Every Cloud Has a Red Lining: Modern Attack Techniques in the Cloud

01:00 PM Jefferson

The Cloud Revolution has been one of the most transformational in the history of computing, but for both attackers and defenders alike. In this talk, we will explore common strategies - such as creative use of domain fronting, the chaining of cloud providers, proxy tunnelling, and more - used by attackers to put cloud resources to malicious use. By the end of this talk, you might think twice about exempting your cloud provider of choice from your NSM solutions...