paint-brush
Cloud Phishing: New Tricks and the Crown Jewelby@z3nch4n
11,247 reads
11,247 reads

Cloud Phishing: New Tricks and the Crown Jewel

by Zen Chan12mJanuary 2nd, 2023
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

Cloud Computing gives phishers a new playground to harvest and grow their business. No organization, small or big, is invulnerable to phishing attacks. The first stage of a phishing attack is frequently a fake invoice or document hosted on cloud services. As we saw in the news in August, Cloud Phishing attempts on the AWS didn’t necessarily hit because it is hard to detect.
featured image - Cloud Phishing: New Tricks and the Crown Jewel
Zen Chan HackerNoon profile picture
Zen Chan

Zen Chan

@z3nch4n

Interested in Infosec & Biohacking. Security Architect by profession. Love reading and running.

About @z3nch4n
LEARN MORE ABOUT @Z3NCH4N'S
EXPERTISE AND PLACE ON THE INTERNET.
0-item

STORY’S CREDIBILITY

Original Reporting

Original Reporting

This story contains new, firsthand information uncovered by the writer.

L O A D I N G
. . . comments & more!

About Author

Zen Chan HackerNoon profile picture
Zen Chan@z3nch4n
Interested in Infosec & Biohacking. Security Architect by profession. Love reading and running.

TOPICS

Languages

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite