AWS Gone Wild: How Attackers Exploit Your Cloud and How to Outsmart Them


Posted on in Presentations

Explore a real-world multi-stage AWS attack involving exposed IAM credentials, lateral movement via EC2, privilege escalation through federated session tokens, and persistent access using Lambda. Learn threat detection techniques and remediation strategies to secure cloud infrastructure. Ideal for cloud engineers and incident responders looking to strengthen AWS defenses against evolving threats.

Access This and Other RSAC Conference Presentations with Your Free RSAC Membership

Your RSAC Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.

Watch Now >>
Participants
Yonatan Khen

Speaker

Security Research Team Lead, Hunters


Share With Your Community