Unmasking Adversary Cloud Defense Evasion Strategies: Modify Cloud Compute Infrastructure Part 1
Tags
Common Information
Type | Value |
---|---|
UUID | d6e529eb-305a-456c-ad99-d6e0490325c9 |
Fingerprint | 3c234b90cdbe83c5 |
Analysis status | DONE |
Considered CTI value | 1 |
Text language | |
Published | May 6, 2024, 9:25 p.m. |
Added to db | Aug. 31, 2024, 1:10 a.m. |
Last updated | Sept. 23, 2024, 6:31 p.m. |
Headline | Overview of the Technique |
Title | Unmasking Adversary Cloud Defense Evasion Strategies: Modify Cloud Compute Infrastructure Part 1 |
Detected Hints/Tags/Attributes | 102/3/2 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 193 | ✔ | Cloud Chronicles | https://permiso.io/blog/rss.xml | 2024-08-30 22:08 |