

Under Siege: How Hackers Exploit Cloud Vulnerabilities
Oct 15, 2024
In this engaging conversation, Eilon Bendet, a Cloud Threat Researcher at Proofpoint, shares his expertise on the ever-evolving landscape of cloud security. He dives into account takeovers and the tactics hackers use, including credential brute force attacks and targeted phishing. Eilon highlights the growing challenges posed by state-sponsored actors and sophisticated reverse proxy toolkits. They also discuss the vital role of User and Entity Behavior Analytics in detecting anomalies, emphasizing the need for robust identity defense strategies to combat these cloud threats.
Chapters
Transcript
Episode notes
1 2 3 4 5 6
Intro
00:00 • 2min
Understanding User Behavior and Account Takeover Threats in Cloud Security
02:18 • 3min
Navigating the Cloud Threat Landscape
05:13 • 22min
Understanding the Timing of Data Breach Exploits
26:45 • 2min
The Rising Influence of AI in Cyber Threats
28:18 • 2min
Strategies for Effective Cyber Defense Against Cloud Threats
30:17 • 3min