Clouding the issue: what cloud threats lie in wait in 2022?

Credit to Author: Christopher Boyd| Date: Thu, 17 Mar 2022 13:25:43 +0000

We offer up some thoughts on where new and continuing attacks in the world of cloud may occur, alongside linking some current examples.

The post Clouding the issue: what cloud threats lie in wait in 2022? appeared first on Malwarebytes Labs.

Read more

Smart Check Validated for New Bottlerocket OS

Credit to Author: Trend Micro| Date: Tue, 10 Mar 2020 23:35:40 +0000

Containers provide a list of benefits to organizations that use them. They’re light, flexible, add consistency across the environment and operate in isolation. However, security concerns prevent some organizations from employing containers. This is despite containers having an extra layer of security built in – they don’t run directly on the host OS. To make…

The post Smart Check Validated for New Bottlerocket OS appeared first on .

Read more

Trend Micro Cloud App Security Blocked 12.7 Million High-Risk Email Threats in 2019 – in addition to those detected by cloud email services’ built-in security

Credit to Author: Chris Taylor| Date: Tue, 10 Mar 2020 17:27:10 +0000

On March 3, 2020, the cyber division of Federal Bureau of Investigation (FBI) issued a private industry notification calling out Business Email Compromise (BEC) scams through exploitation of cloud-based email services. Microsoft Office 365 and Google G Suite, the two largest cloud-based email services, are targeted by cyber criminals based on FBI complaint information since…

The post Trend Micro Cloud App Security Blocked 12.7 Million High-Risk Email Threats in 2019 – in addition to those detected by cloud email services’ built-in security appeared first on .

Read more

Harden your public cloud environment against APT-style attacks

Credit to Author: Editor| Date: Tue, 25 Feb 2020 13:36:43 +0000

A new APT-style attack combines a bypassing technique with a multi-platform payload to target both Windows and Linux cloud workloads. Stop the attack with technical advice from Sophos.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/q61MwUx5OsI” height=”1″ width=”1″ alt=””/>

Read more

Private photos leaked by PhotoSquared’s unsecured cloud storage

Credit to Author: Lisa Vaas| Date: Wed, 19 Feb 2020 11:49:20 +0000

With no password required and no encryption in place, a burglar or ID thief could have seen your photos, your address and more.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/v6L-VwD68-Y” height=”1″ width=”1″ alt=””/>

Read more

Sophos Cloud Optix breakthrough IAM visualization is here

Credit to Author: Rich Beckett| Date: Mon, 17 Feb 2020 15:46:55 +0000

Easily visualize the relationships between IAM roles, IAM users, and services, and much more with the latest Sophos Cloud Optix release.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/W2wW5OLmqeQ” height=”1″ width=”1″ alt=””/>

Read more

Data about inmates and jail staff spilled by leaky prison app

Credit to Author: Lisa Vaas| Date: Wed, 12 Feb 2020 10:16:24 +0000

A web-mapping project came across detainees’ prescriptions and other PII that could be used by identity thieves to victimize prisoners.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/ypFJWLIWMOE” height=”1″ width=”1″ alt=””/>

Read more