TLDR
Probably the most infamous breach of this past year against a major financial institution did not utilize the most advanced hacking techniques. In fact, it all boiled down to a misconfiguration in a cloud environment – by far the most common reason for cloud breaches in the modern era.
This blog, the second of the Cloud Threat Hunting: Attack & Investigation Series, walks through an attack technique similar to the one used in a major attack against a major financial institution.
Watch this video for an in depth overview of the attack and investigation:via the TL;DR App
no story
Written by checkpoint | Welcome to the Future of Cyber Security. Providing solutions across all vectors to prevent 5th generation cyber attacks.