Visible to the public Attackers are using cloud services to mask attack origin and build false trustConflict Detection Enabled

TitleAttackers are using cloud services to mask attack origin and build false trust
Publication TypeMagazine Article
Year of Publication2018
AuthorsJames Sanders
MagazineTech Republic
EditionSecurity
Date Published12/19/2018
KeywordsArticles of Interest, C3E 2019, cloud services, Cognitive Security, Cognitive Security in Cyber, Hacking, Malware
Abstract

According to a report released by Menlo Security, the padlock in a browser's URL bar gives users a false sense of security as cloud hosting services are being used by attackers to host malware droppers. The use of this tactic allows attackers to hide the origin of their attacks and further evade detection. The exploitation of trust is a major component of such attacks.

URLhttps://www.techrepublic.com/article/attackers-are-using-cloud-services-to-mask-attack-origin-and-bu...
Citation Keynode-62456