all InfoSec news
Top attack techniques for breaching enterprise and cloud environments
Help Net Security www.helpnetsecurity.com
In this video for Help Net Security, Zur Ulianitzky, Head of Research at XM Cyber, talks about the top attack techniques used by threat actors to compromise critical assets in enterprise and cloud environments. Based on a research of attack techniques exploiting vulnerabilities, misconfigurations and mismanaged or stolen credentials to compromise critical assets, the most impactful technique turned out to be the used of compromised domain credentials, which allow the attacker to spread throughout the … More →
The post …
attack cloud cloud security data breach don't miss enterprise hot stuff misconfiguration threats video vulnerability xm cyber