Cyberside Chats: Cybersecurity Insights from the Experts

Abandoned S3 Buckets – A Goldmine for Hackers


Listen Later

Do you think your old cloud storage is harmless? Think again. This week on Cyberside Chats, Sherri and Matt dive into shocking new research from Watchtowr that reveals how hackers can take over abandoned Amazon S3 buckets—and use them to infiltrate government agencies, Fortune 500 companies, and critical infrastructure. We’ll break down real-world examples of how this risk can be exploited, including malware-laced software updates, hijacked VPN configurations, and compromised open-source dependencies. Plus, we’ll share practical strategies to protect your organization from this growing cybersecurity threat!

Links & Resources: 

  • Watchtowr’s Research on Abandoned S3 Buckets: https://labs.watchtowr.com/8-million-requests-later-we-made-the-solarwinds-supply-chain-attack-look-amateur/ 
    • How Encryption Works by Sherri: https://www.youtube.com/watch?v=ALsXbShTWJk 
      • LMG Security’s Cloud Security Audits: https://www.LMGsecurity.com/services/advisory-compliance/cloud-security-assessment/ 
      • Like what you heard? Subscribe to Cyberside Chats for more expert cybersecurity insights every week. 

        #cybersecurity #databreach #AWS #S3 #CISO #Cloud #AWSsecurity #Hackers #Infosec #IncidentResponse

         

        ...more
        View all episodesView all episodes
        Download on the App Store

        Cyberside Chats: Cybersecurity Insights from the ExpertsBy Chatcyberside