Palo Alto Networks Webinar on Cloud Misconfigurations and Attack Vectors
Summary
Hide ▲
Show ▼
Palo Alto Networks' Cortex Cloud team is hosting a webinar to discuss three recent investigations into cloud security threats. The session will cover AWS identity misconfigurations, attackers hiding in AI models, and risky Kubernetes permissions. The goal is to provide technical insights into these attack vectors and demonstrate how to defend against them. The webinar aims to address the visibility gap between cloud teams and security operations centers (SOCs) and will showcase Code-to-Cloud detection methods to spot threats early. The webinar will provide actionable insights on auditing cloud logs, cleaning up Kubernetes permissions, and applying AI-aware controls to protect development pipelines.
Timeline
-
10.12.2025 13:54 1 articles · 12h ago
Palo Alto Networks Webinar on Cloud Misconfigurations and Attack Vectors
Palo Alto Networks' Cortex Cloud team is hosting a webinar to discuss three recent investigations into cloud security threats. The session will cover AWS identity misconfigurations, attackers hiding in AI models, and risky Kubernetes permissions. The goal is to provide technical insights into these attack vectors and demonstrate how to defend against them. The webinar aims to address the visibility gap between cloud teams and security operations centers (SOCs) and will showcase Code-to-Cloud detection methods to spot threats early.
Show sources
- Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes — thehackernews.com — 10.12.2025 13:54
Information Snippets
-
The webinar will cover three distinct attack vectors: AWS identity misconfigurations, attackers hiding in AI models, and risky Kubernetes permissions.
First reported: 10.12.2025 13:541 source, 1 articleShow sources
- Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes — thehackernews.com — 10.12.2025 13:54
-
AWS identity misconfigurations allow attackers to gain initial access without stealing passwords.
First reported: 10.12.2025 13:541 source, 1 articleShow sources
- Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes — thehackernews.com — 10.12.2025 13:54
-
Attackers mimic AI model naming structures to hide malicious files in production environments.
First reported: 10.12.2025 13:541 source, 1 articleShow sources
- Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes — thehackernews.com — 10.12.2025 13:54
-
Overprivileged Kubernetes containers can be exploited to take over infrastructure.
First reported: 10.12.2025 13:541 source, 1 articleShow sources
- Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes — thehackernews.com — 10.12.2025 13:54
-
The webinar will demonstrate Code-to-Cloud detection to improve visibility and early threat detection.
First reported: 10.12.2025 13:541 source, 1 articleShow sources
- Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes — thehackernews.com — 10.12.2025 13:54