10 July 2025

Cloud Breach 101: what hackers see that you don’t

As more businesses migrate critical workloads to the cloud, misconfigurations remain a top attack vector. While cloud platforms like AWS and Azure offer robust security features, one wrong configuration (including overreliance on default settings) can expose your environment to attackers. These aren’t hypothetical risks—they’re real-world mistakes that businesses make, and threat actors actively seek and exploit.

In this webinar, our expert penetration testers will demonstrate how attackers take advantage of common misconfigurations to compromise cloud environments and access sensitive data. You’ll see first-hand the tools and techniques used in real attacks— across both AWS and Azure— and learn how to identify and fix these issues before they’re exploited.

We’ll also introduce our new Cloud Enumeration Tool, soon to be available on GitHub. This open-source utility helps you identify exposed resources across public cloud environments and strengthen your cloud visibility.

The webinar will cover:

  • How attackers exploit common misconfigurations in AWS and Azure
  • Real-world attack flows targeting cloud services and IAM policies
  • Tools used by hackers to scan and enumerate cloud environments
  • Live demo of our new open-source Cloud Enumeration Tool
  • Best practices to prevent misconfigurations and secure your cloud infrastructure

Key takeaways

  • See real-world cloud attacks in action
  • Understand the security impact of minor configuration errors
  • Learn practical, actionable remediation techniques
  • Get hands-on with our new tool that you can use in your own environment

Your host

Thomas Large

Thomas large

Tom is a Senior Penetration Tester and Trainer at NotSoSecure Training by Claranet.

For several years, he has regularly delivered hands-on training at Black Hat and other leading security conferences. Tom also leads and contributes to key NotSoSecure courses, including Ready Steady Hack, hacking 101, Basic Web Hacking, Advanced Web Hacking, and Hacking and Securing Cloud Infrastructure.


Register now

16:00 - 17:00

Online webinar