Infiltrating Defenses: Abusing VMware in MITRE’s Cyber Intrusion https://medium.com/mitre-engenuity/...vmware-in-mitres-cyber-intrusion-4ea647b83f5b Read there more! PS: This is related to previous thread: MITRE Response to Cyber Attack in One of Its R&D Networks https://www.wilderssecurity.com/thr...ber-attack-in-one-of-its-r-d-networks.453983/ I think we missed their second article, alas. Apologies for that. But you can still read it at: https://medium.com/mitre-engenuity/...the-anatomy-of-a-cyber-intrusion-080bddc679f3 So the three articles are: 1. Advanced Cyber Threats Impact Even the Most Prepared https://medium.com/mitre-engenuity/advanced-cyber-threats-impact-even-the-most-prepared-56444e980dc8 2. Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion https://medium.com/mitre-engenuity/...the-anatomy-of-a-cyber-intrusion-080bddc679f3 3. Infiltrating Defenses: Abusing VMware in MITRE’s Cyber Intrusion https://medium.com/mitre-engenuity/...vmware-in-mitres-cyber-intrusion-4ea647b83f5b
Interesting, but it's a bit complex to understand it all. It seems like securing cloud environments is not that easy. I suppose companies like ZScaler, CrowdStrike and Palo Alto Networks are specialized in this stuff. Of course you also have many others.