Threat Advisories:
Highlights of Our CISO Dinner
Upgrading struggling vulnerability management programs to Threat Exposure Management, with Host, CISO Al Lindseth formerly from Plains All American Pipeline and PWC - 6 minute podcast
0:00
0:00
👥 Play Count: Loading...

Leaked Environment Variables Fuel Cloud Data Extortion

Red | Attack Report
Download PDF

A sophisticated extortion campaign targeted cloud environments, leveraging the scalability of cloud platforms to exploit exposed environment variable files containing sensitive credentials. This operation compromised 110,000 domains, uncovering over 90,000 unique environment variables, including 7,000 access keys linked to cloud services and 1,500 associated with social media accounts.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox