Listen "How A Compromised AWS Lambda Function Led to a Phishing Attack | EP. 1"
Episode Synopsis
In this video, I’ll be going over detection opportunities at various stages of cloud security attacks.Compromised Cloud Compute Credentials: Case Studies From the Wild_____________TIMESTAMPS00:00 Intro00:40 The Attack Case02:12 The Attack Graph02:44 The Attack Flow 03:06 Detection Opportunity 1: Enumeration/Reconnaissance/Discovery - Cloud Infrastructure Discovery05:27 Detection Opportunity 2: Persistence - Create Cloud Account 08:19 Detection Opportunity 3: Impact - Resource Hijacking09:54 Detection Opportunity 4: Defense Evasion - Indicator Removal10:23 Detection Opportunity 5: Credential Access - Stealing an application access token12:04: Conclusion_____________⚡️JOIN 6,000+ CWX MEMBERS ON DISCORD📰 SUBSCRIBE TO THE CYBERWOX UNPLUGGED NEWSLETTER🥶 CYBERWOX MERCH_____________🧬 CYBERWOX RESOURCES🔹 Cyberwox Cybersecurity Notion Templates for planning your career🔹 Cyberwox Best Entry-Level Cybersecurity Resume Template🔹 Learn AWS Threat Detection with my LinkedIn Learning Course_____________📱 LET'S CONNECT → IG→ Threads→ Substack→ Twitter→ Linkedin→ TiktokEmail: [email protected]_____________⚠️DISCLAIMERThis description has some affiliate links, and I may receive a small commission for purchases made through these links. I appreciate your support!Email: [email protected]
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.