cloud security

‘Looney Tunables’ Glibc Vulnerability Exploited in Cloud Attacks 

‘Looney Tunables’ Glibc Vulnerability Exploited in Cloud Attacks  06/11/2023 at 17:06 By Eduard Kovacs Glibc vulnerability affecting major Linux distributions and tracked as Looney Tunables exploited in cloud attacks by Kinsing group.  The post ‘Looney Tunables’ Glibc Vulnerability Exploited in Cloud Attacks  appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed […]

React to this headline:

Loading spinner

‘Looney Tunables’ Glibc Vulnerability Exploited in Cloud Attacks  Read More »

Okta Hack Blamed on Employee Using Personal Google Account on Company Laptop

Okta Hack Blamed on Employee Using Personal Google Account on Company Laptop 04/11/2023 at 19:31 By Ryan Naraine Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop. The post Okta Hack Blamed on Employee Using Personal Google Account on Company

React to this headline:

Loading spinner

Okta Hack Blamed on Employee Using Personal Google Account on Company Laptop Read More »

Microsoft launches new initiative to augment security

Microsoft launches new initiative to augment security 03/11/2023 at 14:48 By Zeljka Zorz Nearly 22 years after Bill Gates announced a concerted Microsoft-wide push to deliver Trustworthy Computing, the company is launching the Secure Future Initiative, to boost the overall security of Microsoft’s products and its customers and users. A new Microsoft initiative focused on

React to this headline:

Loading spinner

Microsoft launches new initiative to augment security Read More »

Palo Alto Networks to Acquire Cloud Security Start-Up Dig Security

Palo Alto Networks to Acquire Cloud Security Start-Up Dig Security 31/10/2023 at 21:30 By SecurityWeek News Palo Alto Networks has entered into a definitive agreement to acquire Dig Security, a provider of Data Security Posture Management (DSPM) technology. The post Palo Alto Networks to Acquire Cloud Security Start-Up Dig Security appeared first on SecurityWeek. This

React to this headline:

Loading spinner

Palo Alto Networks to Acquire Cloud Security Start-Up Dig Security Read More »

IAM Credentials in Public GitHub Repositories Harvested in Minutes

IAM Credentials in Public GitHub Repositories Harvested in Minutes 31/10/2023 at 18:49 By Ionut Arghire A threat actor is reportedly harvesting IAM credentials from public GitHub repositories within five minutes of exposure. The post IAM Credentials in Public GitHub Repositories Harvested in Minutes appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

IAM Credentials in Public GitHub Repositories Harvested in Minutes Read More »

Proofpoint to Acquire Tessian for AI-Powered Email Security Tech

Proofpoint to Acquire Tessian for AI-Powered Email Security Tech 30/10/2023 at 18:46 By Ryan Naraine Proofpoint removes a formidable competitor from the crowded email security market and adds technology to address risk from misdirected emails. The post Proofpoint to Acquire Tessian for AI-Powered Email Security Tech appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Proofpoint to Acquire Tessian for AI-Powered Email Security Tech Read More »

Attackers Can Use Modified Wikipedia Pages to Mount Redirection Attacks on Slack

Attackers Can Use Modified Wikipedia Pages to Mount Redirection Attacks on Slack 30/10/2023 at 16:46 By Ionut Arghire Researchers document the Wiki-Slack attack, a new technique that uses modified Wikipedia pages to target end users on Slack. The post Attackers Can Use Modified Wikipedia Pages to Mount Redirection Attacks on Slack appeared first on SecurityWeek.

React to this headline:

Loading spinner

Attackers Can Use Modified Wikipedia Pages to Mount Redirection Attacks on Slack Read More »

Amazon Rolls Out Independent Cloud for Europe to Address Stricter Privacy Standards

Amazon Rolls Out Independent Cloud for Europe to Address Stricter Privacy Standards 26/10/2023 at 17:46 By Associated Press Amazon is rolling out an independent cloud for Europe as it looks to address strict regulations that companies and those in the public sector face in the European Union. The post Amazon Rolls Out Independent Cloud for

React to this headline:

Loading spinner

Amazon Rolls Out Independent Cloud for Europe to Address Stricter Privacy Standards Read More »

Censys Banks $75M for Attack Surface Management Technology

Censys Banks $75M for Attack Surface Management Technology 25/10/2023 at 18:17 By Ryan Naraine Michigan startup raises $75 million in new funding as venture capital investors bet big on attack surface management technologies. The post Censys Banks $75M for Attack Surface Management Technology appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Censys Banks $75M for Attack Surface Management Technology Read More »

VMware vCenter Flaw So Critical, Patches Released for End-of-Life Products

VMware vCenter Flaw So Critical, Patches Released for End-of-Life Products 25/10/2023 at 16:31 By Ryan Naraine VMware described the bug as an out-of-bounds write issue in its implementation of the DCE/RPC protocol. CVSS severity score of 9.8/10. The post VMware vCenter Flaw So Critical, Patches Released for End-of-Life Products appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

VMware vCenter Flaw So Critical, Patches Released for End-of-Life Products Read More »

Enterprise Browser Startup Island Banks $100M in Funding

Enterprise Browser Startup Island Banks $100M in Funding 23/10/2023 at 21:49 By Ryan Naraine Since 2020, Island has raised a total of $325 million to help protect corporate data flowing through SaaS and internal web applications. The post Enterprise Browser Startup Island Banks $100M in Funding appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Enterprise Browser Startup Island Banks $100M in Funding Read More »

10 essential cybersecurity cheat sheets available for free

10 essential cybersecurity cheat sheets available for free 18/10/2023 at 07:02 By Help Net Security Cheat sheets are concise, to-the-point references tailored for instant insights. This article provides a curated list of 10 essential cybersecurity cheat sheets, all free to download. Whether you’re seeking a quick refresher or a beginner trying to make sense of

React to this headline:

Loading spinner

10 essential cybersecurity cheat sheets available for free Read More »

Cisco Plugs Gaping Hole in Emergency Responder Software

Cisco Plugs Gaping Hole in Emergency Responder Software 05/10/2023 at 21:31 By Ryan Naraine Cisco warns that unauthenticated, remote attackers can log into devices using root account, which has default, static credentials that cannot be changed or deleted. The post Cisco Plugs Gaping Hole in Emergency Responder Software appeared first on SecurityWeek. This article is

React to this headline:

Loading spinner

Cisco Plugs Gaping Hole in Emergency Responder Software Read More »

GitHub Improves Secret Scanning Feature With Expanded Token Validity Checks

GitHub Improves Secret Scanning Feature With Expanded Token Validity Checks 05/10/2023 at 19:02 By Ionut Arghire GitHub beefs up its secret scanning feature, now allowing users to check the validity of exposed credentials for major cloud services. The post GitHub Improves Secret Scanning Feature With Expanded Token Validity Checks appeared first on SecurityWeek. This article

React to this headline:

Loading spinner

GitHub Improves Secret Scanning Feature With Expanded Token Validity Checks Read More »

Network, Meet Cloud; Cloud, Meet Network

Network, Meet Cloud; Cloud, Meet Network 03/10/2023 at 15:48 By Matt Wilson The widely believed notion that the network and the cloud are two different and distinct entities is not true. The post Network, Meet Cloud; Cloud, Meet Network appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source

React to this headline:

Loading spinner

Network, Meet Cloud; Cloud, Meet Network Read More »

Securing GitHub Actions for a safer DevOps pipeline

Securing GitHub Actions for a safer DevOps pipeline 02/10/2023 at 07:32 By Mirko Zorz GitHub Actions provides a platform for continuous integration and continuous delivery (CI/CD), enabling your build, test, and deployment process automation. It allows you to establish workflows that build and test each pull request in your repository and deploy approved pull requests

React to this headline:

Loading spinner

Securing GitHub Actions for a safer DevOps pipeline Read More »

AWS Using MadPot Decoy System to Disrupt APTs, Botnets

AWS Using MadPot Decoy System to Disrupt APTs, Botnets 29/09/2023 at 21:01 By Ryan Naraine AWS says an internal threat intel decoy system called MadPot has successfully trapped nation state-backed APTs like Volt Typhoon and Sandworm. The post AWS Using MadPot Decoy System to Disrupt APTs, Botnets appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

AWS Using MadPot Decoy System to Disrupt APTs, Botnets Read More »

Sysdig Launches Realtime Attack Graph for Cloud Environments

Sysdig Launches Realtime Attack Graph for Cloud Environments 28/09/2023 at 15:32 By Kevin Townsend Sysdig enhanced its existing CNAPP offering with a cloud attack graph, risk prioritization, attack path analysis, a searchable inventory, and complete agentless scanning. The post Sysdig Launches Realtime Attack Graph for Cloud Environments appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Sysdig Launches Realtime Attack Graph for Cloud Environments Read More »

How to avoid the 4 main pitfalls of cloud identity management

How to avoid the 4 main pitfalls of cloud identity management 28/09/2023 at 08:02 By Help Net Security Securing cloud identities isn’t easy. Organizations need to complete a laundry list of actions to confirm proper configuration, ensure clear visibility into identities, determine and understand who can take what actions, and on top of it all

React to this headline:

Loading spinner

How to avoid the 4 main pitfalls of cloud identity management Read More »

Scroll to Top