{"id":812264,"date":"2025-07-01T21:57:47","date_gmt":"2025-07-01T13:57:47","guid":{"rendered":"https:\/\/ztylezman.com\/?p=812264"},"modified":"2025-07-05T04:11:03","modified_gmt":"2025-07-04T20:11:03","slug":"aws-advances-cloud-security-protection-hong-kong-security-day","status":"publish","type":"post","link":"https:\/\/ztylezman.com\/en\/gadgets-en-2\/aws-advances-cloud-security-protection-hong-kong-security-day\/","title":{"rendered":"AWS Unveils Cutting-Edge Cloud Security Defense at Hong Kong Security Day"},"content":{"rendered":"<amp-carousel width=\"780\" height=\"520\" layout=\"responsive\" type=\"slides\" autoplay=\"\" delay=\"30000\" role=\"region\" aria-label=\"Carousel with autoplay\"><amp-img src=\"https:\/\/ztylezman.com\/wp-content\/uploads\/2025\/06\/ztylezman.com_ztylezman-game-aws-security-innovations-1.jpg\" width=\"849\" height=\"477\" layout=\"responsive\" alt=\"ztylezman.com\/ztylezman-game-aws-security-innovations-1\"><\/amp-img><amp-img src=\"https:\/\/ztylezman.com\/wp-content\/uploads\/2025\/06\/ztylezman.com_ztylezman-game-aws-security-innovations.jpg\" width=\"852\" height=\"475\" layout=\"responsive\" alt=\"ztylezman.com\/ztylezman-game-aws-security-innovations\"><\/amp-img><\/amp-carousel>\n\n<br>\n<p>As cyberattacks become increasingly frequent, the challenges that enterprises face in cloud security are becoming more pronounced. Amazon Web Services (AWS) recently unveiled the latest\u6210\u679c of its proactive defense system, successfully blocking a significant number of cyber threats. This signifies further advancements in their cloud security technology. AWS will delve into how these innovative technologies effectively protect businesses at the upcoming Security Day event in Hong Kong.<\/p>\n<p>The AWS security team continuously works behind the scenes to safeguard customers&#8217; cloud environments, developing numerous internal proactive defense systems that operate around the clock. These systems provide seamless security protection for AWS customers at no extra cost.<\/p>\n<p>Cybercriminals frequently exploit malware to take control of vast resources for various illegal activities. Over the past year, AWS&#8217;s proactive defense system has successfully blocked more than 4 million attempts of malware infections, effectively safeguarding approximately 315,000 distinct Amazon EC2 instances.<\/p>\n<p>AWS&#8217;s security experts leverage a variety of technologies to identify threats, including network traffic log analysis, honeypot interaction data, and malware sample analysis. By adopting these methods, they effectively mitigate threats posed by botnets, rogue proxies, and malware in peer-to-peer networks.<\/p>\n<p>According to a report for 2024, over 40,000 CVE vulnerabilities have been disclosed, marking a 21% increase from previous years. In response to this challenge, AWS has expanded the capabilities of the MadPot and Sonaris systems, adding hundreds of detection rules and simulated services to identify real attacks.<\/p>\n<p>The good news is that over the past 12 months, the rate of CVE vulnerability attacks has decreased by more than 55%. AWS is now blocking millions of CVE attack attempts daily, significantly reducing the security risks faced by customers. Moreover, this real-time threat intelligence is integrated into Amazon Inspector, helping customers tackle the most urgent security issues.<\/p>\n<p>AWS access keys are essential credentials for every customer account. On average, AWS blocks 1.67 billion malicious scans daily, with these scans primarily targeting accidentally exposed access keys.<\/p>\n<p>Towards the end of 2024, AWS discovered ransomware attacks targeting the Amazon S3 storage system, which were closely related to the exposure of customer-managed IAM keys. AWS responded swiftly by isolating the problematic keys and proactively notifying customers, ultimately assisting in the deactivation of over 30,000 exposed credentials involved in the attacks, effectively preventing more than 900 million instances of malicious encryption on customers&#8217; S3 files.<\/p>\n<p>For professionals looking to learn more about how AWS protects businesses from cyber threats, AWS&#8217;s Security Day in Hong Kong is an excellent opportunity. Whether you&#8217;re a cloud novice or an experienced practitioner, there&#8217;s something to gain for everyone.<\/p>\n<p>Building a secure cloud environment has become a consensus within the industry. AWS&#8217;s proactive defense strategy demonstrates how risk can be mitigated through layered infrastructure protection and threat intelligence. These built-in defense features come at no extra cost, offering clients protection against a variety of threats.<\/p>\n<p>However, AWS also emphasizes that customers need to maintain their own defense measures. The security services provided by AWS, such as AWS Shield Advanced, AWS WAF, AWS Network Firewall, Amazon GuardDuty, and Amazon Inspector, can be configured based on the actual needs of the customers, offering comprehensive prevention, detection, and response capabilities.<\/p>\n<p>Sign up now for AWS Hong Kong Security Day to learn more!<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>Discover how Amazon Web Services enhances cloud security with advanced proactive defense systems that block over 4 million malware attempts and protect critical infrastructure at no extra cost. Join AWS Security Day in Hong Kong for insights.<\/p>\n","protected":false},"author":9,"featured_media":806910,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":"Amazon Web Services (AWS) has developed a comprehensive proactive defense system that successfully blocks over 4 million malware infections annually, safeguarding approximately 315,000 EC2 instances. Their threat mitigation technology includes analyzing network traffic logs, honeypot interactions, and malware samples, as well as expanding detection rules for systems like MadPot and Sonaris. In 2024, the company disclosed over 40,000 CVE vulnerabilities, representing a 21% increase from previous years, but successfully reduced attack rates by over 55%. AWS blocks 1.67 billion malicious scans daily, primarily targeting exposed access keys, and responded swiftly to ransomware attacks on Amazon S3 by deactivating more than 30,000 compromised credentials, preventing over 900 million malicious encryptions. Their layered security approach emphasizes continuous threat intelligence and customer-managed security configurations utilizing tools such as AWS Shield Advanced, AWS WAF, and Amazon GuardDuty, at no additional cost, while urging clients to maintain their own defense measures."},"categories":[5012],"tags":[],"class_list":{"0":"post-812264","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-gadgets-en-2"},"raw_content":"<!-- wp:html --><amp-carousel width=\"780\" height=\"520\" layout=\"responsive\" type=\"slides\" autoplay=\"\" delay=\"30000\" role=\"region\" aria-label=\"Carousel with autoplay\"><amp-img src=\"https:\/\/ztylezman.com\/wp-content\/uploads\/2025\/06\/ztylezman.com_ztylezman-game-aws-security-innovations-1.jpg\" width=\"849\" height=\"477\" layout=\"responsive\" alt=\"ztylezman.com\/ztylezman-game-aws-security-innovations-1\"><\/amp-img><amp-img src=\"https:\/\/ztylezman.com\/wp-content\/uploads\/2025\/06\/ztylezman.com_ztylezman-game-aws-security-innovations.jpg\" width=\"852\" height=\"475\" layout=\"responsive\" alt=\"ztylezman.com\/ztylezman-game-aws-security-innovations\"><\/amp-img><\/amp-carousel>\n\n<!-- \/wp:html --><br>\n<!-- wp:paragraph --><p>As cyberattacks become increasingly frequent, the challenges that enterprises face in cloud security are becoming more pronounced. Amazon Web Services (AWS) recently unveiled the latest\u6210\u679c of its proactive defense system, successfully blocking a significant number of cyber threats. This signifies further advancements in their cloud security technology. AWS will delve into how these innovative technologies effectively protect businesses at the upcoming Security Day event in Hong Kong.<\/p><!-- \/wp:paragraph -->\n<!-- wp:paragraph --><p>The AWS security team continuously works behind the scenes to safeguard customers' cloud environments, developing numerous internal proactive defense systems that operate around the clock. These systems provide seamless security protection for AWS customers at no extra cost.<\/p><!-- \/wp:paragraph -->\n<!-- wp:paragraph --><p>Cybercriminals frequently exploit malware to take control of vast resources for various illegal activities. Over the past year, AWS's proactive defense system has successfully blocked more than 4 million attempts of malware infections, effectively safeguarding approximately 315,000 distinct Amazon EC2 instances.<\/p><!-- \/wp:paragraph -->\n<!-- wp:paragraph --><p>AWS's security experts leverage a variety of technologies to identify threats, including network traffic log analysis, honeypot interaction data, and malware sample analysis. By adopting these methods, they effectively mitigate threats posed by botnets, rogue proxies, and malware in peer-to-peer networks.<\/p><!-- \/wp:paragraph -->\n<!-- wp:paragraph --><p>According to a report for 2024, over 40,000 CVE vulnerabilities have been disclosed, marking a 21% increase from previous years. In response to this challenge, AWS has expanded the capabilities of the MadPot and Sonaris systems, adding hundreds of detection rules and simulated services to identify real attacks.<\/p><!-- \/wp:paragraph -->\n<!-- wp:paragraph --><p>The good news is that over the past 12 months, the rate of CVE vulnerability attacks has decreased by more than 55%. AWS is now blocking millions of CVE attack attempts daily, significantly reducing the security risks faced by customers. Moreover, this real-time threat intelligence is integrated into Amazon Inspector, helping customers tackle the most urgent security issues.<\/p><!-- \/wp:paragraph -->\n<!-- wp:paragraph --><p>AWS access keys are essential credentials for every customer account. On average, AWS blocks 1.67 billion malicious scans daily, with these scans primarily targeting accidentally exposed access keys.<\/p><!-- \/wp:paragraph -->\n<!-- wp:paragraph --><p>Towards the end of 2024, AWS discovered ransomware attacks targeting the Amazon S3 storage system, which were closely related to the exposure of customer-managed IAM keys. AWS responded swiftly by isolating the problematic keys and proactively notifying customers, ultimately assisting in the deactivation of over 30,000 exposed credentials involved in the attacks, effectively preventing more than 900 million instances of malicious encryption on customers' S3 files.<\/p><!-- \/wp:paragraph -->\n<!-- wp:paragraph --><p>For professionals looking to learn more about how AWS protects businesses from cyber threats, AWS's Security Day in Hong Kong is an excellent opportunity. Whether you're a cloud novice or an experienced practitioner, there's something to gain for everyone.<\/p><!-- \/wp:paragraph -->\n<!-- wp:paragraph --><p>Building a secure cloud environment has become a consensus within the industry. AWS's proactive defense strategy demonstrates how risk can be mitigated through layered infrastructure protection and threat intelligence. These built-in defense features come at no extra cost, offering clients protection against a variety of threats.<\/p><!-- \/wp:paragraph -->\n<!-- wp:paragraph --><p>However, AWS also emphasizes that customers need to maintain their own defense measures. The security services provided by AWS, such as AWS Shield Advanced, AWS WAF, AWS Network Firewall, Amazon GuardDuty, and Amazon Inspector, can be configured based on the actual needs of the customers, offering comprehensive prevention, detection, and response capabilities.<\/p><!-- \/wp:paragraph -->\n<!-- wp:paragraph --><p>Sign up now for AWS Hong Kong Security Day to learn more!<\/p><!-- \/wp:paragraph -->\n\n<!-- wp:html \/-->","_links":{"self":[{"href":"https:\/\/ztylezman.com\/en\/wp-json\/wp\/v2\/posts\/812264","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ztylezman.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ztylezman.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ztylezman.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/ztylezman.com\/en\/wp-json\/wp\/v2\/comments?post=812264"}],"version-history":[{"count":0,"href":"https:\/\/ztylezman.com\/en\/wp-json\/wp\/v2\/posts\/812264\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ztylezman.com\/en\/wp-json\/wp\/v2\/media\/806910"}],"wp:attachment":[{"href":"https:\/\/ztylezman.com\/en\/wp-json\/wp\/v2\/media?parent=812264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ztylezman.com\/en\/wp-json\/wp\/v2\/categories?post=812264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ztylezman.com\/en\/wp-json\/wp\/v2\/tags?post=812264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}