(Adobe Stock)
Paul Wagenseil
Safe-seeming cloud services like Google Drive and Trello have everything attackers need to remotely control infected hosts, and most defenders have no idea.
Laura French
Tenable researchers say “ConfusedComposer” highlights how attackers can exploit cloud service permissions.
SC Staff
CEO Amiram Shachar noted that these tools help identify anomalies in API traffic and build baselines that allow organizations to customize security policies.
On-Demand Event
On-Demand Event
On-Demand Event
By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.
Related Terms
You can skip this ad in 5 seconds
Copyright © 2025 CyberRisk Alliance, LLC All Rights Reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization.
Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms of Use.