-0.3 C
Munich
Saturday, February 8, 2025

Cloud

Darktrace to Acquire Cado Security, Strengthening Cloud Forensics and Cybersecurity Capabilities

Darktrace, a prominent leader in AI-driven cybersecurity solutions, has announced its intent to acquire Cado Security, a UK-based provider specializing in cyber investigation and...

Cloud Lateral Movement Via Exploited SQL Servers

Recent findings by Microsoft security researchers have unveiled a concerning cyberattack campaign that involves lateral movement to a cloud environment through a Microsoft SQL...

The Most Common Azure Security Misconfigurations

The rise of cloud environment usage especially Microsoft Azure, has also brought new challenges for CISOs and security professionals. Following best practices will help...

Navigating Cloud Security Solutions: Exploring the Differences Between CASB and SASE

In an era marked by digital transformation and cloud-first strategies, ensuring the security of sensitive data and maintaining regulatory compliance has become paramount for...

CrowdStrike Unveils New Counter Adversary Operations Team to Thwart Modern Breaches

On August 8, 2023, CrowdStrike, the renowned American cybersecurity technology company, introduced its latest initiative, the "CrowdStrike Falcon Intelligence" and "CrowdStrike Falcon OverWatch", aimed...

The Powerful Phishing-as-a-Service Platform Targeting Microsoft 365 Users

In the treacherous world of cybercrime, a formidable adversary has emerged - Greatness, the insidious Phishing-as-a-Service (PhaaS) platform. Since its inception in mid-2022, this...

Securing Cloud Data with a CASB: A Guide to Selection and Implementation

With the rise in cloud adoption, companies are increasingly using cloud-based applications, which present a new set of cybersecurity challenges. One solution to address...

Microsoft joins hands with Kaspersky for cyber threat intelligence

Microsoft partners with Kaspersky for cyber threat intelligence, with access to Kaspersky TI through Microsoft Sentinel to empower enterprises with the latest insights to...

Google Cloud Gets Virtual Machine Threat Detection to Help Detect Crypto Mining

Google announced the public preview of a tool which helps identify threats within virtual machines running on its Google Cloud infrastructure. VMTD to Help Identify...

Hackers Using Azure and AWS to Spread RATs

Researchers from Cisco Talos Intelligence found that hackers are using public cloud providers like Azure and AWS to spread RATs. These cloud services allow them...

Latest