cloud security

AWS Deploying ‘Mithra’ Neural Network to Predict and Block Malicious Domains

AWS Deploying ‘Mithra’ Neural Network to Predict and Block Malicious Domains 2024-08-06 at 00:01 By Ryan Naraine AWS says a massive neural network graph model with 3.5 billion nodes and 48 billion edges is speeding up the prediction and detection of malicious domains. The post AWS Deploying ‘Mithra’ Neural Network to Predict and Block Malicious […]

React to this headline:

Loading spinner

AWS Deploying ‘Mithra’ Neural Network to Predict and Block Malicious Domains Read More »

Microsoft Says Azure Outage Caused by DDoS Attack Response

Microsoft Says Azure Outage Caused by DDoS Attack Response 2024-07-31 at 16:06 By Eduard Kovacs Microsoft’s response to a DDoS attack on Azure amplified the impact of the attack instead of mitigating it, causing outages. The post Microsoft Says Azure Outage Caused by DDoS Attack Response appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Microsoft Says Azure Outage Caused by DDoS Attack Response Read More »

Google Cloud CISO Phil Venables: ‘I’m short-term pessimistic, long-term optimistic’

Google Cloud CISO Phil Venables: ‘I’m short-term pessimistic, long-term optimistic’ 2024-07-30 at 18:48 By Ryan Naraine SecurityWeek fireside chat: Google Cloud CISO on CISA’s secure-by-design initiatives, government regulations, holding vendors accountable, and transformational security leadership. The post Google Cloud CISO Phil Venables: ‘I’m short-term pessimistic, long-term optimistic’ appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Google Cloud CISO Phil Venables: ‘I’m short-term pessimistic, long-term optimistic’ Read More »

Selenium Grid Instances Exploited for Cryptomining

Selenium Grid Instances Exploited for Cryptomining 2024-07-29 at 13:01 By Eduard Kovacs Wiz has detailed SeleniumGreed, a campaign in which threat actors target exposed Selenium Grid instances for cryptomining. The post Selenium Grid Instances Exploited for Cryptomining appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to

React to this headline:

Loading spinner

Selenium Grid Instances Exploited for Cryptomining Read More »

Enhancing threat detection for GenAI workloads with cloud attack emulation

Enhancing threat detection for GenAI workloads with cloud attack emulation 2024-07-29 at 08:01 By Help Net Security Cloud GenAI workloads inherit pre-existing cloud security challenges, and security teams must proactively evolve innovative security countermeasures, including threat detection mechanisms. Traditional cloud threat detection Threat detection systems are designed to allow early detection of potential security breaches;

React to this headline:

Loading spinner

Enhancing threat detection for GenAI workloads with cloud attack emulation Read More »

Cirrus: Open-source Google Cloud forensic collection

Cirrus: Open-source Google Cloud forensic collection 2024-07-29 at 07:16 By Mirko Zorz Cirrus is an open-source Python-based tool designed to streamline Google Cloud forensic evidence collection. It can streamline environment access and evidence collection in investigations involving Google Workspace and GCP. The tool simplifies incident response activities and enhances an organization’s security posture. Key features

React to this headline:

Loading spinner

Cirrus: Open-source Google Cloud forensic collection Read More »

Cloud security threats CISOs need to know about

Cloud security threats CISOs need to know about 2024-07-25 at 07:01 By Mirko Zorz In this Help Net Security interview, Ava Chawla, Head of Cloud Security at AlgoSec, discusses the most significant cloud security threats CISOs must be aware of in 2024. These threats include data breaches, misconfiguration, insider threats, advanced persistent threats, ransomware, API

React to this headline:

Loading spinner

Cloud security threats CISOs need to know about Read More »

Docker Patches Critical AuthZ Plugin Bypass Vulnerability Dating Back to 2018

Docker Patches Critical AuthZ Plugin Bypass Vulnerability Dating Back to 2018 2024-07-25 at 02:31 By Ryan Naraine The vulnerability, tagged as CVE-2024-41110 with a CVSS severity score of 10/10, was originally found and fixed in 2018. The post Docker Patches Critical AuthZ Plugin Bypass Vulnerability Dating Back to 2018 appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

Docker Patches Critical AuthZ Plugin Bypass Vulnerability Dating Back to 2018 Read More »

Zest Security Aims to Resolve, Not Just Mitigate Cloud Risks

Zest Security Aims to Resolve, Not Just Mitigate Cloud Risks 2024-07-24 at 22:01 By Kevin Townsend Zest Security emerged from stealth with $5 million funding and an AI-powered platform that resolves the root source of risk in the cloud. The post Zest Security Aims to Resolve, Not Just Mitigate Cloud Risks appeared first on SecurityWeek.

React to this headline:

Loading spinner

Zest Security Aims to Resolve, Not Just Mitigate Cloud Risks Read More »

Dazz Scores Hefty $50M Investment for AI-Powered Risk Remediation Tech

Dazz Scores Hefty $50M Investment for AI-Powered Risk Remediation Tech 2024-07-24 at 22:01 By Ryan Naraine The new financing brings the total raised by Dazz to $110 million as investors double down on bets in the cloud security remediation space. The post Dazz Scores Hefty $50M Investment for AI-Powered Risk Remediation Tech appeared first on

React to this headline:

Loading spinner

Dazz Scores Hefty $50M Investment for AI-Powered Risk Remediation Tech Read More »

SAP AI Core Vulnerabilities Allowed Service Takeover, Customer Data Access

SAP AI Core Vulnerabilities Allowed Service Takeover, Customer Data Access 2024-07-18 at 18:01 By Eduard Kovacs SAP patches AI Core vulnerabilities allowing attackers to access customer data and take over the service. The post SAP AI Core Vulnerabilities Allowed Service Takeover, Customer Data Access appeared first on SecurityWeek. This article is an excerpt from SecurityWeek

React to this headline:

Loading spinner

SAP AI Core Vulnerabilities Allowed Service Takeover, Customer Data Access Read More »

Signatures should become cloud security history

Signatures should become cloud security history 2024-07-18 at 06:01 By Help Net Security It’s becoming evident that the legacy practice of signature-based threat detection needs to be improved for cloud security challenges. In this Help Net Security video, Jimmy Mesta, CTO at RAD Security, discusses a new proposed standard for creating behavioral fingerprints of open-source

React to this headline:

Loading spinner

Signatures should become cloud security history Read More »

Virtual Event Today: Cloud & Data Security Summit | 2024

Virtual Event Today: Cloud & Data Security Summit | 2024 2024-07-17 at 14:16 By Mike Lennon Join us as we explore the latest trends in the world of SaaS security, cyberattacks against cloud infrastructure, data security posture management (DSPM), and the hype and promise of AI and LLM technologies. The post Virtual Event Today: Cloud

React to this headline:

Loading spinner

Virtual Event Today: Cloud & Data Security Summit | 2024 Read More »

Google in Advanced Talks to Buy Wiz for $23B: WSJ Report

Google in Advanced Talks to Buy Wiz for $23B: WSJ Report 2024-07-14 at 22:55 By SecurityWeek News Google’s parent company Alphabet is reportedly in advanced talks to acquire the hotshot Israeli data security startup. The post Google in Advanced Talks to Buy Wiz for $23B: WSJ Report appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Google in Advanced Talks to Buy Wiz for $23B: WSJ Report Read More »

Using Authy? Beware of impending phishing attempts

Using Authy? Beware of impending phishing attempts 2024-07-11 at 15:46 By Zeljka Zorz Do you use Authy for your multi-factor authentication needs? If you do, you should keep an eye out for phishing attempts, as well as implement defenses against SIM swapping attacks. What happened? On July 1, Twilio – the company that develops the

React to this headline:

Loading spinner

Using Authy? Beware of impending phishing attempts Read More »

Citrix Patches Critical NetScaler Console Vulnerability

Citrix Patches Critical NetScaler Console Vulnerability 2024-07-10 at 16:46 By Ionut Arghire Citrix rolls out patches for multiple security vulnerabilities, including critical and high-severity issues in the NetScaler product line. The post Citrix Patches Critical NetScaler Console Vulnerability appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React

React to this headline:

Loading spinner

Citrix Patches Critical NetScaler Console Vulnerability Read More »

Kaspersky Flags Cyberespionage APT ‘CloudSorcerer’ Targeting Russian Government

Kaspersky Flags Cyberespionage APT ‘CloudSorcerer’ Targeting Russian Government 2024-07-08 at 19:01 By Ionut Arghire Kaspersky said the CloudSorcerer APT has been abusing public cloud services to exfiltrate data from Russian government entities. The post Kaspersky Flags Cyberespionage APT ‘CloudSorcerer’ Targeting Russian Government appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed

React to this headline:

Loading spinner

Kaspersky Flags Cyberespionage APT ‘CloudSorcerer’ Targeting Russian Government Read More »

Cloudy with a Chance of Cyberattack: Understanding LOTC Attacks and How ZTNA Can Prevent Them

Cloudy with a Chance of Cyberattack: Understanding LOTC Attacks and How ZTNA Can Prevent Them 2024-07-08 at 15:01 By Etay Maor With Living Off the Cloud (LOTC) attacks, hackers abuse APIs of trusted cloud services to remotely control botnets but also to make malicious traffic appear as trusted cloud traffic. The post Cloudy with a

React to this headline:

Loading spinner

Cloudy with a Chance of Cyberattack: Understanding LOTC Attacks and How ZTNA Can Prevent Them Read More »

Scroll to Top