Abandoned S3 Buckets – A Goldmine for Hackers
Do you think your old cloud storage is harmless? Think again. This week on Cyberside Chats, Sherri and Matt dive into shocking new research from Watchtowr that reveals how hackers can take over abandoned Amazon S3 buckets—and use them to infiltrate government agencies, Fortune 500 companies, and critical infrastructure.
We’ll break down real-world examples of how this risk can be exploited, including malware-laced software updates, hijacked VPN configurations, and compromised open-source dependencies. Plus, we’ll share practical strategies to protect your organization from this growing cybersecurity threat!
Links & Resources:
- Watchtowr’s Research on Abandoned S3 Buckets
- How Encryption Works by Sherri
- LMG Security’s Cloud Security Audits
Don't forget to subscribe to Cyberside Chats for more expert cybersecurity insights every week.