ํŒŸ์บ์ŠคํŠธ

CROC News: Ninjas, Grand Theft AI, and Backlogged CVEs

๐ŸŽ™๏ธ All that's ๐Ÿ”ฅ in the cloud: From logging and cloud attacks to NVD backlog updates.

what's on today's agenda? 1๏ธโƒฃ Discover how logging bypass made password-spray attacks undetectable. 2๏ธโƒฃ Learn about the latest way attackers are monetizing cloud access - by selling access to other people's AI models. 3๏ธโƒฃ NVD's ongoing backlog - Hear about how the industry is dealing with it.

Crying Out Cloud๋Š” ๋‰ด์Šค๋ ˆํ„ฐ์ด๊ธฐ๋„ ํ•ฉ๋‹ˆ๋‹ค!

์•ˆ์ „ ๋ฐ ์ •๋ณด ์œ ์ง€: ์ตœ์‹  ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ ๋‰ด์Šค, ์‹ค์ œ ๊ณต๊ฒฉ ์ธ์‚ฌ์ดํŠธ ๋ฐ ์ „๋ฌธ๊ฐ€ ์ง€์นจ์„ ๋ฐ›์•„ ํ™˜๊ฒฝ์„ ๋ณดํ˜ธํ•˜์‹ญ์‹œ์˜ค.

  • ๊ฒŒ์ž„์˜ ํŒ๋„๋ฅผ ๋ฐ”๊พธ๋Š” ๋‰ด์Šค

    ์—…๊ณ„๋ฅผ ๋’คํ”๋“ค๊ณ  ์žˆ๊ณ  ์—ฌ๋Ÿฌ๋ถ„์˜ ๊ด€์‹ฌ์ด ํ•„์š”ํ•œ ์ตœ์‹  ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ ์ทจ์•ฝ์„ฑ๊ณผ ํ˜์‹ ์— ๋Œ€ํ•œ ์š”์•ฝ์ž…๋‹ˆ๋‹ค.

  • ๊ณ ์œ ํ•œ Wiz ์ธ์‚ฌ์ดํŠธ

    ์—ฐ๊ตฌ ๋ฐ์ดํ„ฐ ๋‚ด๋ถ€ ์‚ดํŽด๋ณด๊ธฐ - ์‹ค์ œ ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ์—์„œ ํƒ์ง€ํ•œ ์‹ค์ œ ๊ณต๊ฒฉ ๊ฒฝ๋กœ์˜ ํ†ต๊ณ„๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ํ•ฉ๋‹ˆ๋‹ค.

  • ์‹ค์ „ ํ…Œ์ŠคํŠธ๋ฅผ ๊ฑฐ์นœ ์กฐ์–ธ

    ํšŒ์‚ฌ์—์„œ ๋ฐ์ดํ„ฐ ์นจํ•ด๋ฅผ ๋ฐฉ์ง€ํ•˜๋Š” ๋ฐฉ๋ฒ•๊ณผ ์ „๋ฐ˜์ ์ธ ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ ์ „๋žต์„ ๊ฐœ์„ ํ•˜๋Š” ๋ฐฉ๋ฒ•์— ๋Œ€ํ•œ ์œ„ํ˜‘ ์—ฐ๊ตฌ ํŒ€์˜ ํŒ์ž…๋‹ˆ๋‹ค.

ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ์˜ ์ตœ์‹  ์—…๋ฐ์ดํŠธ๋ฅผ ๋ฐ›์€ ํŽธ์ง€ํ•จ์œผ๋กœ ์ง์ ‘ ๋ฐ›์œผ๋ ค๋ฉด ๋“ฑ๋กํ•˜์‹ญ์‹œ์˜ค.

Wiz๊ฐ€ ๊ท€ํ•˜์˜ ๊ฐœ์ธ ๋ฐ์ดํ„ฐ๋ฅผ ์ฒ˜๋ฆฌํ•˜๋Š” ๋ฐฉ๋ฒ•์— ๋Œ€ํ•œ ์ž์„ธํ•œ ๋‚ด์šฉ์€ ๋‹ค์Œ์„ ์ฐธ์กฐํ•˜์‹ญ์‹œ์˜ค. ๊ฐœ์ธ์ •๋ณด์ฒ˜๋ฆฌ๋ฐฉ์นจ.