4.1 C
Munich
Wednesday, April 24, 2024

Cloud

Cloud Lateral Movement Via Exploited SQL Servers

Recent findings by Microsoft security researchers have unveiled a concerning cyberattack campaign that involves lateral movement to a cloud environment through a Microsoft SQL...

The Most Common Azure Security Misconfigurations

The rise of cloud environment usage especially Microsoft Azure, has also brought new challenges for CISOs and security professionals. Following best practices will help...

Navigating Cloud Security Solutions: Exploring the Differences Between CASB and SASE

In an era marked by digital transformation and cloud-first strategies, ensuring the security of sensitive data and maintaining regulatory compliance has become paramount for...

CrowdStrike Unveils New Counter Adversary Operations Team to Thwart Modern Breaches

On August 8, 2023, CrowdStrike, the renowned American cybersecurity technology company, introduced its latest initiative, the "CrowdStrike Falcon Intelligence" and "CrowdStrike Falcon OverWatch", aimed...

The Powerful Phishing-as-a-Service Platform Targeting Microsoft 365 Users

In the treacherous world of cybercrime, a formidable adversary has emerged - Greatness, the insidious Phishing-as-a-Service (PhaaS) platform. Since its inception in mid-2022, this...

Securing Cloud Data with a CASB: A Guide to Selection and Implementation

With the rise in cloud adoption, companies are increasingly using cloud-based applications, which present a new set of cybersecurity challenges. One solution to address...

Microsoft joins hands with Kaspersky for cyber threat intelligence

Microsoft partners with Kaspersky for cyber threat intelligence, with access to Kaspersky TI through Microsoft Sentinel to empower enterprises with the latest insights to...

Google Cloud Gets Virtual Machine Threat Detection to Help Detect Crypto Mining

Google announced the public preview of a tool which helps identify threats within virtual machines running on its Google Cloud infrastructure. VMTD to Help Identify...

Hackers Using Azure and AWS to Spread RATs

Researchers from Cisco Talos Intelligence found that hackers are using public cloud providers like Azure and AWS to spread RATs. These cloud services allow them...

Enhanced Automated Vulnerability Management for Cloud Workloads Announced by AWS

Newly added capabilities for the Amazon Inspector service will meet the "critical need to detect and remediate at speed" in order to secure cloud workloads.

Google Warns for Hacked Cloud Accounts Used for Crypto Mining

The recently launched Google Cybersecurity Action Team (GCAT) provided specific insights, such as when malicious hackers exploit improperly-secured cloud instances to download cryptocurrency mining...

New Azure AD Bug Allows Attackers Brute-Force Passwords

An unpatched security weakness in Azure Active Directory might be leveraged by attackers to conduct undetected brute-force attacks, according to security researchers. SecureWorks says...

Latest