Cloud Threat Hunting Series: What Lead To a Major Financial Institution Suffering a Cloud Breachby@checkpoint

Cloud Threat Hunting Series: What Lead To a Major Financial Institution Suffering a Cloud Breach

by Check Point Software3mNovember 27th, 2021
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Probably the most infamous breach of this past year against a major financial institution did not utilize the most advanced hacking techniques. In fact, it all boiled down to a misconfiguration in a cloud environment – by far the most common reason for cloud breaches in the modern era. This blog, the second of the Cloud Threat Hunting: Attack & Investigation Series, walks through an attack technique similar to the one used in a major attack against a major financial institution. Watch this video for an in depth overview of the attack and investigation:

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Cloud Threat Hunting Series: What Lead To a Major Financial Institution Suffering a Cloud Breach
Check Point Software HackerNoon profile picture
Check Point Software

Check Point Software

@checkpoint

Welcome to the Future of Cyber Security. Providing solutions across all vectors to prevent 5th generation cyber attacks.

Share Your Thoughts

About Author

Check Point Software HackerNoon profile picture
Check Point Software@checkpoint
Welcome to the Future of Cyber Security. Providing solutions across all vectors to prevent 5th generation cyber attacks.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Also published here
L O A D I N G
. . . comments & more!