TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

ESET WeLiveSecurity

Virtual machines, virtually everywhere – and with real security gaps

2026-03-25 · Read original ↗

ATT&CK techniques detected

8 predictions
T1525Implant Internal Image
95%
"of organizations report having a comprehensive view of their cloud footprint. unchecked growth of assets, including fleets of vms, is a big part of the problem. the staple attack paths – misconfigured storage buckets and exposed apis – dominate breach disclosures, in part because…"
T1078.004Cloud Accounts
90%
"face when it comes to defending their assets in various environments. a meaningful share of the resulting cost traces to the length of time between infiltration and detection, also known as dwell time. organizations that can ’ t see what ’ s happening inside their environments te…"
T1525Implant Internal Image
80%
", the alerts were dismissed as false positives. fighting deploy and decay chances are that your it and security teams are small and handle security alongside other it responsibilities, which has a lot to do with what kind of tooling works at this scale. security products that rel…"
T1078.004Cloud Accounts
79%
", the window between initial compromise and serious damage can be short. ( auto ) isolating a vm before lateral movement begins needs to happen at any hour. it ’ s one of the scenarios where ai - driven correlation and runtime detection earn their keep – no one can watch every wo…"
T1078.004Cloud Accounts
73%
"a task. in hybrid environments involving hybrid identities, things can get even more complicated. for example, when on - prem active directory is synced with entra id, a compromised vm in azure that ’ s joined to an entra id tenant may be able to reach file shares, databases, app…"
T1078Valid Accounts
53%
"prem environments, the question is whether their security tooling can keep an eye on vms with the same rigor as applied to the endpoints on employee desks and other parts of their infrastructure. only then can they see the full picture and secure their data across various environ…"
T1550.001Application Access Token
44%
"a task. in hybrid environments involving hybrid identities, things can get even more complicated. for example, when on - prem active directory is synced with entra id, a compromised vm in azure that ’ s joined to an entra id tenant may be able to reach file shares, databases, app…"
T1525Implant Internal Image
37%
", the window between initial compromise and serious damage can be short. ( auto ) isolating a vm before lateral movement begins needs to happen at any hour. it ’ s one of the scenarios where ai - driven correlation and runtime detection earn their keep – no one can watch every wo…"

Summary

Cloud VMs offer unmatched speed, scale and flexibility – all of which could eventually count for little if they’re left to fend for themselves