Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Music
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/8f/8b/4b/8f8b4b7c-0aef-e162-be28-476d9a9e7d36/mza_9900111694076175621.jpg/600x600bb.jpg
Detection Opportunities
CYBERWOX
9 episodes
6 days ago
Detection Opportunities is a podcast for security professionals who care about building resilient detection and response systems. Each episode explores real-world attacks, breaks down how signals become insights, and dives into the engineering mindset behind effective threat detection, investigation, and defense. Grounded in frontline experience across SIEM development, security operations, incident response, and threat hunting, this show brings a practical, systems-level lens to modern security engineering.
Show more...
Technology
RSS
All content for Detection Opportunities is the property of CYBERWOX and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Detection Opportunities is a podcast for security professionals who care about building resilient detection and response systems. Each episode explores real-world attacks, breaks down how signals become insights, and dives into the engineering mindset behind effective threat detection, investigation, and defense. Grounded in frontline experience across SIEM development, security operations, incident response, and threat hunting, this show brings a practical, systems-level lens to modern security engineering.
Show more...
Technology
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_nologo/43563165/43563165-1745889509474-7bb8047c5945c.jpg
How A Compromised AWS Lambda Function Led to a Phishing Attack | EP. 1
Detection Opportunities
12 minutes 30 seconds
6 months ago
How A Compromised AWS Lambda Function Led to a Phishing Attack | EP. 1

In this video, I’ll be going over detection opportunities at various stages of cloud security attacks.


Compromised Cloud Compute Credentials: Case Studies From the Wild


_____________

TIMESTAMPS

00:00 Intro

00:40 The Attack Case

02:12 The Attack Graph

02:44 The Attack Flow

03:06 Detection Opportunity 1: Enumeration/Reconnaissance/Discovery - Cloud Infrastructure Discovery

05:27 Detection Opportunity 2: Persistence - Create Cloud Account

08:19 Detection Opportunity 3: Impact - Resource Hijacking

09:54 Detection Opportunity 4: Defense Evasion - Indicator Removal

10:23 Detection Opportunity 5: Credential Access - Stealing an application access token

12:04: Conclusion



_____________

⚡️JOIN 6,000+ CWX MEMBERS ON DISCORD

📰 SUBSCRIBE TO THE CYBERWOX UNPLUGGED NEWSLETTER

🥶 CYBERWOX MERCH



_____________

🧬 CYBERWOX RESOURCES

🔹 Cyberwox Cybersecurity Notion Templates for planning your career

🔹 Cyberwox Best Entry-Level Cybersecurity Resume Template

🔹 Learn AWS Threat Detection with my LinkedIn Learning Course



_____________

📱 LET'S CONNECT

→ ⁠⁠IG⁠⁠

→ ⁠⁠Threads⁠⁠

→ ⁠⁠Substack⁠⁠

→ ⁠⁠Twitter⁠⁠

→ ⁠⁠Linkedin⁠⁠

→ ⁠⁠Tiktok⁠⁠

Email: day@cyberwox.com



_____________

⚠️DISCLAIMER

This description has some affiliate links, and I may receive a small commission for purchases made through these links. I appreciate your support!


Email: day@cyberwox.com

Detection Opportunities
Detection Opportunities is a podcast for security professionals who care about building resilient detection and response systems. Each episode explores real-world attacks, breaks down how signals become insights, and dives into the engineering mindset behind effective threat detection, investigation, and defense. Grounded in frontline experience across SIEM development, security operations, incident response, and threat hunting, this show brings a practical, systems-level lens to modern security engineering.