Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes

Cyber Security

Dec 10, 2025The Hacker NewsCloud Security / Threat Detection

Cloud security is changing. Attackers are no longer just breaking down the door; they are finding unlocked windows in your configurations, your identities, and your code.

Standard security tools often miss these threats because they look like normal activity. To stop them, you need to see exactly how these attacks happen in the real world.

Next week, the Cortex Cloud team at Palo Alto Networks is hosting a technical deep dive to walk you through three recent investigations and exactly how to defend against them.

Secure your spot for the live session ➜

What Experts Will Cover

This isn’t a high-level overview. We are looking at specific, technical findings from the field. In this session, our experts will break down three distinct attack vectors that are bypassing traditional security right now:

  1. AWS Identity Misconfigurations: We will show how attackers abuse simple setup errors in AWS identities to gain initial access without stealing a single password.
  2. Hiding in AI Models: You will see how adversaries mask malicious files in production by mimicking the naming structures of your legitimate AI models.
  3. Risky Kubernetes Permissions: We will examine “overprivileged entities”—containers that have too much power—and how attackers exploit them to take over infrastructure.

We won’t just talk about the problems; we will show you the mechanics of the attacks. Register now to see the full breakdown of these threats.

Why This Matters for Your Team

The core issue with these threats is the visibility gap. Often, the Cloud team builds the environment, and the SOC (Security Operations Center) monitors it, but neither side sees the full picture.

In this webinar, we will demonstrate how Code-to-Cloud detection fixes this. We will show you how to use runtime intelligence and audit logs to spot these threats early.

The Takeaway

By the end of this session, you will have actionable insights on how to:

  • Audit your cloud logs for “invisible” intruders.
  • Clean up risky permissions in Kubernetes.
  • Apply AI-aware controls to protect your development pipeline.

Don’t wait until you find these vulnerabilities in a breach report. Join us next week and get the knowledge you need to close the gaps.

Register for the Webinar ➜

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.