Researchers Find New Approach to Attacking Cloud Infrastructure

Public cloud infrastructure presents security teams with a new invisible management layer, creating new security challenges that demand better understanding. Many organizations don’t properly understand the cloud identity and access management layer and often fail to secure it.

Such misunderstandings usually lead to dangerous misconfigurations that can drive customer risk; for example, in the case of the recent Capital One breach. Current security practices and controls are not sufficient to mitigate the risk posed by misunderstanding of the public cloud, explain Igal Gofman, XM head of security research, and Yaron Shani, XM senior security researcher.

Book a demo today to see GlobalDots is action.

Optimize cloud costs, control spend, and automate for deeper insights and efficiency.

Book a demo today to see GlobalDots is action.

When Gofman and Shani began to research cloud-focused threats, they realized many popular defense mechanisms focus on specific attack vectors: for example, brute force protections against cloud services and applications like password spray tools or AWS recon tools. Post-breach defense is usually based on different user activities and machine learning algorithms.

A digital background featuring a lock icon surrounded by circular and square patterns in shades of blue.

Read more: Dark Reading

Latest Articles

MVP to Production-Grade: How to Fix Scaling Bottlenecks Before They Break You

This webinar & podcast are built for founders, CTOs, and VPs navigating the critical shift from MVP to production-grade infrastructure. Learn how to avoid scaling pitfalls, build resilient systems without over-hiring, and make the right decisions now to support rapid, sustainable growth. Join us to unlock practical strategies and real-world lessons from companies that have […]

Ganesh The Awesome
12th June, 2025
SAST vs DAST vs IAST: Application Security Testing Explained

A great majority of security flaws are introduced during development, but most aren’t found until much later, when they’re costlier to fix. That delay is precisely why application security testing (AKA AppSec testing) needs to occur early, frequently, and at multiple layers. SAST, DAST, and IAST are designed to do just that. But too often, […]

Shalom Carmel
10th June, 2025
Application Security Frameworks: A Practical Guide to OWASP SAMM, ASVS, and More

As teams ship faster in cloud-native environments, the attack surface grows just as quickly. This makes application security a moving target. Yet most AppSec programs still feel like patchwork. Teams rely on ad hoc policies, chase compliance, or struggle to scale controls across the SDLC. Application security frameworks change that. They give you a structure […]

Shalom Carmel
10th June, 2025

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.

    GlobalDots' industry expertise proactively addressed structural inefficiencies that would have otherwise hindered our success. Their laser focus is why I would recommend them as a partner to other companies

    Marco Kaiser
    Marco Kaiser

    CTO

    Legal Services

    GlobalDots has helped us to scale up our innovative capabilities, and in significantly improving our service provided to our clients

    Antonio Ostuni
    Antonio Ostuni

    CIO

    IT Services

    It's common for 3rd parties to work with a limited number of vendors - GlobalDots and its multi-vendor approach is different. Thanks to GlobalDots vendors umbrella, the hybrid-cloud migration was exceedingly smooth

    Motti Shpirer
    Motti Shpirer

    VP of Infrastructure & Technology

    Advertising Services