logo
Dates

Author


Conferences

Tags

Sort by:  

Authors: Maya Levine
2023-04-19

tldr - powered by Generative AI

Cloud breaches are becoming more sophisticated and attackers are learning about cloud-native tools and services. Real-time monitoring and trusted sources for images are critical for cloud security. Supply chain compromises and blind trust in dependencies are also major concerns.
  • Real-time monitoring is critical for detecting malicious activity using secrets
  • Malicious images can be planted in public repositories and trusted sources should be used
  • DDOS attacks are increasing and containers are being used to crowdsource participation
  • Supply chain compromises and blind trust in dependencies can lead to major security issues
  • Attackers are becoming more knowledgeable about cloud-native tools and services
  • Crypto mining attacks are low effort and high reward, and their scale is expected to increase