RSA Conference
Shadows in the Cloud: The Invisible Pathways to Breaching AWS Accounts
Imagine taking over an entire AWS account with just an account ID. This session will reveal attack vectors that led to the discovery of multiple critical vulnerabilities in AWS, exposing paths to remote code execution, account takeovers, and data leaks. Attendees will learn how issues were uncovered, how to detect them in their own environments, and actionable steps to enhance cloud security.
Cracks in the Fortress: How Major Companies Leak Their Secrets
Know everything there is to know about secrets scanning? Attendees in this session will find out how many secrets they may be unknowingly exposing to attackers. Learn how research uncovered overlooked secrets in the software development lifecycle and hear captivating stories about findings. This session will discuss lessons we learned, and teach how to better protect the organization's secrets.
The Anatomy of Cloud Attacks
The honeypot analysis has decoded the mindset and tactics of adversaries like Headcrab Kinsing and Teamtnt. Uncovering their chosen attack vectors and prevalent patterns. This session will dive into these findings, spotlight key attack sequences, and elucidate the attacker mindset. Attendees will gain key strategies to defend against these cloud threats.