{"id":626,"date":"2024-04-19T12:24:45","date_gmt":"2024-04-19T12:24:45","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/04\/19\/how-attackers-can-own-a-business-without-touching-the-endpoint\/"},"modified":"2024-04-19T12:24:45","modified_gmt":"2024-04-19T12:24:45","slug":"how-attackers-can-own-a-business-without-touching-the-endpoint","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/04\/19\/how-attackers-can-own-a-business-without-touching-the-endpoint\/","title":{"rendered":"How Attackers Can Own a Business Without Touching the Endpoint"},"content":{"rendered":"<p>\u200bAttackers are increasingly\u00a0making use of\u00a0\u201cnetworkless\u201d\u00a0attack techniques targeting\u00a0cloud apps and identities. Here\u2019s how attackers can (and are)\u00a0compromising organizations \u2013\u00a0without ever needing to touch the endpoint or conventional networked systems and services.\u00a0<br \/>\nBefore getting into the details of the attack techniques\u00a0being\u00a0used, let\u2019s discuss why\u00a0Attackers are increasingly\u00a0making use of\u00a0\u201cnetworkless\u201d\u00a0attack techniques targeting\u00a0cloud apps and identities. Here\u2019s how attackers can (and are)\u00a0compromising organizations \u2013\u00a0without ever needing to touch the endpoint or conventional networked systems and services.\u00a0<br \/>\nBefore getting into the details of the attack techniques\u00a0being\u00a0used, let\u2019s discuss why\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bAttackers are increasingly\u00a0making use of\u00a0\u201cnetworkless\u201d\u00a0attack techniques targeting\u00a0cloud apps and identities. Here\u2019s how attackers can (and are)\u00a0compromising organizations \u2013\u00a0without ever needing to touch the endpoint or conventional networked systems and services.\u00a0 Before getting into the details of the attack techniques\u00a0being\u00a0used, let\u2019s discuss why\u00a0Attackers are increasingly\u00a0making use of\u00a0\u201cnetworkless\u201d\u00a0attack techniques targeting\u00a0cloud apps and identities. Here\u2019s how attackers can&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/04\/19\/how-attackers-can-own-a-business-without-touching-the-endpoint\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">How Attackers Can Own a Business Without Touching the Endpoint<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":627,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/626"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=626"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/626\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/627"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=626"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=626"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}