@BlackHatOfficialYT
  @BlackHatOfficialYT
Black Hat | When a Zero Day and Access Keys Collide in the Cloud: Responding to the SugarCRM 0-Day Vulnerability @BlackHatOfficialYT | Uploaded 7 months ago | Updated 1 hour ago
...This presentation maps out various attacks against AWS environments following the MITRE ATTACK Matrix framework, wrapping up with the multiple prevention mechanisms an organization can put in place to protect themselves. The complexity of these attacks details how seemingly innocuous AWS API calls lead to much more daunting activity that is not always traceable. One size does not fit all in cloud security, but these attacks highlight key areas to focus on to make sure you're ready to defend against those attacks when they come.

By: Margaret Zimmermann

Full Abstract and Presentation Materials: blackhat.com/us-23/briefings/schedule/#when-a-zero-day-and-access-keys-collide-in-the-cloud-responding-to-the-sugarcrm--day-vulnerability-32997
When a Zero Day and Access Keys Collide in the Cloud: Responding to the SugarCRM 0-Day VulnerabilityMaking and Breaking NSAs Codebreaker ChallengeEvading Logging in the Cloud: Bypassing AWS CloudTrailFireside Chat: Jeff Moss and Ruimin HeDebug7: Leveraging a Firmware Modification Attack for Remote Debugging of Siemens S7 PLCsMagicdot: A Hackers Magic Show of Disappearing Dots and SpacesIllegitimate Data Protection Requests - To Delete or to Address?IRonMAN: InterpRetable Incident Inspector Based ON Large-Scale Language Model and Association miNingKill Latest MPU-based Protections in Just One Shot: Targeting All Commodity RTOSesUnsafe At Any Speed: CISAs Plan to Foster Tech Ecosystem SecurityFaults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution EnvironmentsSecond Breakfast: Implicit and Mutation-Based Serialization Vulnerabilities in .NET

When a Zero Day and Access Keys Collide in the Cloud: Responding to the SugarCRM 0-Day Vulnerability @BlackHatOfficialYT

SHARE TO X SHARE TO REDDIT SHARE TO FACEBOOK WALLPAPER