Cloud Threat Hunting Series: What Lead To a Major Financial Institution Suffering a Cloud Breachby@checkpoint

Cloud Threat Hunting Series: What Lead To a Major Financial Institution Suffering a Cloud Breach

tldt arrow
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

Probably the most infamous breach of this past year against a major financial institution did not utilize the most advanced hacking techniques. In fact, it all boiled down to a misconfiguration in a cloud environment – by far the most common reason for cloud breaches in the modern era. This blog, the second of the Cloud Threat Hunting: Attack & Investigation Series, walks through an attack technique similar to the one used in a major attack against a major financial institution. Watch this video for an in depth overview of the attack and investigation:

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Cloud Threat Hunting Series: What Lead To a Major Financial Institution Suffering a Cloud Breach
Check Point Software HackerNoon profile picture

@checkpoint

Check Point Software


Receive Stories from @checkpoint

react to story with heart
Check Point Software HackerNoon profile picture
by Check Point Software @checkpoint.Welcome to the Future of Cyber Security. Providing solutions across all vectors to prevent 5th generation cyber attacks.
Visit us

RELATED STORIES

L O A D I N G
. . . comments & more!
Hackernoon hq - po box 2206, edwards, colorado 81632, usa