<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How are threat actors adapting to the Cloud? in Cloud Security</title>
    <link>https://community.isc2.org/t5/Cloud-Security/How-are-threat-actors-adapting-to-the-Cloud/m-p/38436#M42</link>
    <description>&lt;P&gt;Mass-scan runs fine in somebody else's cloud account &lt;span class="lia-unicode-emoji" title=":face_with_tears_of_joy:"&gt;😂&lt;/span&gt;&lt;span class="lia-unicode-emoji" title=":rolling_on_the_floor_laughing:"&gt;🤣&lt;/span&gt;&lt;span class="lia-unicode-emoji" title=":face_with_tears_of_joy:"&gt;😂&lt;/span&gt;, and they have plenty of cards to get seeded.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If anything the cloud surely makes it easier for threat actors to cash out in alt coins by abusing any scaling in place or sweating free resources, also cloud to cloud attacks are prevalent when SaaS such as Docs/Office and all require huge subnets opening for any integrations to work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I would say they are more likely to have the agility to leverage cloud better the big enterprise!&lt;/P&gt;</description>
    <pubDate>Tue, 25 Aug 2020 16:03:47 GMT</pubDate>
    <dc:creator>Kempy</dc:creator>
    <dc:date>2020-08-25T16:03:47Z</dc:date>
    <item>
      <title>How are threat actors adapting to the Cloud?</title>
      <link>https://community.isc2.org/t5/Cloud-Security/How-are-threat-actors-adapting-to-the-Cloud/m-p/38199#M39</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Worth reading this latest report on what is happening in reality:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://securityintelligence.com/posts/how-threat-actors-are-adapting-to-the-cloud/" target="_blank"&gt;https://securityintelligence.com/posts/how-threat-actors-are-adapting-to-the-cloud/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is also a useful report to go with it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:36:54 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/How-are-threat-actors-adapting-to-the-Cloud/m-p/38199#M39</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T09:36:54Z</dc:date>
    </item>
    <item>
      <title>Re: How are threat actors adapting to the Cloud?</title>
      <link>https://community.isc2.org/t5/Cloud-Security/How-are-threat-actors-adapting-to-the-Cloud/m-p/38436#M42</link>
      <description>&lt;P&gt;Mass-scan runs fine in somebody else's cloud account &lt;span class="lia-unicode-emoji" title=":face_with_tears_of_joy:"&gt;😂&lt;/span&gt;&lt;span class="lia-unicode-emoji" title=":rolling_on_the_floor_laughing:"&gt;🤣&lt;/span&gt;&lt;span class="lia-unicode-emoji" title=":face_with_tears_of_joy:"&gt;😂&lt;/span&gt;, and they have plenty of cards to get seeded.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If anything the cloud surely makes it easier for threat actors to cash out in alt coins by abusing any scaling in place or sweating free resources, also cloud to cloud attacks are prevalent when SaaS such as Docs/Office and all require huge subnets opening for any integrations to work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I would say they are more likely to have the agility to leverage cloud better the big enterprise!&lt;/P&gt;</description>
      <pubDate>Tue, 25 Aug 2020 16:03:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/How-are-threat-actors-adapting-to-the-Cloud/m-p/38436#M42</guid>
      <dc:creator>Kempy</dc:creator>
      <dc:date>2020-08-25T16:03:47Z</dc:date>
    </item>
  </channel>
</rss>

