When attackers get their hands on a Ray production cluster, it is a jackpot. Valuable company data plus remote code execution makes it easy to monetize attacks-all while remaining in the shadows.
Oligo captured screenshots revealing sensitive data and hacked clusters, exposing cryptographic passwords and internal database credentials.
[
add
]
[
|
|
...
]