Organizations had to re-examine the traditional business perimeter and migrate to cloud-based tools to support distributed workforces. What is the…
Researchers found a new critical remote code execution (RCE) flaw impacting multiple services related to Microsoft Azure. Researchers from Ermetic…
The Rocke group is using a new piece of cryptojacking malware dubbed Pro-Ocean to target Apache ActiveMQ, Oracle WebLogic, and…
The US National Security Agency (NSA) warns of two techniques abused by threat actors for escalating attacks from local networks…
Watch out, threat research labs Netskope spotted the CloudFanta Malware Stealing Banking Information Via Cloud Storage Apps. Threat Research Labs,…
A newly strain of ransomware dubbed cuteRansomware leverages on a Google Doc to host the decryption key and command-and-control features.…
The End-to-end encrypted database ZeroDB becomes open source and its code is available on GitHub, try it and contribute to…
A new set of rules was created by the Department of Defense (DoD) for Cloud Providers to report security holes…
Cloud Security Alliance revealed that shadow cloud service used by employees and unmanaged by IT can pose a major security…
Two security experts will present at the next BlackHat conference how to exploit cloud services to build Money-Mining Botnet. Cloud…
This website uses cookies.