Skip to Main Content
blog
nav-menu
cloud-crypto-mining
Security
Ian

Ian Ahl

20 Jun 2022

Anatomy of an Attack: Exposed keys to Crypto Mining

At Permiso, we find that the majority of incidents we discover or respond to, start with exposed access keys. Attackers leverage these keys to gain access, then setup a mechanism to establish persistence, perform reconnaissance, and complete their mission.

READ MORE

SusClouds
News
Ian

Ian Ahl

5 May 2022

Cloud vendor supply chain risk - Forecast: Foggy with a chance of thunderstorms

Attackers are increasingly taking advantage of trusted vendor relationships to perform software and service based supply chain attacks. As cloud adoption continues to grow, we will see sophisticated threat actors like APT29 increase targeting of cloud vendors.

READ MORE

LemonDuck
News
Ian

Ian Ahl

3 May 2022

Permiso weighs in on CrowdStrike's LemonDuck malware finding

On April 22, Permiso provided their perspective of CrowdStrike’s recent publication on LemonDuck malware shifting targeting to container and cloud technologies in the CSO Online article “Cryptomining botnet targeting Docker on Linux systems”.

READ MORE

Fist Bump
Company
paul
jason

Paul Nguyen & Jason Martin

18 Jan 2022

Former FireEye Executives Emerge from Stealth with $10M Seed Round to Tackle Cloud Detection and Response

Permiso.io provides runtime visibility for identities in the public cloud, giving engineering and security teams a holistic view of their cloud environments.

READ MORE

1

Search

Choose Category

Company
Security
News