CloudSec Academy

Willkommen bei der CloudSec Academy, Ihrem Leitfaden zum Navigieren in der Buchstabensuppe der Cloud-Sicherheitsakronyme und des Branchenjargons. Heben Sie sich von der Masse ab mit klaren, prägnanten und fachmännisch gestalteten Inhalten, die von den Grundlagen bis hin zu Best Practices reichen.

Was ist Schatten-IT? Ursachen, Risiken und Beispiele

Wiz Expertenteam

Schatten-IT ist die unbefugte Nutzung von IT-Diensten, -Anwendungen und -Ressourcen durch einen Mitarbeiter, die nicht von der IT-Abteilung eines Unternehmens kontrolliert werden oder für diese sichtbar sind.

Source Code Leaks: Risks, Examples, and Prevention

Wiz Expertenteam

In this blog post, we’ll explore security measures and continuous monitoring strategies to prevent these leaks, mitigating the risks posed by security vulnerabilities, human error, and attacks.

LLM Security for Enterprises: Risks and Best Practices

Wiz Expertenteam

LLM models, like GPT and other foundation models, come with significant risks if not properly secured. From prompt injection attacks to training data poisoning, the potential vulnerabilities are manifold and far-reaching.

Data Leakage: Risiken, Ursachen und Prävention

Unter Datenlecks versteht man die unkontrollierte Exfiltration von Unternehmensdaten an Dritte. Dies geschieht auf verschiedene Weise wie falsch konfigurierte Datenbanken, schlecht geschützte Netzwerkserver, Phishing-Angriffe oder sogar unvorsichtiger Umgang mit Daten.

The Threat of Adversarial AI

Wiz Expertenteam

Adversarial artificial intelligence (AI), or adversarial machine learning (ML), is a type of cyberattack where threat actors corrupt AI systems to manipulate their outputs and functionality.

What is LLM Jacking?

LLM jacking is an attack technique that cybercriminals use to manipulate and exploit an enterprise’s cloud-based LLMs (large language models).

What is Credential Access (TA0006)?

Wiz Expertenteam

Credential access is a cyberattack technique where threat actors access and hijack legitimate user credentials to gain entry into an enterprise's IT environments.

Was ist ein Prompt-Injection-Angriff?

Prompt-Injection-Angriffe sind eine KI-Sicherheitsbedrohung, bei der ein Angreifer die Eingabeaufforderung in NLP-Systemen (Natural Language Processing) manipuliert, um die Ausgabe des Systems zu beeinflussen.

What is a Data Poisoning Attack?

Wiz Expertenteam

Data poisoning is a kind of cyberattack that targets the training data used to build artificial intelligence (AI) and machine learning (ML) models.

Dark AI Explained

Wiz Expertenteam

Dark AI involves the malicious use of artificial intelligence (AI) technologies to facilitate cyberattacks and data breaches. Dark AI includes both accidental and strategic weaponization of AI tools.

Azure Security Risks & Mitigation Steps

Wiz Expertenteam

This article offers an extensive examination of Azure environments’ most pressing security risks along with suggested approaches for effectively mitigating these challenges.

Remote Code Execution Attacks Explained

Wiz Expertenteam

Remote code execution refers to a security vulnerability through which malicious actors can remotely run code on your systems or servers.

Cloud Sprawl Explained

Wiz Expertenteam

Cloud sprawl is a phenomenon that involves the unmanaged growth of cloud-based resources and services.

Data Exfiltration Explained

Wiz Expertenteam

Data exfiltration is when sensitive data is accessed without authorization or stolen. Just like any data breach, it can lead to financial loss, reputational damage, and business disruptions.

Lateral Movement Explained

Wiz Expertenteam

Lateral movement is a cyberattack technique used by threat actors to navigate a network or environment in search of more valuable information after gaining initial access.

Credential Stuffing Explained

Wiz Expertenteam

Credential stuffing is a type of cyberattack where automated tools are used to repeatedly inject stolen username/password combinations into various services to gain access to legitimate users’ accounts in addition to those that were originally breached.

Cross-site scripting

Wiz Expertenteam

Cross-site scripting (XSS) is a vulnerability where hackers insert malicious scripts inside web applications with the aim of executing them in a user’s browser.

What is a man-in-the-middle attack?

Wiz Expertenteam

A man-in-the-middle (MitM) attack is a type of cyberattack where a hacker intercepts data transferred between two parties.

Brute Force Attacks

Wiz Expertenteam

A brute force attack is a cybersecurity threat where a hacker attempts to access a system by systematically testing different passwords until a correct set of credentials is identified.

AWS Security Risks

Wiz Expertenteam

This article examines common AWS security challenges, including identity and access control gaps, data exposure risks, and monitoring blind spots.

Shadow Data

Wiz Expertenteam

Shadow data is any data that is created, stored, or shared outside of an organization's formal IT environment and management policies.

What is Privilege Escalation?

Privilege escalation is when an attacker exploits weaknesses in your environment or infrastructure to gain higher access and control within a system or network.

Rootkits Explained

Wiz Expertenteam

A rootkit is a suite of software designed to grant a cyberattacker privileged access while disguising the invasion to evade detection.

What is a Reverse Shell Attack?

Wiz Expertenteam

A reverse shell attack is a type of cyberattack where a threat actor establishes a connection from a target machine (the victim's) to their machine.

What is an Attack Surface?

Wiz Expertenteam

An attack surface is refers to all the potential entry points an attacker could exploit to gain unauthorized access to a system, network, or data.

8 All-Too-Common Cloud Vulnerabilities

Wiz Expertenteam

We outline the most common cloud vulnerabilities with real-life examples of attacks that exploited these vulnerabilities, and simple steps you can take to mitigate them.