Dec. 16, 2022, 3:49 p.m. | Day Cyberwox

Day Cyberwox www.youtube.com

In this video and possibly, new series, I’ll be going over detection opportunities at various stages of cloud security attacks.

Compromised Cloud Compute Credentials: Case Studies From the Wild: https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials/#post-125981-_kdq0vw6banab
_____________
TIMESTAMPS
00:00 Intro
00:40 The Attack Case
02:12 The Attack Graph
2:44 The Attack Flow
3:06 Detection Opportunity 1: Enumeration/Reconnaissance/Discovery - Cloud Infrastructure Discovery
05:27 Detection Opportunity 2: Persistence - Create Cloud Account
08:19 Detection Opportunity 3: Impact - Resource Hijacking
09:54 Detection Opportunity 4: Defense Evasion - Indicator …

alto analysis attacks cloud cloud security detection detection opportunities palo palo alto report security unit 42

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Associate Manager, BPT Infrastructure & Ops (Security Engineer)

@ SC Johnson | PHL - Makati

Cybersecurity Analyst - Project Bound

@ NextEra Energy | Jupiter, FL, US, 33478

Lead Cyber Security Operations Center (SOC) Analyst

@ State Street | Quincy, Massachusetts

Junior Information Security Coordinator (Internship)

@ Garrison Technology | London, Waterloo, England, United Kingdom

Sr. Security Engineer

@ ScienceLogic | Reston, VA