YoVDO

They Hacked Thousands of Cloud Accounts Then Sent Us Weird GIFs

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Risk Mitigation Courses Cloud Security Courses Cyber Attacks Courses Vulnerability Assessment Courses

Course Description

Overview

Explore a Black Hat conference talk detailing the discovery of a crypto-mining worm targeting AWS credentials and its evolution into a sophisticated cloud-specific attack. Delve into the attackers' expanded toolkit, designed to steal more credentials from compromised cloud systems and exploit containerized Kubernetes environments. Learn about innovative techniques used to breach multiple cloud providers, and understand the implications of these attacks. Gain insights into the hackers' methods for initial access, persistence, and potential consequences. Examine key takeaways to enhance cloud security posture and protect against emerging threats in cloud and container environments.

Syllabus

Intro
Presentation Overview
Hackers Sent Us GIFs
Trust Set the Record Clear
Vulnerability Simulations
How They Get In
How They Maintain Access
What Could Happen
Key Takeaways


Taught by

Black Hat

Related Courses

The Location Advantage
Esri via Independent
Secure Android App Development
University of Southampton via FutureLearn
Cloud Computing Security
University System of Maryland via edX
Evaluación de peligros y riesgos por fenómenos naturales
Universidad Nacional Autónoma de México via Coursera
المدافعون عن حقوق الإنسان
Amnesty International via edX