A Cloud Workload Protection Platform – Buyers Guide

When cloud resources are publicly accessible, whether by design, misconfiguration, or compromise, they come under the scrutiny of threat actors. Such scrutiny is fully automated, as threat actors programmatically search for victims. In February 2023, SentinelOne researchers observed IceFire double-extortion ransomware attacks targeting public internet-facing Linux cloud infrastructure of large enterprises. By exploiting a critical input deserialization vulnerability (CVE-2022-47986) on a file-sharing application running on that server, threat actors were able to gain access and perform a remote code execution (RCE) attack. This resulted in a complete compromise of the system.

Download the whitepaper

Door op aanmelden te klikken geeft u toestemming om gemaild te worden, u ontvangt de whitepaper in uw mailbox.

Nuttig? Deel dit bericht!

Blijf op de hoogte!

Mis geen enkele congresupdate en meld u aan voor onze nieuwsbrief!