{"id":2379,"date":"2025-05-12T17:02:38","date_gmt":"2025-05-12T17:02:38","guid":{"rendered":"https:\/\/thecloudmarathoner.com\/?p=2379"},"modified":"2025-05-30T15:59:00","modified_gmt":"2025-05-30T15:59:00","slug":"hack-the-cloud-attackers-love-blind-spots-break-their-hearts","status":"publish","type":"post","link":"https:\/\/thecloudmarathoner.com\/index.php\/2025\/05\/12\/hack-the-cloud-attackers-love-blind-spots-break-their-hearts\/","title":{"rendered":"Hack the Cloud: Attackers Love Blind Spots, Break Their Hearts!"},"content":{"rendered":"\n<p>Hello Cloud Marathoner friends,<\/p>\n\n\n\n<p>Last week, we had a very interesting session focused on cybersecurity.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"379\" src=\"\/wp-content\/uploads\/2025\/05\/image-1024x379.png\" alt=\"\" class=\"wp-image-2380\" srcset=\"\/wp-content\/uploads\/2025\/05\/image-1024x379.png 1024w, \/wp-content\/uploads\/2025\/05\/image-300x111.png 300w, \/wp-content\/uploads\/2025\/05\/image-768x284.png 768w, \/wp-content\/uploads\/2025\/05\/image-1200x444.png 1200w, \/wp-content\/uploads\/2025\/05\/image.png 1431w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p>Our guest speaker <a href=\"https:\/\/www.linkedin.com\/in\/ACoAAAAJrfkBqnmdDN84TRjK9DjAnGSUb6-eElo\"><\/a><a href=\"https:\/\/www.linkedin.com\/in\/briancontos\/\">Brian Contos<\/a>, shared his expertise on the following critical cybersecurity topics:<br><br>\u2705 Real-life stories from the trenches, drawn from years of cloud-based incident response.<br>\u2705 Exploration of various hacks to illustrate how breaches occur, what happens following a breach, and why organizations struggle to detect and respond.<br>\u2705 Mitigation strategies to proactively prepare for a breach, discover malicious activity, and respond effectively.<br><br>Malicious actors are counting on your passivity, your blind spots, and your inability to detect and respond to attacks in the cloud. Break their hearts!<br><br>Are you ready to learn more about hacking \ud83d\udd10 \u26d4 the cloud and how to prevent it \u2049\ufe0f \ud83e\udd14 <br>Tune in to hear and learn from real-world stories.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Real-World Examples<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Crypto mining<\/strong> on hacked security cameras in a casino.<\/li>\n\n\n\n<li><strong>$15 million wire fraud<\/strong> via compromised Office 365 and fake domains.<\/li>\n\n\n\n<li><strong>MongoDB ransomware<\/strong> where attackers lied about stealing data.<\/li>\n\n\n\n<li><strong>Robot hack demo<\/strong> showing how easy it is to control industrial devices with no authentication.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">When and Where<\/h4>\n\n\n\n<p>\ud83d\udcc5&nbsp;Date:&nbsp;May 7th, 2025<br>\ud83d\udd52&nbsp;Time:&nbsp;5 PM UTC<br>\ud83d\udccd&nbsp;Recorded <a href=\"https:\/\/www.youtube.com\/live\/aPOc6zBprU0\" target=\"_blank\" rel=\"noreferrer noopener\">session URL<\/a><br><br>Don&#8217;t miss out on this amazing hacking session. <br>Let&#8217;s make the cloud a safer place together!<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Hack The Cloud: Attackers Love Blind Spots, Break Their Hearts\" width=\"840\" height=\"473\" src=\"https:\/\/www.youtube.com\/embed\/aPOc6zBprU0?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n<div class=\"pvc_clear\"><\/div><p id=\"pvc_stats_2379\" class=\"pvc_stats all  \" data-element-id=\"2379\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p><div class=\"pvc_clear\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Hello Cloud Marathoner friends, Last week, we had a very interesting session focused on cybersecurity. Our guest speaker Brian Contos, shared his expertise on the following critical cybersecurity topics: \u2705 Real-life stories from the trenches, drawn from years of cloud-based incident response.\u2705 Exploration of various hacks to illustrate how breaches occur, what happens following a &hellip; <a href=\"https:\/\/thecloudmarathoner.com\/index.php\/2025\/05\/12\/hack-the-cloud-attackers-love-blind-spots-break-their-hearts\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Hack the Cloud: Attackers Love Blind Spots, Break Their Hearts!&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[49,39,54,15],"tags":[],"class_list":["post-2379","post","type-post","status-publish","format-standard","hentry","category-community-event","category-information-protection","category-multi-cloud","category-security-governance"],"_links":{"self":[{"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts\/2379","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/comments?post=2379"}],"version-history":[{"count":3,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts\/2379\/revisions"}],"predecessor-version":[{"id":2395,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts\/2379\/revisions\/2395"}],"wp:attachment":[{"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/media?parent=2379"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/categories?post=2379"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/tags?post=2379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}