
Sign up to save your podcasts
Or
In this episode of Threat Vector, host David Moulton is joined by Nathaniel Quist, Manager of Cloud Threat Intelligence at Palo Alto Networks’ Cortex. Together, they break down a large-scale cloud extortion campaign that exposed over 90,000 credentials across more than 1,100 cloud accounts. Quist shares how a single misconfiguration led to a wide-scale breach, why identity and access management remains a critical weak point, and how automation is changing the speed and style of cloud-native threats. Learn how to build a solid cloud posture, detect threats faster, and stay ahead of evolving extortion tactics.
From the show:
Leaked Environment Variables Allow Large-Scale Extortion Operation in Cloud Environments
Episode 36: Staying Ahead of Cloud Attacks
RSAC Talk
Join the conversation on our social media channels:
About Threat Vector
Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.
The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.
Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.
Palo Alto Networks
Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com
4.9
3131 ratings
In this episode of Threat Vector, host David Moulton is joined by Nathaniel Quist, Manager of Cloud Threat Intelligence at Palo Alto Networks’ Cortex. Together, they break down a large-scale cloud extortion campaign that exposed over 90,000 credentials across more than 1,100 cloud accounts. Quist shares how a single misconfiguration led to a wide-scale breach, why identity and access management remains a critical weak point, and how automation is changing the speed and style of cloud-native threats. Learn how to build a solid cloud posture, detect threats faster, and stay ahead of evolving extortion tactics.
From the show:
Leaked Environment Variables Allow Large-Scale Extortion Operation in Cloud Environments
Episode 36: Staying Ahead of Cloud Attacks
RSAC Talk
Join the conversation on our social media channels:
About Threat Vector
Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.
The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.
Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.
Palo Alto Networks
Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. http://paloaltonetworks.com
1,976 Listeners
365 Listeners
626 Listeners
366 Listeners
176 Listeners
1,006 Listeners
312 Listeners
408 Listeners
7,879 Listeners
166 Listeners
189 Listeners
314 Listeners
74 Listeners
127 Listeners
43 Listeners