cloud security
Malware that spreads via Redis now capable of deploying ransomware
P2Pinfect now able to deploy ransomware and crypto miner payloads.
cloud security
P2Pinfect now able to deploy ransomware and crypto miner payloads.
AWS
Datadog suggests AWS Amplify users conduct "an audit of your roles and potential threat activity" after investigation.
AWS
"No system is infallible. Sometimes, it is AWS..."
Kubernetes
Google says "we've taken several steps to reduce the risk of users making authorization errors with the Kubernetes built-in users and groups, including..."
News
Google unveiled a series of AI-centric features for its various cloud offerings, with security in particular being a focus
cloud security
Even with ‘traditional’ configuration of resources in the cloud - and Kubernetes becomes a more extreme example of this – what is crystal clear is that security cannot stay outside of the development and DevOps teams."
Azure
"The risk is mainly with multi-tenant applications where this misconfiguration could result [in] account and privilege escalation" -- here's what you need to do.
Cybersecurity
With harvested credentials some groups spun up additional resources until they exhausted the credit cards on file...
Cybersecurity
A recent attack tracked by researchers at cloud security company Sysdig saw the attackers use an exposed Kubernetes container to move laterally to the victim’s AWS account – gaining initial access by exploiting a public-facing service in a self-managed Kubernetes cluster hosted inside an AWS cloud account. The company'
Cybersecurity
Days before the exposure this week of over three terabytes of military emails owing to misconfigured Azure services, the US Department of Defense (DoD)’s Inspector General had warned Pentagon CIOs that their teams were not properly reviewing documentation designed to ensure military cloud security – and running systems with unmitigated
Cloud
Oracle fixed the vulnerability "extraordinarily quickly" in July, but it is unclear when it was introduced
Cybersecurity
Strong new requirements for cloud providers and network security on their way.