Page tree
Skip to end of metadata
Go to start of metadata

Resources on account hijacking attacks in the context of cloud security.

Table of Contents:

Below we have compiled publicly available sources from around the world that present views on Account Hijacking.

Perspectives on Account Hijacking

Case Studies

Specific Environments

Examples

Further Reading

  • Cloud Data BreachesResources on cloud data breaches and unauthorized data viewing, its implication and ways of prevention. 
  • Cloud Data LossResources on cloud data loss risks and prevention.
  • Account HijackingResources on account hijacking attacks in the context of cloud security.
  • Traffic HijackingResources on traffic hijacking threats and and the ways to defend against them.
  • API VulnerabilitiesResources on API security vulnerabilities in the context of cloud computing and cloud services.
  • Cloud Services AbuseAn overview of cloud computing services abuse and unauthorized use of cloud systems.
  • Shadow ITResources on traffic shadow IT practices, its extent, cost and implications on internet security.

Dome9: AWS Network Security and Identity Protection Made Simple

Visualize. Remediate. Enforce.

Start Free Trial

Visualize. Remediate. Enforce.

Bulletproof Security for AWS

  • No labels