Education subjected to Storm-1977 password spraying intrusions – SC Media

(Adobe Stock)


Safe-seeming cloud services like Google Drive and Trello have everything attackers need to remotely control infected hosts, and most defenders have no idea.

Tenable researchers say “ConfusedComposer” highlights how attackers can exploit cloud service permissions.

CEO Amiram Shachar noted that these tools help identify anomalies in API traffic and build baselines that allow organizations to customize security policies.
On-Demand Event
On-Demand Event
On-Demand Event

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

Related Terms

You can skip this ad in 5 seconds
Copyright © 2025 CyberRisk Alliance, LLC All Rights Reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization.
Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms of Use.

source

Leave a Reply

This will close in 0 seconds