Главная
Study mode:
on
1
Intro
2
Presentation Overview
3
Hackers Sent Us GIFs
4
Trust Set the Record Clear
5
Vulnerability Simulations
6
How They Get In
7
How They Maintain Access
8
What Could Happen
9
Key Takeaways
Description:
Explore a Black Hat conference talk detailing the discovery of a crypto-mining worm targeting AWS credentials and its evolution into a sophisticated cloud-specific attack. Delve into the attackers' expanded toolkit, designed to steal more credentials from compromised cloud systems and exploit containerized Kubernetes environments. Learn about innovative techniques used to breach multiple cloud providers, and understand the implications of these attacks. Gain insights into the hackers' methods for initial access, persistence, and potential consequences. Examine key takeaways to enhance cloud security posture and protect against emerging threats in cloud and container environments.

They Hacked Thousands of Cloud Accounts Then Sent Us Weird GIFs

Black Hat
Add to list