Information security
fromSecuritymagazine
1 week agoSecurity Vendors, Fortune 500 Companies Exposed and Exploited
Exposed training applications in customer-managed enterprise clouds are actively exploited, with malicious artifacts, obfuscated scripts, and connections to privileged cloud identities enabling lateral movement.