Главная
Study mode:
on
1
Intro
2
Flight Ordering
3
Who am I
4
Disclaimer
5
What is Serverless
6
Who is using Serverless
7
Serverless Trends
8
Containers
9
Shared Responsibility
10
Service
11
Cloud Access
12
AWS Example
13
Slack Example
14
Chatboard Example
15
Database Example
16
Cloud Storage Example
17
Email Example
Description:
Explore serverless technology security risks in this Black Hat conference talk. Delve into the primary threat of event injection across various event types, including emails, logs, files, and even Alexa. Learn about the shared responsibility model in serverless architectures and examine real-world examples from AWS, Slack, and other cloud services. Gain insights into potential vulnerabilities in cloud storage, databases, and email systems within serverless environments. Understand the implications of passing security threats to cloud providers and the importance of maintaining vigilance in serverless application security.

Alexa, Hack My Serverless Please

Black Hat
Add to list
0:00 / 0:00