#cloud-security

[ follow ]
#vulnerability-management
fromSilicon Canals
3 months ago
Artificial intelligence

London-based Maze secures 22.5M to beat hackers at their own game through an AI agent - Silicon Canals

fromSilicon Canals
3 months ago
Artificial intelligence

London-based Maze secures 22.5M to beat hackers at their own game through an AI agent - Silicon Canals

fromInfoWorld
2 days ago

When personal ambitions undermine enterprise security

Cloud computing forms the backbone of our increasingly digital world, enabling businesses to operate more efficiently, grow faster, and innovate with flexibility. Despite its advantages, the cloud is not immune to data breaches caused by weak security practices. Alarmingly, some of the biggest risks do not stem from technical errors or malicious hackers but from the very people responsible for protecting cloud resources: security professionals themselves.
Information security
Information security
fromTechzine Global
2 days ago

Check Point and Wiz launch integrated cloud security

Integrated Check Point and Wiz solution provides real-time visibility and AI-driven prevention to secure cloud environments and reduce gateway configuration risks.
fromMedium
2 weeks ago

Cloud FinOps Meets DevSecOps: Money-First, Secure Always

Cloud costs are your canary in the coal mine - and a security signal too. Imagine you're staring at your cloud dashboard, and bam - a sudden spike in spending hits you. It's not just burning cash; it's waving a red flag for potential security holes. That unexplained surge in Kubernetes pods? Could be a sneaky cryptojacker. Or those idle EC2 instances racking up bills?
DevOps
fromTechzine Global
6 days ago

Darktrace launches fully automated cloud forensics

Darktrace introduces the industry's first fully automated cloud forensics solution. Forensic Acquisition & Investigation aims to reduce investigation times from days to minutes by collecting evidence immediately when threats are detected. A survey of 300 cloud security decision-makers shows that nearly 90 percent of organizations suffer damage before they can contain cloud incidents. Additionally, investigations in cloud environments take three to five days longer than those in on-premises environments.
Information security
fromThe Verge
1 week ago

DOGE might be storing every American's SSN on an insecure cloud server

A new report from Senate Democrats claims members of Elon Musk's DOGE team have access to the Social Security Numbers of all Americans in a cloud server lacking verified security measures, despite an internal assessment of potential "catastrophic" risk. The report, released by Sen. Gary Peters (D-MI), cites numerous disclosures from whistleblowers, including one who said a worst-case scenario could involve having to re-issue SSNs to everyone in the country.
US politics
fromZDNET
1 week ago

Battered by cyberattacks, is Salesforce facing a trust problem?

ZDNET's key takeaways The FBI warned about the alarming trend of compromised accounts. The success rate of threat actors could tarnish Salesforce's reputation. The most recent wave of attacks was likely preventable.
Information security
US politics
fromNextgov.com
1 week ago

Democrat report: DOGE is risking Americans' data by operating outside federal law

Department of Government Efficiency personnel uploaded Americans' sensitive personal data into insecure cloud environments, creating serious cybersecurity, privacy, and corruption risks.
fromNextgov.com
1 week ago

GSA launches second phase of FedRAMP 20x backed by OMB

I have done FedRAMP in my past life,
US politics
Information security
fromTechzine Global
1 week ago

Cloud security cannot be outsourced - it's up to your organization

Cloud security requires rigorous vendor scrutiny, clear prioritization of critical systems, and a balanced approach between usability, protection, and cost.
fromSecurityWeek
1 week ago

Researchers Earn $150,000 for L1TF Exploit Leaking Data From Public Cloud

Academic researchers from Vrije Universiteit Amsterdam have demonstrated that transient execution CPU vulnerabilities are practical to exploit in real-world scenarios to leak memory from VMs running on public cloud services. The research shows that L1TF (L1 Terminal Fault), also known as Foreshadow, a bug in Intel processors reported in January 2018, and half-Spectre, gadgets believed unexploitable on new-generation CPUs, as they cannot directly leak secret data, can be used together to leak data from the public cloud.
Information security
Information security
fromComputerWeekly.com
1 week ago

Balancing IT security with AI and cloud innovation | Computer Weekly

Cloud-based AI adoption ties organisational AI strategies to cloud security and availability while SLAs often omit data protection, breach response, and regulatory responsibilities.
fromArs Technica
1 week ago

Microsoft's Entra ID vulnerabilities could have been catastrophic

Microsoft built security controls around identity like conditional access and logs, but this internal impression token mechanism bypasses them all,
Information security
fromTheregister
1 week ago

OpenAI plugs ShadowLeak bug in ChatGPT

ChatGPT's research assistant sprung a leak - since patched - that let attackers steal Gmail secrets with just a single carefully crafted email. Deep Research, a tool unveiled by OpenAI in February, enables users to ask ChatGPT to browse the internet or their personal email inbox and generate a detailed report on its findings. The tool can be integrated with apps like Gmail and GitHub, allowing people to do deep dives into their own documents and messages without ever leaving the chat window.
Information security
Business
fromTechzine Global
1 week ago

Netskope reaches valuation of $8.6 billion after IPO

Netskope's Nasdaq IPO closed 18% higher, valuing the company at about $8.6 billion after raising $908 million amid strong ARR growth and cloud-security demand.
#microsoft-entra-id
fromWIRED
2 weeks ago
Information security

This Microsoft Entra ID Vulnerability Could Have Caused a Digital Catastrophe

fromWIRED
2 weeks ago
Information security

This Microsoft Entra ID Vulnerability Could Have Caused a Digital Catastrophe

Information security
fromArs Technica
2 weeks ago

Trump admin says Social Security database wasn't "leaked, hacked, or shared"

A whistleblower alleged SSA placed a high-value asset containing data on over 450 million people in an uncontrolled AWS cloud environment, prompting an involuntary resignation.
fromSecurityWeek
2 weeks ago

Virtual Event Today: Attack Surface Management Summit

SecurityWeek's Attack Surface Management Virtual Summit is now LIVE and runs today from 11AM - 4PM ET. Join the online event where cybersecurity leaders and practitioners will dive into the strategies, tools, and innovations shaping the future of ASM. As digital assets and cloud services continue to expand, defenders are shifting tactics to continuously discover, inventory, classify, prioritize, and monitor their attack surfaces.
Information security
#incident-response
Information security
fromDataBreaches.Net
2 weeks ago

Scattered Spider Tied to Fresh Attacks on Financial Services - DataBreaches.Net

Some Scattered Spider actors continue active, sophisticated intrusions, breaching a U.S. bank and targeting cloud repositories like AWS and Snowflake after claiming to retire.
Information security
fromInfoWorld
2 weeks ago

Are cloud providers neglecting security to chase AI?

Rapid AI and hybrid cloud investments are fragmenting cloud security, eroding enterprise trust in cloud platforms' ability to protect systems.
fromSecurityWeek
2 weeks ago

In Other News: $900k for XSS Bugs, HybridPetya Malware, Burger King Censors Research

Two researchers reported finding serious vulnerabilities, including ones that expose employee information and drive-through orders, in systems run by Restaurant Brands International (RBI), which owns the Tim Hortons, Burger King and Popeyes brands. The vulnerabilities were reported to the vendor and quickly fixed. In addition, RBI said the system targeted by the researchers is still in early development. However, the company still sent a DMCA complaint to the researchers to force them to remove the blog post detailing their findings.
Information security
fromIT Pro
3 weeks ago

The unseen risks of cloud storage for businesses

Cloud storage is used by most businesses, with 78% of respondents to a 2024 PwC survey indicating they've adopted cloud across most of their organizations. But many firms are unknowingly opening themselves up to security and data protection risks: sensitive data is being held in 9% of publicly-accessible cloud storage, and 97% of this information is classified as restricted or confidential, according to Tenable's 2025 Cloud Security Risk Report.
Information security
fromComputerWeekly.com
3 weeks ago

SLA promises, security realities: Navigating the shared responsibility gap | Computer Weekly

SLAs typically cover metrics like uptime, support response times and service performance, but often overlook critical elements such as data protection, breach response and regulatory compliance. This creates a responsibility gap, where assumptions about who is accountable can lead to serious blind spots. For instance, a customer might assume that the cloud provider's SLA guarantees data protection, only to realise that their own misconfigurations or weak identity management practices have led to a data breach.
Information security
#social-security
fromTechCrunch
1 month ago
Information security

DOGE uploaded live copy of Social Security database to 'vulnerable' cloud server, says whistleblower | TechCrunch

fromTechCrunch
1 month ago
Information security

DOGE uploaded live copy of Social Security database to 'vulnerable' cloud server, says whistleblower | TechCrunch

fromwww.theguardian.com
1 month ago

Elon Musk's Doge put sensitive social security data at risk, whistleblower says

The complaint from Charles Borges, the chief data officer at the SSA, alleges that Doge staffers effectively created a live copy of the entire country's social security data from its numerical identification system database. The information is a goldmine for bad actors, the complaint alleges, and was placed on a server without independent oversight that only Doge officials could access.
US politics
#cybersecurity
fromZDNET
1 month ago
Information security

DripDropper Linux malware cleans up after itself - how it works

Online learning
fromEntrepreneur
2 months ago

These IT Skills Could Be the Career Edge You Need, for Just $35 | Entrepreneur

A massive cybersecurity and IT training bundle offers 16 courses for $34.97, helping individuals gain certifications and skills for real-world applications.
Java
fromThe Hacker News
2 months ago

Alert: Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS

Attackers exploit exposed JDWP interfaces to gain code execution and deploy cryptocurrency miners on compromised systems.
fromZDNET
1 month ago
Information security

DripDropper Linux malware cleans up after itself - how it works

fromClickUp
1 month ago

10 Best Wiz Competitors and Alternatives for Cloud Security

Is Wiz giving you solid visibility but falling short on real-time remediation, host-level telemetry, or network traffic analysis? Safe to say, you're not the only one noticing the gaps. As cloud environments become increasingly complex, security teams require tools that identify risks and help mitigate them. This blog post breaks down some of the best Wiz competitors that fill in those missing pieces. Stick around till the end to see how ClickUp (yes, the productivity platform!) supports efficient cloud security collaboration. 🔐
Information security
fromHackernoon
5 years ago

Forget Perimeters: Here's How Context Is Redefining Cloud Security | HackerNoon

The 'castle and moat' idea has gone from outdated to outright dangerous as applications and users have scattered across public clouds, SaaS platforms, and more.
Privacy professionals
#aws
Information security
fromTechzine Global
3 months ago

SentinelOne joins AWS ISV program to secure software migrations

Organizations must ensure secure migration of software to AWS using adequate security solutions like SentinelOne's Singularity Cloud Security.
Information security
fromThe Hacker News
4 months ago

AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation

Default IAM roles in AWS can be exploited, enabling privilege escalation and account compromise due to overly broad permissions.
Information security
fromThe Hacker News
4 months ago

AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation

Default IAM roles in AWS can be exploited, enabling privilege escalation and account compromise due to overly broad permissions.
fromHackernoon
1 year ago

The HackerNoon Newsletter: Agentic AI and the Rise of Outcome Engineering (8/10/2025) | HackerNoon

Immutable backups prevent ransomware and ensure data integrity, meeting compliance needs with secure, tamper-proof cloud data protection. They safeguard critical data effectively.
Tech industry
Data science
fromHackernoon
2 years ago

How a Startup Using Gremlin Beat Everyone to Google's Door | HackerNoon

Google's acquisition of Wiz for $32 billion signifies a decisive victory in the cloud security sector.
#artificial-intelligence
fromThe Hacker News
1 month ago
Artificial intelligence

The AI-Powered Security Shift: What 2025 Is Teaching Us About Cloud Defense

Cloud attacks are evolving; AI serves as both a weapon and a defense mechanism.
fromSecuritymagazine
3 months ago
Information security

84% of Organizations Are Now Using AI in the Cloud

The rapid adoption of AI in cloud environments has introduced significant vulnerabilities and increased security risks for organizations.
Tech industry
fromTechzine Global
1 month ago

Good quarterly results for Fortinet, but sharp decline in share price

Fortinet's second quarter of 2025 showed revenue growth, but the stock market reacted negatively to cautious forecasts, causing a significant drop in share price.
Privacy technologies
fromTechzine Global
1 month ago

Upwind drafts in Nyx for cloud security keyhole surgery

Upwind's acquisition of Nyx enhances application security through function-level runtime visibility for real-time threat detection and vulnerability prioritization.
#devops
#cryptojacking
fromSecuritymagazine
2 months ago
Privacy professionals

DevOps Missteps Fuel Crypto-Mining: Why Infrastructure Observability Is a Security Imperative

Cryptojacking poses a serious threat by exploiting misconfigured cloud environments, leading to significant cost increases and resource depletion.
fromThe Hacker News
4 months ago
DevOps

Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub

A new cryptojacking campaign exploits vulnerabilities in DevOps servers to mine cryptocurrencies.
Privacy technologies
fromTechzine Global
1 month ago

The browser is the next security frontier: how do we secure it?

Browsers have become critical endpoints and attack vectors, necessitating improved security measures that current EDR solutions can't provide.
Software development
fromInfoWorld
1 month ago

Microsegmentation for developers

Microsegmentation now involves separating workload behaviors rather than just network zones, reflecting both technical and cultural shifts in security responsibilities.
Tech industry
fromBusiness Insider
1 month ago

The cofounder of Wiz, Google's $32 billion acquisition target, says vibe coding must be met with 'vibe security'

Google's acquisition of Wiz signals a renewed interest in major tech deals.
Cryptocurrency
fromThe Hacker News
2 months ago

Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks

Two malware campaigns, Soco404 and Koske, exploit cloud vulnerabilities to deliver cryptocurrency miners.
Privacy technologies
fromHackernoon
3 months ago

Immutable Backups: Everything You Need To Know To Protect Your Cloud | HackerNoon

Immutable backups provide protection against ransomware and ensure data integrity by preventing alterations or deletions once created.
US politics
fromMedium
2 months ago

Unlock Your Potential as a Federal Cloud Solutions Architect!

CFCSA certification is crucial for designing compliant cloud solutions in the U.S. federal sector.
fromSocpub
2 months ago

How to Create a Data Backup Strategy for Your Business

One corrupt table or misconfigured bucket can stall an entire supply chain run. Fortunately, a clear-headed backup strategy turns that existential threat into a five-minute inconvenience.
Digital life
#ai
fromTechzine Global
2 months ago
Privacy technologies

Zero Trust is the compass in the AI storm

AI is radically changing the workplace and presenting cybersecurity challenges, necessitating a shift to Zero Trust architecture.
fromIT Pro
4 months ago
Information security

Growing AI workloads are causing hybrid cloud headaches

IT leaders are increasingly worried about the strain on hybrid cloud infrastructure due to AI workloads and related security threats.
Privacy professionals
fromThe Hacker News
2 months ago

Securing Agentic AI: How to Protect the Invisible Identity Access

AI agents can automate processes but pose significant identity risks due to their reliance on high-privilege credentials and unpredictable behaviors.
Privacy professionals
fromInfoWorld
3 months ago

Three steps to boost Amazon S3 data security

Organizations must audit identities with SSE-C privileges to enhance data security.
Strictly manage user access to sensitive data to prevent breaches.
Vue
fromVuejobs
3 months ago

[Relocation Required] Junior Front-end Engineer (Vue) at HENNGE K.K.

HENNGE delivers cloud security solutions that empower flexible remote work, enhancing productivity while ensuring top-tier security.
Information security
fromHackernoon
2 years ago

I Thought My Cloud Setup Was Secure - Until It Wasn't | HackerNoon

Cloud security mistakes often stem from misconfigurations and lack of proper IAM auditing, leading to potential data breaches and increased costs.
from24/7 Wall St.
3 months ago

Summer 2025 Preview: Keep These 3 Stocks on Your Radar

As we prepare for the second half of 2025, investors should focus on stocks in the AI and cloud security sectors, which offer strong growth potential.
Startup companies
fromTechzine Global
3 months ago

The state of cloud security

According to Erik de Jong, the Wiz acquisition could be detrimental to customers; consolidation in the market rarely leads to lower prices.
Information security
Tech industry
fromTheregister
3 months ago

Microsoft to retire default outbound access for VMs in Azure

Microsoft is retiring default outbound access for VMs in Azure in September, requiring developers to understand networking better.
fromZDNET
3 months ago

NordPass lets you store passports and other IDs now - but is this safe?

NordPass has introduced 'Documents', a cloud-based encrypted vault for secure storage of vital documents, enhancing user convenience and security.
Privacy professionals
Privacy technologies
fromTechzine Global
3 months ago

AWS hits a big milestone: 100% MFA for root users

AWS mandated multi-factor authentication (MFA) for root access accounts in 2023, enhancing security in cloud environments.
MFA significantly boosts security but isn't infallible; additional measures are necessary to combat sophisticated attacks.
European startups
fromTechzine Global
3 months ago

CrowdStrike launches Falcon for AWS Security Incident Response

CrowdStrike introduces Falcon for AWS Security Incident Response, enhancing cloud cybersecurity with faster threat detection and incident response capabilities.
Information security
fromTechzine Global
3 months ago

Cisco warns of vulnerability in cloud passwords

A critical flaw in Cisco ISE allows attackers to access sensitive data and modify system settings across cloud platforms.
Remote access to sensitive data is possible due to shared credentials in cloud installations. It scores a CVSS of 9.9.
Information security
fromSecuritymagazine
3 months ago

71% of Organizations Cannot Cover the Cloud Environment With Current Tools

Complex cloud environments challenge organizations' cloud security management.
Despite high confidence in security, significant concerns about unauthorized services and tool coverage exist.
fromTechzine Global
4 months ago

Red Hat introduces cloud-optimized RHEL

The new approach, which will be available with the launch of Red Hat Enterprise Linux 10, offers users preconfigured, ready-to-use images designed to handle the unique characteristics of different hyperscalers.
Tech industry
Information security
fromTechzine Global
4 months ago

Active exploitation of vulnerabilities in Ivanti EPMM

Ivanti's Endpoint Manager Mobile has critical vulnerabilities exploited in both on-premises and cloud environments, allowing remote code execution without authentication.
fromInfoWorld
4 months ago

Cloud asset management: A crucial missing ingredient

Failing to recognize the need for CAM leads to additional problems. The financial aspect is the most paramount and urgent. Untracked and unmanaged resources such as idle virtual machines or overallocated storage accumulate costs that are often unnoticed until they appear on a bloated monthly statement.
Marketing tech
DevOps
fromMedium
4 months ago

How-to set up Google Cloud (GCP) credentials in HCP Terraform Cloud

Terraform Cloud deployment to GCP needs service account access with precise permissions to function properly.
Least privilege principle is crucial in assigning roles and permissions for security during infrastructure provisioning.
fromTheregister
4 months ago

Snowflake CISO talks lessons learned from breaches, improv

It was an unfortunate situation that our customers went through, and we've really pivoted from a shared-security model to more of a shared-destiny model with our customers.
Information security
fromHackernoon
2 years ago

The HackerNoon Newsletter: Vue.js: Propagating Props Like a Pro (5/10/2025) | HackerNoon

Quantum computing is fast approaching, threatening cloud security - leaders must act now to defend the emergence of data as new cryptographic risks.
Women in technology
Information security
fromInfoQ
4 months ago

Visibility in Cloud Security: How Exactly Are Our Cloud Environments Configured?

Understanding security posture management is essential for identifying breaches and misconfigurations in cloud environments.
NYC startup
fromTechzine Global
5 months ago

Upwind makes its M&A debut with Nyx acquisition

Upwind's acquisition of Nyx enhances real-time threat detection and integrates deeper application monitoring into its platform.
[ Load more ]