Supply Chain Attacks in the Age of Cloud Computing: Risks, Mitigations, and the Importance of Securing Back Ends
Common Information
Type | Value |
---|---|
UUID | a13677f9-03af-418e-be9d-c49c7b7d03df |
Fingerprint | b4f1d9b2dcedc8df519d563f0569b3d19d94d466cd059d840c3003b41d8ce8da |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Dec. 15, 2020, 1:25 p.m. |
Added to db | April 14, 2024, 10:36 a.m. |
Last updated | Aug. 30, 2024, 10:47 p.m. |
Headline | Supply Chain Attacks in the Age of Cloud Computing: Risks, Mitigations, and the Importance of Securing Back Ends |
Title | Supply Chain Attacks in the Age of Cloud Computing: Risks, Mitigations, and the Importance of Securing Back Ends |
Detected Hints/Tags/Attributes | 56/3/26 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 154 | us-cert.cisa.gov |
|
Details | Domain | 175 | www.zdnet.com |
|
Details | Domain | 3 | www.aljazeera.com |
|
Details | Domain | 177 | blog.trendmicro.com |
|
Details | Domain | 604 | www.trendmicro.com |
|
Details | Domain | 251 | www.bleepingcomputer.com |
|
Details | Domain | 73 | techcrunch.com |
|
Details | Domain | 27 | about.fb.com |
|
Details | Domain | 39 | www.helpnetsecurity.com |
|
Details | File | 252 | www.cs |
|
Details | File | 4 | what-is-zero-trust-a-model-for-more-effective-security.html |
|
Details | Url | 3 | https://us-cert.cisa.gov/ncas/alerts/aa20-010a. |
|
Details | Url | 3 | https://www.zdnet.com/article/cisco-releases-fixes-for-critical-vpn-router-vulnerabilities/. |
|
Details | Url | 3 | https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/securing-the-pandemic- |
|
Details | Url | 5 | https://us-cert.cisa.gov/ncas/alerts/aa20-302a. |
|
Details | Url | 6 | https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/coronavirus-used-in-spam- |
|
Details | Url | 3 | https://www.csoonline.com/article/3247848/what-is-zero-trust-a-model-for-more-effective-security.html |
|
Details | Url | 1 | https://www.aljazeera.com/news/2020/4/3/were-watching-you-covid-19-surveillance-raises- |
|
Details | Url | 6 | https://blog.trendmicro.com/trendlabs-security-intelligence/operation- |
|
Details | Url | 4 | https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/operation- |
|
Details | Url | 3 | https://www.bleepingcomputer.com/news/security/alleged-source-code-of-cobalt-strike- |
|
Details | Url | 3 | https://techcrunch.com/2020/08/19/coronavirus-albion-security-flaws-app/. |
|
Details | Url | 1 | https://about.fb.com |
|
Details | Url | 3 | https://www.zdnet.com/article/security-flaws-in-banking-apps-expose-data-and-source-code/. |
|
Details | Url | 3 | https://www.helpnetsecurity.com/2020/06/05/api-security-threats/. |
|
Details | Url | 4 | https://www.trendmicro.com/vinfo/us/security/news/security-technology/container-security- |