Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts tagged with: public cloud

Observing Attacks Against Hundreds of Exposed Services in Public CloudsA conceptual image representing misconfigurations in the cloud, including insecurely exposed services.
57,906
people reacted

Observing Attacks Against Hundreds of Exposed Services in Public Clouds

  • By Jay Chen
  • November 22, 2021 at 12:00 PM

43

7 min. read

Network Scanning Traffic Observed in Public CloudsA conceptual image representing network scanning, such as the network scanning traffic researchers observed in public clouds.
46,715
people reacted

Network Scanning Traffic Observed in Public Clouds

  • By Jay Chen
  • October 28, 2021 at 6:00 AM

18

6 min. read

Trending

  • Finding Gozi: Answers to Unit 42 Wireshark Quiz, March 2023 by Brad Duncan
  • Threat Brief: 3CXDesktopApp Supply Chain Attack by Robert Falcone
  • Threat Brief - CVE-2023-23397 - Microsoft Outlook Privilege Escalation by Unit 42
Unsecured Kubernetes Instances Could Be Vulnerable to ExploitationA conceptual image representing Kubernetes topics, including the unsecured Kubernetes instances discussed here.
42,475
people reacted

Unsecured Kubernetes Instances Could Be Vulnerable to Exploitation

  • By Jay Chen, Aviv Sasson and Ariel Zelivansky
  • April 23, 2021 at 5:40 PM

22

11 min. read

Hildegard: New TeamTNT Cryptojacking Malware Targeting KubernetesThis conceptual image covers the concept of container security. Attacks on containers, such as that of the Hildegard malware detailed here, can allow attackers access to a large amount of computing resources.
80,784
people reacted

Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes

  • By Jay Chen, Aviv Sasson and Ariel Zelivansky
  • February 3, 2021 at 6:00 AM

32

10 min. read

IAMFinder: Open Source Tool to Identify Information Leaked from AWS IAM ReconnaissanceA conceptual image illustrating finding vulnerabilities on the web. IAMFinder is a custom open source tool that can help organizations identify information leakage in AWS accounts.
37,780
people reacted

IAMFinder: Open Source Tool to Identify Information Leaked from AWS IAM Reconnaissance

  • By Jay Chen
  • November 19, 2020 at 12:00 PM

30

6 min. read

Information Leakage in AWS Resource-Based Policy APIsThis conceptual image illustrates some of the security and configuration issues involved with the cloud, such as the issue with AWS resource-based policy APIs discussed here.
49,550
people reacted

Information Leakage in AWS Resource-Based Policy APIs

  • By Jay Chen
  • November 17, 2020 at 3:00 AM

18

6 min. read

Unit 42 Cloud Threat Report: Misconfigured IAM Roles Lead to Thousands of Compromised Cloud WorkloadsThe conceptual image illustrates the idea of the risks that misconfigured IAM roles can pose for cloud workloads.
39,030
people reacted

Unit 42 Cloud Threat Report: Misconfigured IAM Roles Lead to Thousands of Compromised Cloud Workloads

  • By Jay Chen
  • October 8, 2020 at 6:00 AM

19

15 min. read

Unit 42 Cloud Threat Report: CSP Findings on Logging, Encryption and Exposed ServicesThis conceptual image illustrates the role of Cloud Service Providers (CSPs) in cloud security.
31,124
people reacted

Unit 42 Cloud Threat Report: CSP Findings on Logging, Encryption and Exposed Services

  • By Nathaniel Quist
  • October 7, 2020 at 6:00 AM

6

7 min. read

Highlights from the Unit 42 Cloud Threat Report, 2H 2020This conceptual image illustrates the concept of misconfigurations in the cloud. IAM misconfigurations are a key concern outlined in the Unit 42 Cloud Threat Report, 2H 2020.
41,806
people reacted

Highlights from the Unit 42 Cloud Threat Report, 2H 2020

  • By Unit 42
  • October 6, 2020 at 3:00 AM

35

3 min. read

COVID-19: Cloud Threat Landscape
41,401
people reacted

COVID-19: Cloud Threat Landscape

  • By Jay Chen
  • May 4, 2020 at 6:00 AM

22

6 min. read

Unit 42 CTR: Sensitive Data Exposed in GitHub
36,842
people reacted

Unit 42 CTR: Sensitive Data Exposed in GitHub

  • By Nathaniel Quist
  • February 6, 2020 at 6:00 AM

32

7 min. read

Server-Side Request Forgery Exposes Data of Technology, Industrial and Media Organizations
37,033
people reacted

Server-Side Request Forgery Exposes Data of Technology, Industrial and Media Organizations

  • By Jay Chen
  • November 26, 2019 at 6:00 AM

39

9 min. read

Hunting the Public Cloud for Exposed Hosts and Misconfigurations
60,467
people reacted

Hunting the Public Cloud for Exposed Hosts and Misconfigurations

  • By Jay Chen
  • August 12, 2019 at 6:00 AM

29

11 min. read

Cloudy with a Chance of Entropy
58,008
people reacted

Cloudy with a Chance of Entropy

  • By Unit 42
  • July 24, 2019 at 6:00 AM

22

2 min. read

TCP SACK Panics Linux Servers
47,044
people reacted

TCP SACK Panics Linux Servers

  • By Unit 42
  • June 21, 2019 at 7:30 AM

11

5 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.