, where he spent 25 years before founding KTrust. CTO Nadav Aharon-Nov Previously, he served as his CTO for the intelligence and defense company R-MOR. COO Sigalit Shavit previously served as global CIO of publicly traded CyberArk. CBO Snit Mazilik complements the group with extensive business experience, including as CEO of Shanghai-based fashion wholesaler Must Garment Group and managing partner of real estate investment company NOI Ventures. This is an eclectic group of founders, but as Toledo told me, “Everyone brings a different perspective to the board, and it's just a great team.”

As a group, Toledo, Aharon-Nov, and Mazilik began brainstorming different ideas for a security startup. That the team ended up with his Kubernetes is not necessarily surprising, given that Kubernetes is still a rapidly growing ecosystem that many traditional companies are just beginning to adopt.

Image credits: K Trust

“Kubernetes is very complex and very dynamic. We visited organizations and talked to DevOps teams and CISOs. […] We've seen DevOps teams struggle. I've also seen DevSecOps teams struggle because they want him to be the Kubernetes expert, meaning he's in charge of configuring Kubernetes, and on the other hand he wants him to be the security expert. ” Toledo told me.

The team noted that most Kubernetes security solutions take what he calls a “passive scanner approach” that focuses on performing static code analysis. But that results in a lot of alerts, so someone needs to convert these into a work plan. The idea behind KTrust is to take a completely different approach by using automated red team algorithms that proactively explore attack vectors and identify points of compromise in Kubernetes-based systems. . KTrust takes a customer's Kubernetes infrastructure configuration and clones them into a secure sandbox that algorithms can attack.

Image credits: K Trust

This algorithm mimics a real attacker. “By doing this, we find the actual attack vector to exploit and avoid having to retrieve a list of hundreds of unconnected items. We present verified exploits to DevSecOps, but this is a real validation because it was an actual attack,” Toledo explained. While working with a recent client, he said his passive scanners discovered more than 500 vulnerabilities, but by using KTrust's agent-based systems, the team was able to convert this into a real attack. He noted that he was able to narrow it down to about 12 passes.

KTrust allows security teams to see exactly how algorithms attack their systems. When it comes to mitigation, the service provides users with manual mitigation recommendations and can often automate these steps as well.

It is worth noting that the company employs a group of security experts dedicated to discovering new attack vectors. The team has already submitted a number of his CVEs (Common Vulnerabilities and Exposures) for Kubernetes and Argo CD.

“Our investment in KTrust demonstrates our confidence in KTrust’s distinctive Kubernetes security solutions, which meet critical market demands. To ensure deployment, we scale to power DevSecOps globally,” said Yaron Ashkenazi, Managing Partner at AWZ Ventures.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Developers get prison time to disrupt the ex-employer's network with “kill switch”

August 22, 2025

Explain why hackers who exposed the North Korean government did that

August 21, 2025

Device searches at US borders hit record-breaking records, new data show

August 20, 2025

Listen and record all conversations “Always On” Harvard Dropout launches AI smart glasses

August 20, 2025

New Zero-Day startup offers $20 million for a tool that can hack your smartphone

August 20, 2025

US spy chief says the UK has removed demand for apple backdoors

August 19, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

BlueSky blocks Mississippi services across age guarantee laws

August 24, 2025

Openai warns against SPVs and other “unauthorized” investments

August 23, 2025

Amazon AGI Labs Chief defends his reverse Acquihire

August 23, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.