April 14, 2022, 6 a.m. | Help Net Security

Help Net Security www.helpnetsecurity.com

In this video for Help Net Security, Zur Ulianitzky, Head of Research at XM Cyber, talks about the top attack techniques used by threat actors to compromise critical assets in enterprise and cloud environments. Based on a research of attack techniques exploiting vulnerabilities, misconfigurations and mismanaged or stolen credentials to compromise critical assets, the most impactful technique turned out to be the used of compromised domain credentials, which allow the attacker to spread throughout the … More →


The post …

attack cloud cloud security data breach don't miss enterprise hot stuff misconfiguration threats video vulnerability xm cyber

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Information Security Compliance Analyst

@ Media.Monks | Buenos Aires

Security Engineer, Threat Research

@ ExtraHop | Remote

Security Operations Engineer

@ Skydio | San Mateo, California, United States

GN - Tech Strategy & Advisory -Cyber Security - Consultant

@ Accenture | Bengaluru, BDC7A

GDS Consulting - Cybersecurity Senior Consultant

@ EY | Taguig, PH, 1634