With the rise of ransomware and other vulnerabilities, it has been an eventful year in cybersecurity. In part two, Trend Micro researchers discussed these issues at length today as well as their implications on a global scale for both businesses large (and small).
In the last and final part of the series, Trend Micro researchers talk about how malicious actors take advantage of cloud tunnelling and how misconfiguration remains a headache for most organization.
Cloud technologies are powerful tools that can be used to enhance an organization’s efficiency and provide greater security. However, the lack of visibility into deployed assets by IT teams and security staff may present challenges when managing these systems. It leaves room for attackers who use unconventional methods at their disposal—attacks that would otherwise go unnoticed without full access monitoring capabilities.
Read more…
Source: Trend Micro
Related story: Attack Surface Management 2022 Midyear Review – Part 2