Cloud

The Impact of Remote Work and Cloud Migrations on Security PerimetersThe Impact of Remote Work and Cloud Migrations on Security Perimeters

The Impact of Remote Work and Cloud Migrations on Security Perimeters

Organizations had to re-examine the traditional business perimeter and migrate to cloud-based tools to support distributed workforces. What is the…

12 months ago
Critical Microsoft Azure RCE flaw impacted multiple servicesCritical Microsoft Azure RCE flaw impacted multiple services

Critical Microsoft Azure RCE flaw impacted multiple services

Researchers found a new critical remote code execution (RCE) flaw impacting multiple services related to Microsoft Azure. Researchers from Ermetic…

2 years ago
New Pro-Ocean crypto-miner targets Apache ActiveMQ, Oracle WebLogic, and Redis installsNew Pro-Ocean crypto-miner targets Apache ActiveMQ, Oracle WebLogic, and Redis installs

New Pro-Ocean crypto-miner targets Apache ActiveMQ, Oracle WebLogic, and Redis installs

The Rocke group is using a new piece of cryptojacking malware dubbed Pro-Ocean to target Apache ActiveMQ, Oracle WebLogic, and…

4 years ago
NSA warns of cloud attacks on authentication mechanismsNSA warns of cloud attacks on authentication mechanisms

NSA warns of cloud attacks on authentication mechanisms

The US National Security Agency (NSA) warns of two techniques abused by threat actors for escalating attacks from local networks…

4 years ago
CloudFanta Malware Steals Banking Information Via Cloud Storage AppsCloudFanta Malware Steals Banking Information Via Cloud Storage Apps

CloudFanta Malware Steals Banking Information Via Cloud Storage Apps

Watch out, threat research labs Netskope spotted the CloudFanta Malware Stealing Banking Information Via Cloud Storage Apps. Threat Research Labs,…

9 years ago
cuteRansomware leverages Google Docs to avoid detectioncuteRansomware leverages Google Docs to avoid detection

cuteRansomware leverages Google Docs to avoid detection

A newly strain of ransomware dubbed cuteRansomware leverages on a Google Doc to host the decryption key and command-and-control features.…

9 years ago
ZeroDB, the end-to-end encrypted database, goes open sourceZeroDB, the end-to-end encrypted database, goes open source

ZeroDB, the end-to-end encrypted database, goes open source

The End-to-end encrypted database ZeroDB becomes open source and its code is available on GitHub, try it and contribute to…

9 years ago
The US government created new rules for Cloud ProvidersThe US government created new rules for Cloud Providers

The US government created new rules for Cloud Providers

A new set of rules was created by the Department of Defense (DoD) for Cloud Providers to report security holes…

10 years ago
Shadow Cloud Services a serious risk for Government NetworksShadow Cloud Services a serious risk for Government Networks

Shadow Cloud Services a serious risk for Government Networks

Cloud Security Alliance revealed that shadow cloud service used by employees and unmanaged by IT can pose a major security…

10 years ago
Hackers exploit cloud services to build Money-Mining BotnetHackers exploit cloud services to build Money-Mining Botnet

Hackers exploit cloud services to build Money-Mining Botnet

Two security experts will present at the next BlackHat conference how to exploit cloud services to build Money-Mining Botnet. Cloud…

11 years ago