Real World Cloud Attack 3: Compromising Sensitive Console Access

April 16, 2021

Cloud consoles, whether cloud providers or for cloud resources such as container orchestration, are big targets for compromise. These coveted cloud targets are easily overlooked by cloud security teams and often left unintentionally publicly exposed and unprotected. This video walks through a real world attack on a sensitive cloud console.

Previous Article
Between a Rock and a Hard Place: The IT Help Desk Manager’s Password Dilemma
Between a Rock and a Hard Place: The IT Help Desk Manager’s Password Dilemma

Long-time Saturday Night Live fans will likely remember Nick Burns – a.k.a. “your company’s computer guy” –...

Next Video
Real World Cloud Attack 2: Embedded Credentials in Code
Real World Cloud Attack 2: Embedded Credentials in Code

Just as credentials in code residing on premises could be compromised and used to escalate privileges, the ...