PinnedSophisticated AWS Cloud Attack Utilizing Lateral Movement Leads to Data ExfiltrationA sign of a truly sophisticated attack in the cloud is the ability to move laterally undetected. Doing so successfully requires knowledge…Feb 5, 2021Feb 5, 2021
Attack & Investigation Series: Privilege Escalation via EC2Cloud breaches are becoming increasingly prevalent in this modern digital era. One of the more dangerous strategies attackers deploy…Mar 15, 2021Mar 15, 2021