Blog | G5 Cyber Security

How Containers & Serverless Computing Transform Attacker Methodologies

As systems undergo innovation, hackers are adapting their methodologies to stay ahead of the curve. With the rise of cloud-based systems, attackers now seek to exploit the massive quantities of data available via Web applications, microservices, and APIs. Traditional persistent infrastructure allows attackers to take a methodical approach, first penetrating the environment, then moving laterally to seek high-value targets. Instead of being updated once or twice each year, application code is now pushed to production upward of 10 to 20 times each day.”]

Source: https://www.darkreading.com/cloud/how-containers-serverless-computing-transform-attacker-methodologies

Exit mobile version