Tag: lateral movement

  • Microsoft Security Blog: Storm-0501: Ransomware attacks expanding to hybrid cloud environments

    Source URL: https://www.microsoft.com/en-us/security/blog/2024/09/26/storm-0501-ransomware-attacks-expanding-to-hybrid-cloud-environments/ Source: Microsoft Security Blog Title: Storm-0501: Ransomware attacks expanding to hybrid cloud environments Feedly Summary: Microsoft has observed the threat actor tracked as Storm-0501 launching a multi-staged attack where they compromised hybrid cloud environments and performed lateral movement from on-premises to cloud environment, leading to data exfiltration, credential theft, tampering, persistent backdoor…

  • Cloud Blog: UNC1860 and the Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/unc1860-iran-middle-eastern-networks/ Source: Cloud Blog Title: UNC1860 and the Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks Feedly Summary: Written by: Stav Shulman, Matan Mimran, Sarah Bock, Mark Lechtik Executive Summary UNC1860 is a persistent and opportunistic Iranian state-sponsored threat actor that is likely affiliated with Iran’s Ministry of Intelligence and Security…

  • CSA: What is Penetration Testing? Strategy & Success

    Source URL: https://cloudsecurityalliance.org/articles/fundamentals-of-cloud-security-stress-testing Source: CSA Title: What is Penetration Testing? Strategy & Success Feedly Summary: AI Summary and Description: Yes **Summary:** The text outlines the importance of adopting an attacker’s perspective in cybersecurity, particularly through penetration testing in both traditional and cloud environments. It emphasizes the dynamic nature of cloud architectures and the shared responsibility…

  • CSA: PAM and Cloud: The Case for Zero Standing Privileges

    Source URL: https://www.cyberark.com/resources/blog/pam-and-cloud-security-the-case-for-zero-standing-privileges Source: CSA Title: PAM and Cloud: The Case for Zero Standing Privileges Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the evolving landscape of privileged access management (PAM) in cloud environments and emphasizes the need for adopting Zero Standing Privileges (ZSP) as a security approach. It highlights the challenges…