{"id":6366,"date":"2025-12-10T12:20:33","date_gmt":"2025-12-10T12:20:33","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/12\/10\/webinar-how-attackers-exploit-cloud-misconfigurations-across-aws-ai-models-and-kubernetes\/"},"modified":"2025-12-10T12:20:33","modified_gmt":"2025-12-10T12:20:33","slug":"webinar-how-attackers-exploit-cloud-misconfigurations-across-aws-ai-models-and-kubernetes","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/12\/10\/webinar-how-attackers-exploit-cloud-misconfigurations-across-aws-ai-models-and-kubernetes\/","title":{"rendered":"Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes"},"content":{"rendered":"<p>\u200bCloud security is changing. Attackers are no longer just breaking down the door; they are finding unlocked windows in your configurations, your identities, and your code.<br \/>\nStandard security tools often miss these threats because they look like normal activity. To stop them, you need to see exactly how these attacks happen in the real world.<br \/>\nNext week, the Cortex Cloud team at Palo Alto Networks\u00a0Cloud security is changing. Attackers are no longer just breaking down the door; they are finding unlocked windows in your configurations, your identities, and your code.<br \/>\nStandard security tools often miss these threats because they look like normal activity. To stop them, you need to see exactly how these attacks happen in the real world.<br \/>\nNext week, the Cortex Cloud team at Palo Alto Networks\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bCloud security is changing. Attackers are no longer just breaking down the door; they are finding unlocked windows in your configurations, your identities, and your code. Standard security tools often miss these threats because they look like normal activity. To stop them, you need to see exactly how these attacks happen in the real world.&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/12\/10\/webinar-how-attackers-exploit-cloud-misconfigurations-across-aws-ai-models-and-kubernetes\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":6367,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/6366"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=6366"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/6366\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/6367"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=6366"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=6366"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=6366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}