Cloud-Native Threats in 2023
Similarly to what I have done in 2022, 2021, and 2020, I am listing those cyber attacks...
Similarly to what I have done in 2022, 2021, and 2020, I am listing those cyber attacks...
Similarly to what I have done in 2021, I am now collecting the incidents due to cloud misconfigurations and leading to the exposure of data.
This blog post lists the main cloud-native threats, that is those cyber events exploiting the cloud in one or more stage of the kill chain. I have collected...
Among the various things that I have done in 2020, there is the collection of the main cyber attacks that have exploited cloud services in the kill chain. I have built...
I am starting a new project to track cloud-native threats, similarly to what I have done in 2020, with an interactive timeline. As soon as I collect more data I will start to generate some statistics.
Recently I wrote a blog post for Netskope, my employer, discussing the implications of cloud services in the cyber kill chain model. The cyber kill chain, as you probably know, is a consolidated model adopted to represent a cyber intrusion, identifying the different stages involved in a cyber-attack. Despite the model is well established...
Update 01/11/2012: Year-to-Tear comparison with 2011 Security Predictions The new year has just come, vacations are over, and, as usually…
This morning, during my usual virtual promenade through my feeds, I came across a really interesting post from Stratsec, a…
Update November 24: New EU directive to feature cloud 'bridge'. The Binding Safe Processor Rules (BSPR) will ask cloud service…
Advanced Persistent Threats are probably the most remarkable events for Information Security in 2011 since they are redefining the infosec…