#cloud-security

[ follow ]
#cybersecurity
fromZDNET
3 days ago
Information security

DripDropper Linux malware cleans up after itself - how it works

Java
fromThe Hacker News
1 month ago

Alert: Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS

Attackers exploit exposed JDWP interfaces to gain code execution and deploy cryptocurrency miners on compromised systems.
Cryptocurrency
fromThe Hacker News
2 months ago

Weekly Recap: Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More

Cybersecurity threats often start as subtle issues, requiring vigilance and attention to overlooked signals.
Significant DDoS attacks can be mitigated by advanced security measures, even when unprecedented in scale.
fromZDNET
3 days ago
Information security

DripDropper Linux malware cleans up after itself - how it works

fromHackernoon
5 years ago

Forget Perimeters: Here's How Context Is Redefining Cloud Security | HackerNoon

The 'castle and moat' idea has gone from outdated to outright dangerous as applications and users have scattered across public clouds, SaaS platforms, and more.
Privacy professionals
#aws
Information security
fromTechzine Global
2 months ago

SentinelOne joins AWS ISV program to secure software migrations

Organizations must ensure secure migration of software to AWS using adequate security solutions like SentinelOne's Singularity Cloud Security.
Information security
fromThe Hacker News
3 months ago

AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation

Default IAM roles in AWS can be exploited, enabling privilege escalation and account compromise due to overly broad permissions.
Information security
fromThe Hacker News
3 months ago

AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation

Default IAM roles in AWS can be exploited, enabling privilege escalation and account compromise due to overly broad permissions.
fromHackernoon
1 year ago

The HackerNoon Newsletter: Agentic AI and the Rise of Outcome Engineering (8/10/2025) | HackerNoon

Immutable backups prevent ransomware and ensure data integrity, meeting compliance needs with secure, tamper-proof cloud data protection. They safeguard critical data effectively.
Tech industry
Data science
fromHackernoon
2 years ago

How a Startup Using Gremlin Beat Everyone to Google's Door | HackerNoon

Google's acquisition of Wiz for $32 billion signifies a decisive victory in the cloud security sector.
#artificial-intelligence
fromThe Hacker News
2 weeks ago
Artificial intelligence

The AI-Powered Security Shift: What 2025 Is Teaching Us About Cloud Defense

Cloud attacks are evolving; AI serves as both a weapon and a defense mechanism.
fromSecuritymagazine
2 months ago
Information security

84% of Organizations Are Now Using AI in the Cloud

The rapid adoption of AI in cloud environments has introduced significant vulnerabilities and increased security risks for organizations.
Tech industry
fromTechzine Global
2 weeks ago

Good quarterly results for Fortinet, but sharp decline in share price

Fortinet's second quarter of 2025 showed revenue growth, but the stock market reacted negatively to cautious forecasts, causing a significant drop in share price.
fromTechzine Global
2 weeks ago

Upwind drafts in Nyx for cloud security keyhole surgery

Upwind's acquisition of Nyx enhances application security through function-level runtime visibility for real-time threat detection and vulnerability prioritization.
#devops
#cryptojacking
fromTechzine Global
2 weeks ago

The browser is the next security frontier: how do we secure it?

Browsers have become critical endpoints and attack vectors, necessitating improved security measures that current EDR solutions can't provide.
fromInfoWorld
2 weeks ago

Microsegmentation for developers

Microsegmentation now involves separating workload behaviors rather than just network zones, reflecting both technical and cultural shifts in security responsibilities.
Tech industry
fromBusiness Insider
2 weeks ago

The cofounder of Wiz, Google's $32 billion acquisition target, says vibe coding must be met with 'vibe security'

Google's acquisition of Wiz signals a renewed interest in major tech deals.
Cryptocurrency
fromThe Hacker News
4 weeks ago

Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks

Two malware campaigns, Soco404 and Koske, exploit cloud vulnerabilities to deliver cryptocurrency miners.
fromHackernoon
2 months ago

Immutable Backups: Everything You Need To Know To Protect Your Cloud | HackerNoon

Immutable backups provide protection against ransomware and ensure data integrity by preventing alterations or deletions once created.
fromDevOps.com
4 weeks ago

ControlMonkey Adds Dashboard to Manage IaC Risk - DevOps.com

ControlMonkey added a risk index dashboard to its automation platform for managing Terraform-based infrastructure as code.
fromMedium
1 month ago

Unlock Your Potential as a Federal Cloud Solutions Architect!

CFCSA certification is crucial for designing compliant cloud solutions in the U.S. federal sector.
fromSocpub
1 month ago

How to Create a Data Backup Strategy for Your Business

One corrupt table or misconfigured bucket can stall an entire supply chain run. Fortunately, a clear-headed backup strategy turns that existential threat into a five-minute inconvenience.
Digital life
#ai
fromThe Hacker News
1 month ago

Securing Agentic AI: How to Protect the Invisible Identity Access

AI agents can automate processes but pose significant identity risks due to their reliance on high-privilege credentials and unpredictable behaviors.
Privacy professionals
fromInfoWorld
1 month ago

Three steps to boost Amazon S3 data security

Organizations must audit identities with SSE-C privileges to enhance data security.
Strictly manage user access to sensitive data to prevent breaches.
Vue
fromVuejobs
1 month ago

[Relocation Required] Junior Front-end Engineer (Vue) at HENNGE K.K.

HENNGE delivers cloud security solutions that empower flexible remote work, enhancing productivity while ensuring top-tier security.
fromHackernoon
2 years ago

I Thought My Cloud Setup Was Secure - Until It Wasn't | HackerNoon

Cloud security mistakes often stem from misconfigurations and lack of proper IAM auditing, leading to potential data breaches and increased costs.
from24/7 Wall St.
1 month ago

Summer 2025 Preview: Keep These 3 Stocks on Your Radar

As we prepare for the second half of 2025, investors should focus on stocks in the AI and cloud security sectors, which offer strong growth potential.
Startup companies
fromTechzine Global
1 month ago

The state of cloud security

According to Erik de Jong, the Wiz acquisition could be detrimental to customers; consolidation in the market rarely leads to lower prices.
Information security
Tech industry
fromTheregister
1 month ago

Microsoft to retire default outbound access for VMs in Azure

Microsoft is retiring default outbound access for VMs in Azure in September, requiring developers to understand networking better.
fromZDNET
2 months ago

NordPass lets you store passports and other IDs now - but is this safe?

NordPass has introduced 'Documents', a cloud-based encrypted vault for secure storage of vital documents, enhancing user convenience and security.
Privacy professionals
fromTechzine Global
2 months ago

AWS hits a big milestone: 100% MFA for root users

AWS mandated multi-factor authentication (MFA) for root access accounts in 2023, enhancing security in cloud environments.
MFA significantly boosts security but isn't infallible; additional measures are necessary to combat sophisticated attacks.
fromTechzine Global
2 months ago

CrowdStrike launches Falcon for AWS Security Incident Response

CrowdStrike introduces Falcon for AWS Security Incident Response, enhancing cloud cybersecurity with faster threat detection and incident response capabilities.
Artificial intelligence
fromSilicon Canals
2 months ago

London-based Maze secures 22.5M to beat hackers at their own game through an AI agent - Silicon Canals

Maze has raised $25M in Series A funding to enhance its AI-native cloud security platform for vulnerability investigation and resolution.
Information security
fromTechzine Global
2 months ago

Cisco warns of vulnerability in cloud passwords

A critical flaw in Cisco ISE allows attackers to access sensitive data and modify system settings across cloud platforms.
Remote access to sensitive data is possible due to shared credentials in cloud installations. It scores a CVSS of 9.9.
Information security
fromSecuritymagazine
2 months ago

71% of Organizations Cannot Cover the Cloud Environment With Current Tools

Complex cloud environments challenge organizations' cloud security management.
Despite high confidence in security, significant concerns about unauthorized services and tool coverage exist.
fromTechzine Global
3 months ago

Red Hat introduces cloud-optimized RHEL

The new approach, which will be available with the launch of Red Hat Enterprise Linux 10, offers users preconfigured, ready-to-use images designed to handle the unique characteristics of different hyperscalers.
Tech industry
Information security
fromTechzine Global
3 months ago

Active exploitation of vulnerabilities in Ivanti EPMM

Ivanti's Endpoint Manager Mobile has critical vulnerabilities exploited in both on-premises and cloud environments, allowing remote code execution without authentication.
fromInfoWorld
3 months ago

Cloud asset management: A crucial missing ingredient

Failing to recognize the need for CAM leads to additional problems. The financial aspect is the most paramount and urgent. Untracked and unmanaged resources such as idle virtual machines or overallocated storage accumulate costs that are often unnoticed until they appear on a bloated monthly statement.
Marketing tech
fromMedium
3 months ago

How-to set up Google Cloud (GCP) credentials in HCP Terraform Cloud

Terraform Cloud deployment to GCP needs service account access with precise permissions to function properly.
Least privilege principle is crucial in assigning roles and permissions for security during infrastructure provisioning.
fromTheregister
3 months ago

Snowflake CISO talks lessons learned from breaches, improv

It was an unfortunate situation that our customers went through, and we've really pivoted from a shared-security model to more of a shared-destiny model with our customers.
Information security
fromHackernoon
2 years ago

The HackerNoon Newsletter: Vue.js: Propagating Props Like a Pro (5/10/2025) | HackerNoon

Quantum computing is fast approaching, threatening cloud security - leaders must act now to defend the emergence of data as new cryptographic risks.
Women in technology
fromInfoQ
3 months ago

Visibility in Cloud Security: How Exactly Are Our Cloud Environments Configured?

Understanding security posture management is essential for identifying breaches and misconfigurations in cloud environments.
fromThe Hacker News
3 months ago

Entra ID Data Protection: Essential or Overkill?

Microsoft Entra ID is pivotal for modern identity management, particularly amid rising sophisticated cyber threats.
NYC startup
fromTechzine Global
3 months ago

Upwind makes its M&A debut with Nyx acquisition

Upwind's acquisition of Nyx enhances real-time threat detection and integrates deeper application monitoring into its platform.
fromIT Pro
4 months ago

CISA issues warning in wake of Oracle cloud credentials leak

CISA warns of potential data breach risks from a security incident involving legacy Oracle cloud environments, urging enterprises to strengthen their security defenses.
Information security
[ Load more ]