c
June 20, 2023, 11:58 p.m. |

Cloud Security Alliance cloudsecurityalliance.org

Originally published by CrowdStrike. Summary Points Organizations around the globe continue to experience the fallout of the MOVEit Transfer exploit CVE-2023-34362 CrowdStrike incident responders have identified evidence of mass file exfiltration from the MOVEit application, as a result of the webshell activity on compromised MOVEit systemsData exfiltration activity can be identified by analyzing the MOVEit application database and IIS logsBackgroundCrowdStrike incident responders have been a...

application compromised continue crowdstrike cve cve-2023-34362 data data exfiltration exfiltration experience exploit file incident incident responders investigations moveit moveit transfer organizations result transfer webshell

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Security Engineer II- Full stack Java with React

@ JPMorgan Chase & Co. | Hyderabad, Telangana, India

Cybersecurity SecOps

@ GFT Technologies | Mexico City, MX, 11850

Senior Information Security Advisor

@ Sun Life | Sun Life Toronto One York

Contract Special Security Officer (CSSO) - Top Secret Clearance

@ SpaceX | Hawthorne, CA

Early Career Cyber Security Operations Center (SOC) Analyst

@ State Street | Quincy, Massachusetts