The Powerful Phishing-as-a-Service Platform Targeting Microsoft 365 Users
In the treacherous world of cybercrime, a formidable adversary has emerged - Greatness, the insidious Phishing-as-a-Service (PhaaS) platform. Since its inception in mid-2022, this...
Securing Cloud Data with a CASB: A Guide to Selection and Implementation
With the rise in cloud adoption, companies are increasingly using cloud-based applications, which present a new set of cybersecurity challenges. One solution to address...
Microsoft joins hands with Kaspersky for cyber threat intelligence
TheCISO -
Microsoft partners with Kaspersky for cyber threat intelligence, with access to Kaspersky TI through Microsoft Sentinel to empower enterprises with the latest insights to...
Google Cloud Gets Virtual Machine Threat Detection to Help Detect Crypto Mining
Google announced the public preview of a tool which helps identify threats within virtual machines running on its Google Cloud infrastructure.
VMTD to Help Identify...
Hackers Using Azure and AWS to Spread RATs
Researchers from Cisco Talos Intelligence found that hackers are using public cloud providers like Azure and AWS to spread RATs.
These cloud services allow them...
Enhanced Automated Vulnerability Management for Cloud Workloads Announced by AWS
Newly added capabilities for the Amazon Inspector service will meet the "critical need to detect and remediate at speed" in order to secure cloud workloads.
Google Warns for Hacked Cloud Accounts Used for Crypto Mining
The recently launched Google Cybersecurity Action Team (GCAT) provided specific insights, such as when malicious hackers exploit improperly-secured cloud instances to download cryptocurrency mining...
New Azure AD Bug Allows Attackers Brute-Force Passwords
An unpatched security weakness in Azure Active Directory might be leveraged by attackers to conduct undetected brute-force attacks, according to security researchers.
SecureWorks says...
Cloud Threat Report 2020
TheCISO -
Oracle and KPMG published the "Cloud Threat and Security Report 2020" which identifies the key risks and challenges that organizations are facing as they...
160,000 Nintendo Player Accounts Hacked
TheCISO -
WHAT KIND OF DATA WERE EXPOSED?
Recently a data breach of Nintendo systems exposed data of 160,000 people. The hackers exploited a weakness in the...
Docker Security Practices
Docker may be a new thing for many environments but it has been around long enough to be considered ready for production use. Like...