Real World Cloud Attack 2: Embedded Credentials in Code

April 16, 2021

Common in agile development environments is frequent code exchanges with cloud-based repositories such as GitHub. During this process, developers can inadvertently expose credentials. This video walks through a real world attack on embedded credentials in code.

Previous Video
Real World Cloud Attack 3: Compromising Sensitive Console Access
Real World Cloud Attack 3: Compromising Sensitive Console Access

Consoles in the cloud, whether cloud providers or for other cloud resources such as container orchestration...

Next Video
Real World Cloud Attack 1: Exploiting Misconfigured Cloud Identities
Real World Cloud Attack 1: Exploiting Misconfigured Cloud Identities

The dynamic nature of cloud often leads to the misconfiguration of permissions and entitlements associated ...

Gartner Names CyberArk a Leader in the 2021 Magic Quadrant for PAM

Download Now