Bling Libra’s Tactical Evolution: Exploiting Cloud Misconfigurations for Extortion

Bling Libra
The MITRE timeline details the attack path taken by the threat actor | Image: Unit 42