{
    "file_item": {
        "filepath": "threat-intelligence",
        "filename": "TLP-WHITE-CERT-EU-THREAT-MEMO-S3-bucket-worm-v1.0.pdf"
    },
    "title": "Insecure S3 buckets can lead to serial exploitation",
    "publish_date": "19-08-2020 16:00:00",
    "description": "- Research shows that unsecured cloud-based storage buckets can be scanned for the existence of credentials.<br>- The process of harvesting credentials and using them to exploit additional services has the potential to become automated.",
    "url_title": "threat-memo-s3-bucket-worm",
    "content_markdown": null,
    "content_html": null,
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}