16.7 C
Munich
Sunday, May 28, 2023

Cloud

The Powerful Phishing-as-a-Service Platform Targeting Microsoft 365 Users

In the treacherous world of cybercrime, a formidable adversary has emerged - Greatness, the insidious Phishing-as-a-Service (PhaaS) platform. Since its inception in mid-2022, this...

Securing Cloud Data with a CASB: A Guide to Selection and Implementation

With the rise in cloud adoption, companies are increasingly using cloud-based applications, which present a new set of cybersecurity challenges. One solution to address...

Microsoft joins hands with Kaspersky for cyber threat intelligence

Microsoft partners with Kaspersky for cyber threat intelligence, with access to Kaspersky TI through Microsoft Sentinel to empower enterprises with the latest insights to...

Google Cloud Gets Virtual Machine Threat Detection to Help Detect Crypto Mining

Google announced the public preview of a tool which helps identify threats within virtual machines running on its Google Cloud infrastructure. VMTD to Help Identify...

Hackers Using Azure and AWS to Spread RATs

Researchers from Cisco Talos Intelligence found that hackers are using public cloud providers like Azure and AWS to spread RATs. These cloud services allow them...

Enhanced Automated Vulnerability Management for Cloud Workloads Announced by AWS

Newly added capabilities for the Amazon Inspector service will meet the "critical need to detect and remediate at speed" in order to secure cloud workloads.

Google Warns for Hacked Cloud Accounts Used for Crypto Mining

The recently launched Google Cybersecurity Action Team (GCAT) provided specific insights, such as when malicious hackers exploit improperly-secured cloud instances to download cryptocurrency mining...

New Azure AD Bug Allows Attackers Brute-Force Passwords

An unpatched security weakness in Azure Active Directory might be leveraged by attackers to conduct undetected brute-force attacks, according to security researchers. SecureWorks says...

Cloud Threat Report 2020

Oracle and KPMG published the "Cloud Threat and Security Report 2020" which identifies the key risks and challenges that organizations are facing as they...

160,000 Nintendo Player Accounts Hacked

WHAT KIND OF DATA WERE EXPOSED? Recently a data breach of Nintendo systems exposed data of 160,000 people. The hackers exploited a weakness in the...

Docker Security Practices

Docker may be a new thing for many environments but it has been around long enough to be considered ready for production use. Like...

Latest