DISCARDED: Tales From the Threat Research Trenches

Under Siege: How Hackers Exploit Cloud Vulnerabilities


Listen Later

Send us fan mail!

Hello to all our Cyber Ghosts! Join host Selena Larson  as she chats with Eilon Bendet– Cloud Threat Researcher from Proofpoint. ​​From account takeovers to state-sponsored hacks, they uncover how cybercriminals are outsmarting traditional defenses – and why even multi-factor authentication might not be enough to keep them out. 

Together, they discuss the complexities of cloud threat detection, including the role of User and Entity Behavior Analytics (UEBA) in identifying suspicious activities and preventing account takeovers (ATO). Eilon breaks down two primary ATO threat vectors—credential-based brute force attacks and precision-targeted phishing campaigns. 

Also discussed:
  • how these groups exploit cloud environments
  • concerning trends such as the rise of reverse proxy-based toolkits and MFA bypass techniques
  • the importance of identity-focused defense strategies and how threat actors customize tools to infiltrate cloud systems, steal data, and monetize compromised accounts

Resources mentioned:
MACT or malicious applications blog: https://www.proofpoint.com/us/blog/cloud-security/revisiting-mact-malicious-applications-credible-cloud-tenants

For more information about Proofpoint, check out our website.

Subscribe & Follow:
Don't miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.
...more
View all episodesView all episodes
Download on the App Store

DISCARDED: Tales From the Threat Research TrenchesBy Proofpoint

  • 4.9
  • 4.9
  • 4.9
  • 4.9
  • 4.9

4.9

55 ratings


More shows like DISCARDED: Tales From the Threat Research Trenches

View all
Hacked by Hacked

Hacked

186 Listeners

Risky Business by Patrick Gray

Risky Business

372 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,026 Listeners

Click Here by Recorded Future News

Click Here

417 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,069 Listeners

Three Buddy Problem by Security Conversations

Three Buddy Problem

61 Listeners

Risky Bulletin by risky.biz

Risky Bulletin

44 Listeners

Adversary Universe Podcast by CrowdStrike

Adversary Universe Podcast

77 Listeners

Only Malware in the Building by DISCARDED | N2K Networks

Only Malware in the Building

8 Listeners