nimbus
nimbus copied to clipboard
ImageSignatureVerification
Techniques:
- Supply Chain Compromise
- Radio control manipulation via rogue xApps
- Software Deployment Tools
- gNodeB Component Manipulation
- Implant Internal Image
- Rootkit
Intent is implemented by Kyverno adapter