In this video, I’ll be going over detection opportunities at various stages of cloud security attacks.
Compromised Cloud Compute Credentials: Case Studies From the Wild
_____________
TIMESTAMPS
00:00 Intro
00:40 The Attack Case
02:12 The Attack Graph
02:44 The Attack Flow
03:06 Detection Opportunity 1: Enumeration/Reconnaissance/Discovery - Cloud Infrastructure Discovery
05:27 Detection Opportunity 2: Persistence - Create Cloud Account
08:19 Detection Opportunity 3: Impact - Resource Hijacking
09:54 Detection Opportunity 4: Defense Evasion - Indicator Removal
10:23 Detection Opportunity 5: Credential Access - Stealing an application access token
12:04: Conclusion
_____________
⚡️JOIN 6,000+ CWX MEMBERS ON DISCORD
📰 SUBSCRIBE TO THE CYBERWOX UNPLUGGED NEWSLETTER
🥶 CYBERWOX MERCH
_____________
🧬 CYBERWOX RESOURCES
🔹 Cyberwox Cybersecurity Notion Templates for planning your career
🔹 Cyberwox Best Entry-Level Cybersecurity Resume Template
🔹 Learn AWS Threat Detection with my LinkedIn Learning Course
_____________
📱 LET'S CONNECT
→ IG
→ Threads
→ Substack
→ Twitter
→ Linkedin
→ Tiktok
Email: day@cyberwox.com
_____________
⚠️DISCLAIMER
This description has some affiliate links, and I may receive a small commission for purchases made through these links. I appreciate your support!
Email: day@cyberwox.com
Informations
- Émission
- Chaîne
- FréquenceTous les mois
- Publiée29 avril 2025 à 02:15 UTC
- Durée13 min
- Saison1
- Épisode1
- ClassificationTous publics
