<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Threat Vector | The Dangers of Misconfigurations in Threat Vector</title>
    <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-the-dangers-of-misconfigurations/ta-p/1000080</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat-Vector_Dangers-Misconfigurations_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/65031i122E7A4DBC27AFC5/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat-Vector_Dangers-Misconfigurations_palo-alto-networks.jpg" alt="Threat-Vector_Dangers-Misconfigurations_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this episode of &lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Threat Vector&lt;/FONT&gt;&lt;/STRONG&gt;, host David Moulton speaks with Margaret Kelley, a seasoned &lt;EM&gt;Digital Forensics and Incident Response Senior Consultant&lt;/EM&gt; at Palo Alto Networks Unit 42. With a deep expertise in cloud security, Margaret shares insights into the evolving landscape of cloud breaches and how organizations can defend against sophisticated attacks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 id="toc-hId-1367122179"&gt;&lt;FONT color="#FF6600"&gt;&lt;SPAN&gt;What You'll Learn&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;From misconfigurations to control plane vulnerabilities, the discussion covers the most critical aspects of securing cloud environments. Margaret's real-world examples provide listeners with valuable lessons on how attackers exploit cloud vulnerabilities and what defenders can do to stay ahead. Tune in to learn practical strategies for fortifying your cloud defenses and keeping your organization secure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 id="toc-hId-1367122179"&gt;&lt;FONT color="#FF6600"&gt;&lt;SPAN&gt;Read More&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;Margaret’s most recent articles are:&amp;nbsp;&lt;A href="https://unit42.paloaltonetworks.com/large-scale-cloud-extortion-operation/" target="_blank" rel="noopener"&gt;&lt;EM&gt;Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud Environments&lt;/EM&gt;&lt;/A&gt; and &lt;A href="https://unit42.paloaltonetworks.com/shinyhunters-ransomware-extortion/" target="_blank" rel="noopener"&gt;&lt;EM&gt;Bling Libra’s Tactical Evolution: The Threat Actor Group Behind ShinyHunters Ransomware&lt;/EM&gt;&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 id="toc-hId--1206280664"&gt;&lt;FONT color="#FF6600"&gt;&lt;SPAN&gt;Join the conversation on our social media channels:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN&gt;Website: ⁠⁠⁠⁠&lt;A href="https://www.paloaltonetworks.com/unit42%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.paloaltonetworks.com/unit42⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Threat Research: ⁠⁠⁠⁠&lt;A href="https://unit42.paloaltonetworks.com/%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://unit42.paloaltonetworks.com/⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Facebook: ⁠⁠⁠⁠&lt;A href="https://www.facebook.com/LifeatPaloAltoNetworks/%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.facebook.com/LifeatPaloAltoNetworks/⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;LinkedIn: ⁠⁠⁠⁠&lt;A href="https://www.linkedin.com/company/unit42/%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://www.linkedin.com/company/unit42/⁠&lt;/A&gt;⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Twitter: ⁠⁠⁠⁠&lt;A href="https://twitter.com/PaloAltoNtwks%E2%81%A0" target="_blank" rel="noopener nofollow noreferrer"&gt;https://twitter.com/PaloAltoNtwks⁠&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 id="toc-hId-1367122179"&gt;&lt;FONT color="#FF6600"&gt;&lt;SPAN&gt;Listen Now&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;IFRAME src="https://playlist.megaphone.fm?e=CYBW4012959942" width="100%" height="200" frameborder="0" scrolling="no"&gt;&lt;/IFRAME&gt;&lt;/DIV&gt;</description>
    <pubDate>Thu, 09 Jan 2025 19:22:36 GMT</pubDate>
    <dc:creator>dmoulton</dc:creator>
    <dc:date>2025-01-09T19:22:36Z</dc:date>
    <item>
      <title>Threat Vector | The Dangers of Misconfigurations</title>
      <link>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-the-dangers-of-misconfigurations/ta-p/1000080</link>
      <description>&lt;P&gt;In this episode of &lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;Threat Vector&lt;/FONT&gt;&lt;/STRONG&gt;, host David Moulton speaks with Margaret Kelley, a seasoned &lt;EM&gt;Digital Forensics and Incident Response Senior Consultant&lt;/EM&gt; at Palo Alto Networks Unit 42.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Threat-Vector_Dangers-Misconfigurations_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/65032iE18208A95592D99A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Threat-Vector_Dangers-Misconfigurations_palo-alto-networks.jpg" alt="Threat-Vector_Dangers-Misconfigurations_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2025 19:22:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/threat-vector/threat-vector-the-dangers-of-misconfigurations/ta-p/1000080</guid>
      <dc:creator>dmoulton</dc:creator>
      <dc:date>2025-01-09T19:22:36Z</dc:date>
    </item>
  </channel>
</rss>

