×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!

Preventing Cloud Access Mismanagement – Lessons from the Codefinger Ransomware Attack

May 29, 2025

Cloud environments are prime targets for cybercriminals, with mismanaged access often being the weakest link. The Codefinger ransomware attack is a stark reminder of the risks associated with persistent credentials and insufficient monitoring. In this webinar, we’ll analyze how attackers exploited AWS keys to encrypt data and demand ransom—highlighting the need for granular access control. More importantly, we’ll explore how Zero Standing Privileges (ZSP) and Time, Entitlements, and Approvals (TEA) frameworks can proactively mitigate such threats while maintaining developer productivity. Join us to learn how to secure cloud access without slowing innovation.

Previous Video
Managing Secrets at Scale with CyberArk Secrets Hub and AWS Secrets Manager
Managing Secrets at Scale with CyberArk Secrets Hub and AWS Secrets Manager

Join our joint webinar with Amazon and CyberArk security experts to learn how to manage secrets at scale wh...

Next Video
Beyond the Breach: Fortifying Identity Security in Incident Response
Beyond the Breach: Fortifying Identity Security in Incident Response

Drawing from real-world incident response engagements, our expert will help you to identify and prioritize ...