Dec 10, 2025The Hacker NewsCloud Safety / Menace Detection
Cloud safety is altering. Attackers are now not simply breaking down the door; they’re discovering unlocked home windows in your configurations, your identities, and your code.
Customary safety instruments typically miss these threats as a result of they appear like regular exercise. To cease them, it is advisable to see precisely how these assaults occur in the actual world.
Subsequent week, the Cortex Cloud staff at Palo Alto Networks is internet hosting a technical deep dive to stroll you thru three current investigations and precisely methods to defend in opposition to them.
Safe your spot for the stay session ➜
What Specialists Will Cowl
This is not a high-level overview. We’re particular, technical findings from the sector. On this session, our consultants will break down three distinct assault vectors which can be bypassing conventional safety proper now:
AWS Id Misconfigurations: We are going to present how attackers abuse easy setup errors in AWS identities to realize preliminary entry with out stealing a single password.
Hiding in AI Fashions: You will note how adversaries masks malicious information in manufacturing by mimicking the naming constructions of your authentic AI fashions.
Dangerous Kubernetes Permissions: We are going to study “overprivileged entities”—containers which have an excessive amount of energy—and the way attackers exploit them to take over infrastructure.
We can’t simply discuss in regards to the issues; we’ll present you the mechanics of the assaults. Register now to see the complete breakdown of those threats.
Why This Issues for Your Crew
The core concern with these threats is the visibility hole. Typically, the Cloud staff builds the atmosphere, and the SOC (Safety Operations Heart) screens it, however neither aspect sees the complete image.
On this webinar, we’ll display how Code-to-Cloud detection fixes this. We are going to present you methods to use runtime intelligence and audit logs to identify these threats early.
The Takeaway
By the tip of this session, you should have actionable insights on methods to:
Audit your cloud logs for “invisible” intruders.
Clear up dangerous permissions in Kubernetes.
Apply AI-aware controls to guard your growth pipeline.
Do not wait till you discover these vulnerabilities in a breach report. Be part of us subsequent week and get the information it is advisable to shut the gaps.
Register for the Webinar ➜
Discovered this text fascinating? This text is a contributed piece from certainly one of our valued companions. Comply with us on Google Information, Twitter and LinkedIn to learn extra unique content material we publish.
