Detection Opportunities

How A Compromised AWS Lambda Function Led to a Phishing Attack | EP. 1

In this video, I’ll be going over detection opportunities at various stages of cloud security attacks.

Compromised Cloud Compute Credentials: Case Studies From the Wild

_____________

TIMESTAMPS

00:00 Intro

00:40 The Attack Case

02:12 The Attack Graph

02:44 The Attack Flow

03:06 Detection Opportunity 1: Enumeration/Reconnaissance/Discovery - Cloud Infrastructure Discovery

05:27 Detection Opportunity 2: Persistence - Create Cloud Account

08:19 Detection Opportunity 3: Impact - Resource Hijacking

09:54 Detection Opportunity 4: Defense Evasion - Indicator Removal

10:23 Detection Opportunity 5: Credential Access - Stealing an application access token

12:04: Conclusion

_____________

⚡️JOIN 6,000+ CWX MEMBERS ON DISCORD

📰 SUBSCRIBE TO THE CYBERWOX UNPLUGGED NEWSLETTER

🥶 CYBERWOX MERCH

_____________

🧬 CYBERWOX RESOURCES

🔹 Cyberwox Cybersecurity Notion Templates for planning your career

🔹 Cyberwox Best Entry-Level Cybersecurity Resume Template

🔹 Learn AWS Threat Detection with my LinkedIn Learning Course

_____________

📱 LET'S CONNECT

→ ⁠⁠IG⁠⁠

→ ⁠⁠Threads⁠⁠

→ ⁠⁠Substack⁠⁠

→ ⁠⁠Twitter⁠⁠

→ ⁠⁠Linkedin⁠⁠

→ ⁠⁠Tiktok⁠⁠

Email: day@cyberwox.com

_____________

⚠️DISCLAIMER

This description has some affiliate links, and I may receive a small commission for purchases made through these links. I appreciate your support!

Email: day@cyberwox.com