Curated articles, resources, tips and trends from the DevOps World.
Summary: This is a summary of an article originally published by The New Stack. Read the full original article here →
Check Point sponsored this post. They use this to move laterally within a cloud environment and access sensitive assets.
In this attack, the attacker was able to log into the console using a low privilege user’s credentials.
Given that the stolen permissions of this user are not excessive, the attacker will attempt to escalate to a higher permission that has access to sensitive assets.
This post was sponsored by Check Point.Amazon Web Services is a sponsor of The New Stack.
Made with pure grit © 2024 Jetpack Labs Inc. All rights reserved. www.jetpacklabs.com