Navigating the Cloud: Exploring Lateral Movement Techniques 7,756 people reacted Navigating the Cloud: Exploring Lateral Movement Techniques By Eden Elazar February 28, 2024 at 3:00 AM 27 12 min. read
Dual Privilege Escalation Chain: Exploiting Monitoring and Service Mesh Configurations and Privileges in GKE to Gain Unauthorized Access in Kubernetes 6,957 people reacted Dual Privilege Escalation Chain: Exploiting Monitoring and Service Mesh Configurations and Privileges in GKE to Gain Unauthorized Access in Kubernetes By Shaul Ben Hai December 27, 2023 at 6:00 AM 33 11 min. read
Unit 42 Attack Surface Threat Research: Constant Change in Cloud Contributes to 45% of New High/Critical Exposures Per Month 5,480 people reacted Unit 42 Attack Surface Threat Research: Constant Change in Cloud Contributes to 45% of New High/Critical Exposures Per Month By Unit 42 September 14, 2023 at 3:00 AM 9 4 min. read
P2PInfect: The Rusty Peer-to-Peer Self-Replicating Worm 11,093 people reacted P2PInfect: The Rusty Peer-to-Peer Self-Replicating Worm By William Gamazo and Nathaniel Quist July 19, 2023 at 10:00 AM 16 11 min. read
Six Malicious Python Packages in the PyPI Targeting Windows Users 9,490 people reacted Six Malicious Python Packages in the PyPI Targeting Windows Users By Shaul Ben Hai July 11, 2023 at 6:00 AM 21 11 min. read
Unit 42 Unveils Most ‘Expansive’ Cloud Threat Research Yet: Cloud Threat Report Volume 7 Examines the Expanding Attack Surface 73,751 people reacted Unit 42 Unveils Most ‘Expansive’ Cloud Threat Research Yet: Cloud Threat Report Volume 7 Examines the Expanding Attack Surface By Unit 42 April 18, 2023 at 3:00 AM 28 4 min. read
Mitigating RBAC-Based Privilege Escalation in Popular Kubernetes Platforms 67,448 people reacted Mitigating RBAC-Based Privilege Escalation in Popular Kubernetes Platforms By Yuval Avrahami January 27, 2023 at 6:00 AM 31 9 min. read
PurpleUrchin Bypasses CAPTCHA and Steals Cloud Platform Resources 61,113 people reacted PurpleUrchin Bypasses CAPTCHA and Steals Cloud Platform Resources By William Gamazo and Nathaniel Quist January 5, 2023 at 6:00 AM 14 10 min. read
Digging Inside Azure Functions: HyperV Is the Last Line of Defense 52,980 people reacted Digging Inside Azure Functions: HyperV Is the Last Line of Defense By Daniel Prizmant and Aviv Sasson December 15, 2022 at 6:00 AM 9 10 min. read
Compromised Cloud Compute Credentials: Case Studies From the Wild 55,656 people reacted Compromised Cloud Compute Credentials: Case Studies From the Wild By Dror Alon December 8, 2022 at 3:00 PM 48 9 min. read
Finding Azurescape – Cross-Account Container Takeover in Azure Container Instances 105,869 people reacted Finding Azurescape – Cross-Account Container Takeover in Azure Container Instances By Yuval Avrahami September 9, 2021 at 3:00 AM 113 14 min. read
Unit 42 Cloud Threat Report: Spring 2020 40,574 people reacted Unit 42 Cloud Threat Report: Spring 2020 By Unit 42 February 5, 2020 at 3:00 AM 46 3 min. read
Attacker’s Tactics and Techniques in Unsecured Docker Daemons Revealed 46,196 people reacted Attacker’s Tactics and Techniques in Unsecured Docker Daemons Revealed By Jay Chen January 29, 2020 at 6:00 AM 21 10 min. read
Cloudy with a Chance of Entropy 59,510 people reacted Cloudy with a Chance of Entropy By Unit 42 July 24, 2019 at 6:00 AM 22 2 min. read
Misconfigured and Exposed: Container Services 45,373 people reacted Misconfigured and Exposed: Container Services By Nathaniel Quist June 6, 2019 at 9:00 AM 10 12 min. read