Skip to main content
Back to Blogs

Intelligence Digest

Microsoft Azure – Skyhigh Security Intelligence Digest

May 25, 2023

By Rodman Ramezanian - Global Cloud Threat Lead, Skyhigh Security

Research conducted by Microsoft revealed how the nation-state attackers gained access to vulnerable, insecure on-site resources as well as cloud environments that enabled them to inflict extensive damage to the target’s infrastructure.

It should come as no surprise that today’s sophisticated hackers are increasingly focusing on cloud environments to further their agendas. Irrespective of geopolitics playing a part in this nation-state actor’s story, we continue to see exploitation of remote access tools as a prime initial access vector into target environments.

As most organizations continue their evolution into the cloud, hybrid infrastructures provide flexibility to cater for requirements that cannot be fulfilled in cloud-only ecosystems, or may not yet be ready to be cloudified. Maintaining on-premise and cloud-native resources (presumably in a synchronized, hybrid fashion) enables these enterprises to enjoy the best of both worlds until more efficient methods can mature for them. What can be done?

Learn more about solutions in Skyhigh Security’s latest Intel Digest.

Back to Blogs

Related Content

News thumbnail
Industry Perspectives

Adopt ChatGPT Without Putting Your Business-Critical Data at Risk

Tony Frum - June 6, 2023

News thumbnail
Intelligence Digest

Microsoft Azure – Skyhigh Security Intelligence Digest

Rodman Ramezanian - May 25, 2023

News thumbnail
Industry Perspectives

Six Key Takeaways from RSA Conference 2023

Thyaga Vasudevan - May 17, 2023

Recent blogs

Industry Perspectives

Adopt ChatGPT Without Putting Your Business-Critical Data at Risk

Tony Frum - June 6, 2023

Intelligence Digest

Microsoft Azure – Skyhigh Security Intelligence Digest

Rodman Ramezanian - May 25, 2023

Industry Perspectives

Six Key Takeaways from RSA Conference 2023

Thyaga Vasudevan - May 17, 2023

Industry Perspectives

Minimizing Cloud-based Shadow IT Risks

Shawn Dappen - May 11, 2023