Get a Pentest and security assessment of your IT network.

News

How Containers & Serverless Computing Transform Attacker Methodologies

As systems undergo innovation, hackers are adapting their methodologies to stay ahead of the curve. With the rise of cloud-based systems, attackers now seek to exploit the massive quantities of data available via Web applications, microservices, and APIs. Traditional persistent infrastructure allows attackers to take a methodical approach, first penetrating the environment, then moving laterally to seek high-value targets. Instead of being updated once or twice each year, application code is now pushed to production upward of 10 to 20 times each day.”]

Source: https://www.darkreading.com/cloud/how-containers-serverless-computing-transform-attacker-methodologies

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

SEA has stolen invoices that shows Microsoft charges FBI for user data

News

Greek police arrested a man running the BTC-e Bitcoin exchange to launder more than US$4bn worth of the Bitcoin