CROC Talks - Securing DBs, Cloud Threat Intel, and Detection- Special Guest: Snowflakes’ Haider Dost
Hosts Alon and Eden interview Haider Dost from Snowflake on securing databases, cloud threat intelligence, and more
Podcast
👀 Here's a sneak peek at today’s episode:
🔒 Stay ahead of the game! LAPSUS$ Hackers may be making waves. Two members of this notorious group faced consequences in the UK, but shockingly, they continued their hacking activities even while under house arrest.
🤖 Data Poisoning in AI Training is a growing concern. Hackers can manipulate the data used to train AI models, introducing risks and vulnerabilities. Validating data integrity and randomizing data ingestion times are useful mitigations against this threat.
💻 The WinRAR Vulnerability (CVE-2023-38831)! This flaw was exploited against crypto-traders to infect their devices with malware, but should be considered a low concern for cloud customers unless using virtual desktops.
https://gizmodo.com/hackers-lapsus-uber-nvidia-rockstar-games-microsoft-1850766324 https://www.bbc.com/news/technology-66549159 https://www.cisa.gov/resources-tools/resources/review-attacks-associated-lapsus-and-related-threat-groups-executive-summary https://www.cisa.gov/sites/default/files/2023-08/CSRBLapsus%24508c.pdf https://duo.com/decipher/lapsususd-analysis-finds-need-for-better-iam-mfa-deployments https://www.youtube.com/watch?v=h9jf1ikcGyk https://arxiv.org/pdf/2302.10149.pdf https://www.blackhat.com/us-23/briefings/schedule/#poisoning-web-scale-training-datasets-is-practical-32112 https://arstechnica.com/security/2023/08/winrar-0-day-that-uses-poisoned-jpg-and-txt-files-under-exploit-since-april/
Hosts Alon and Eden interview Haider Dost from Snowflake on securing databases, cloud threat intelligence, and more
Tune in to the latest episode of #CryingOutCloud for insights on AI, data privacy, and the latest cloud security news!
RCE Vulnerability in Ollama explained
Manténgase a salvo e informado: Reciba las últimas noticias de seguridad en la nube, inspecciones de ataque real y guía de expertos para proteger su entorno.
Nuestro resumen de las últimas vulnerabilidades e innovaciones de seguridad en la nube que están sacudiendo la industria y necesitan su atención.
Un vistazo interno a nuestros datos de investigación - basado en estadísticas de rutas de ataque reales que detectamos en entornos de nube reales.
Consejos de nuestro equipo de Investigación en Amenazas sobre cómo prevenir violaciones de datos en su empresa y cómo mejorar su estrategia general de seguridad en la nube.
Regístrate para recibir las últimas actualizaciones en seguridad en la nube directamente a tu bandeja de entrada