Real World Cloud Attack 2: Embedded Credentials in Code

April 16, 2021

Common in agile development environments is frequent code exchanges with cloud-based repositories such as GitHub. During this process, developers can inadvertently expose credentials. This video walks through a real world attack on embedded credentials in code.

Previous Video
Real World Cloud Attack 3: Compromising Sensitive Console Access
Real World Cloud Attack 3: Compromising Sensitive Console Access

Consoles in the cloud, whether cloud providers or for other cloud resources such as container orchestration...

Next Video
Real World Cloud Attack 1: Exploiting Misconfigured Cloud Identities
Real World Cloud Attack 1: Exploiting Misconfigured Cloud Identities

The dynamic nature of cloud often leads to the misconfiguration of permissions and entitlements associated ...

Webinar: Least Privilege Access and Cloud Infrastructure Entitlements Management

Watch Webinar