Blueprint: Build the Best in Cyber Defense cover image

Brandon Evans: Cloud Security - Threats and Opportunities

Blueprint: Build the Best in Cyber Defense

00:00

Crypto Mining

We're looking for in a lot of cases, it sounds like compromised credentials, doing something on your CSP that you didn't expect them to be doing because now it's an attacker in control. I know one example that I always hear about is like someone compromises some resource and then it has the ability to spin up more VMs. They spin up the super high power GPU instance and start mining themselves crypto coin or whatever,. stuff like that. Any other like common actions that defenders might want to look for beyond spinning up a super expensive VM.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app