Magzter GOLDで無制限に

Magzter GOLDで無制限に

10,000以上の雑誌、新聞、プレミアム記事に無制限にアクセスできます。

$149.99
 
$74.99/年

試す - 無料

Native Data Breach: Anatomy Of A Cloud

Enterprise IT World

|

June 2019

Case study of a real-life example of a cloud-native data breach, how it evolved and how it possibly could have been avoided.

- Sanjay

Native Data Breach: Anatomy Of A Cloud

The company is a photo-sharing social media application, with over 20 million users. It stores over 1PB of user data within Amazon Web Services (AWS), and in 2018, it was the victim of a massive data breach that exposed nearly 20 million user records. This is how it happened.

Step 1: Compromising a legitimate user. Frequently, the first step in a data breach is that an attacker compromises the credentials of a legitimate user. In this incident, an attacker used a spear-phishing attack to obtain an administrative user’s credentials to the company’s environment.

Step 2: Fortifying access. After compromising a legitimate user, a hacker frequently takes steps to fortify access to the environment, independent of the compromised user. In this case, the attacker connected to the company’s cloud environment through an IP address registered in a foreign country and created API access keys with full administrative access.

Step 3: Reconnaissance. Once inside, an attacker then needs to map out what permissions are granted and what actions this role allows.

Enterprise IT World からのその他のストーリー

Enterprise IT World

Enterprise IT World

INDIA-JAPAN SEMICONDUCTOR FORUM CHARTS PATH FOR TRUSTED GLOBAL COLLABORATION

SEMICON Japan 2025 sets the stage for resilient, sustainable, and competitive semiconductor value chains through bilateral cooperation.

time to read

1 mins

January 2026

Enterprise IT World

Enterprise IT World

CYCOGNITO PREDICTS FIVE ATTACK-SURFACE TRENDS THAT WILL REDEFINE ENTERPRISE SECURITY IN 2026

AI-driven adversaries, regulatory complexity, and unmanaged assets will push organizations toward outcome-based cybersecurity strategies.

time to read

2 mins

January 2026

Enterprise IT World

Enterprise IT World

FROM ENABLER TO ARCHITECT: HOW CIOS ARE DRIVING DIGITAL-FIRST TRANSFORMATION

Technology is no longer a support function it's the strategic engine powering growth and resilience. CIOs like Rajeev Pradhan are reimagining legacy systems, embedding responsible Al, and building cyber-secure frameworks to thrive amid disruption. His roadmap offers a blueprint for enterprises determined not just to adapt but to lead in a digital-first world.

time to read

9 mins

January 2026

Enterprise IT World

Enterprise IT World

Exotel's Al-Driven Turnaround in FY25

Exotel has scripted a remarkable comeback in FY2024-25, transforming from an EBITDA loss of ₹31 crore in FY24 to a positive ₹34 crore in FY25.

time to read

1 min

January 2026

Enterprise IT World

Enterprise IT World

HEALING WITHOUT HARM: BUILDING DATA PRIVACY INTO AI-POWERED HEALTHCARE

AI is transforming healthcare-from diagnostics to drug discovery-at an unprecedented scale. But innovation without trust is fragile. This story explores why embedding privacy into AI systems is not just a compliance requirement but a moral imperative for sustainable healthcare transformation.

time to read

2 mins

January 2026

Enterprise IT World

Enterprise IT World

2026 WILL BE THE YEAR OF COGNITIVE THREATS: SEQRITE WARNS OF HUMAN-MIMICKING CYBERATTACKS

India Cyber Threat Report 2026 predicts Al-driven attacks that combine intelligence and automation, demanding a new era of cognitive resilience.

time to read

2 mins

January 2026

Enterprise IT World

Enterprise IT World

WHY AI ALONE WON'T SAVE MALAYSIAN BUSINESSES FROM CYBERCRIME

AI is a powerful ally, not a lone savior. True cyber resilience demands human insight, layered defenses and continuous vigilance.

time to read

2 mins

January 2026

Enterprise IT World

Enterprise IT World

CYBERCRIME'S NEXT FRONTIER: WHY 2026 COULD BE THE MOST DANGEROUS YEAR YET

From autonomous AI hackers to deepfakes and wearable data theft, experts warn that cyber threats are evolving faster than defences.

time to read

1 mins

January 2026

Enterprise IT World

Enterprise IT World

2026: THE YEAR INTELLIGENT ENTERPRISES MOVE FROM ADOPTION TO ORCHESTRATION

Workforce readiness will become a C-suite survival metric. Enterprises that foster continuous learning and effective human-machine collaboration will gain a decisive edge.

time to read

1 mins

January 2026

Enterprise IT World

Enterprise IT World

COFORGE BETS BIG ON AI: ACQUIRES ENCORA TO BUILD A US$2.5 BILLION ENGINEERING POWERHOUSE

The landmark deal positions Coforge as a global leader in Al-driven engineering, creating a scaled enterprise core of Al, Cloud, and Data services for the new era.

time to read

3 mins

January 2026

Translate

Share

-
+

Change font size