shadowy figures standing in front of AWS logo![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt40185531a4e4c2b0/67a3a02918aae9b76ecc8ffe/aws_kovop_shutterstock.jpg?width=700&auto=webp&quality=80&disable=upscale)
Remote Workforce![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt40185531a4e4c2b0/67a3a02918aae9b76ecc8ffe/aws_kovop_shutterstock.jpg?width=700&auto=webp&quality=80&disable=upscale)
Abandoned AWS Cloud Storage: A Major Cyberattack VectorAbandoned AWS Cloud Storage: A Major Cyberattack Vector
New research highlights how bad actors could abuse deleted AWS S3 buckets to create all sorts of mayhem, including a SolarWinds-style supply chain attack.
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.