Anatomy of an Attack: Exposed keys to Crypto Mining
At Permiso, we find that the majority of incidents we discover or respond to, start with exposed access keys. Attackers leverage these keys to gain access, then setup a mechanism to establish persistence, perform reconnaissance, and complete their mission.
Cloud vendor supply chain risk - Forecast: Foggy with a chance of thunderstorms
Attackers are increasingly taking advantage of trusted vendor relationships to perform software and service based supply chain attacks. As cloud adoption continues to grow, we will see sophisticated threat actors like APT29 increase targeting of cloud vendors.
Permiso weighs in on CrowdStrike's LemonDuck malware finding
On April 22, Permiso provided their perspective of CrowdStrike’s recent publication on LemonDuck malware shifting targeting to container and cloud technologies in the CSO Online article “Cryptomining botnet targeting Docker on Linux systems”.
Former FireEye Executives Emerge from Stealth with $10M Seed Round to Tackle Cloud Detection and Response
Permiso.io provides runtime visibility for identities in the public cloud, giving engineering and security teams a holistic view of their cloud environments.