#cloud-security

[ follow ]
Information security
fromInfoWorld
59 minutes ago

Are cloud providers neglecting security to chase AI?

Rapid AI and hybrid cloud investments are fragmenting cloud security, eroding enterprise trust in cloud platforms' ability to protect systems.
fromSecurityWeek
3 days ago

In Other News: $900k for XSS Bugs, HybridPetya Malware, Burger King Censors Research

Two researchers reported finding serious vulnerabilities, including ones that expose employee information and drive-through orders, in systems run by Restaurant Brands International (RBI), which owns the Tim Hortons, Burger King and Popeyes brands. The vulnerabilities were reported to the vendor and quickly fixed. In addition, RBI said the system targeted by the researchers is still in early development. However, the company still sent a DMCA complaint to the researchers to force them to remove the blog post detailing their findings.
Information security
fromIT Pro
5 days ago

The unseen risks of cloud storage for businesses

Cloud storage is used by most businesses, with 78% of respondents to a 2024 PwC survey indicating they've adopted cloud across most of their organizations. But many firms are unknowingly opening themselves up to security and data protection risks: sensitive data is being held in 9% of publicly-accessible cloud storage, and 97% of this information is classified as restricted or confidential, according to Tenable's 2025 Cloud Security Risk Report.
Information security
fromComputerWeekly.com
1 week ago

SLA promises, security realities: Navigating the shared responsibility gap | Computer Weekly

SLAs typically cover metrics like uptime, support response times and service performance, but often overlook critical elements such as data protection, breach response and regulatory compliance. This creates a responsibility gap, where assumptions about who is accountable can lead to serious blind spots. For instance, a customer might assume that the cloud provider's SLA guarantees data protection, only to realise that their own misconfigurations or weak identity management practices have led to a data breach.
Information security
Information security
fromSecuritymagazine
2 weeks ago

Jennifer Swann - Great Leaders Don't Just Manage Teams - They Build Them

Jennifer Swann progressed from bank teller to director-level information security, focusing on incident response, team building, and broad security programs including cloud and vulnerability management.
#social-security
fromTechCrunch
2 weeks ago
Information security

DOGE uploaded live copy of Social Security database to 'vulnerable' cloud server, says whistleblower | TechCrunch

fromTechCrunch
2 weeks ago
Information security

DOGE uploaded live copy of Social Security database to 'vulnerable' cloud server, says whistleblower | TechCrunch

fromwww.theguardian.com
2 weeks ago

Elon Musk's Doge put sensitive social security data at risk, whistleblower says

The complaint from Charles Borges, the chief data officer at the SSA, alleges that Doge staffers effectively created a live copy of the entire country's social security data from its numerical identification system database. The information is a goldmine for bad actors, the complaint alleges, and was placed on a server without independent oversight that only Doge officials could access.
US politics
#cybersecurity
fromZDNET
3 weeks ago
Information security

DripDropper Linux malware cleans up after itself - how it works

Online learning
fromEntrepreneur
1 month ago

These IT Skills Could Be the Career Edge You Need, for Just $35 | Entrepreneur

A massive cybersecurity and IT training bundle offers 16 courses for $34.97, helping individuals gain certifications and skills for real-world applications.
Java
fromThe Hacker News
2 months ago

Alert: Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS

Attackers exploit exposed JDWP interfaces to gain code execution and deploy cryptocurrency miners on compromised systems.
fromZDNET
3 weeks ago
Information security

DripDropper Linux malware cleans up after itself - how it works

fromClickUp
3 weeks ago

10 Best Wiz Competitors and Alternatives for Cloud Security

Is Wiz giving you solid visibility but falling short on real-time remediation, host-level telemetry, or network traffic analysis? Safe to say, you're not the only one noticing the gaps. As cloud environments become increasingly complex, security teams require tools that identify risks and help mitigate them. This blog post breaks down some of the best Wiz competitors that fill in those missing pieces. Stick around till the end to see how ClickUp (yes, the productivity platform!) supports efficient cloud security collaboration. 🔐
Information security
fromHackernoon
5 years ago

Forget Perimeters: Here's How Context Is Redefining Cloud Security | HackerNoon

The 'castle and moat' idea has gone from outdated to outright dangerous as applications and users have scattered across public clouds, SaaS platforms, and more.
Privacy professionals
#aws
Information security
fromTechzine Global
3 months ago

SentinelOne joins AWS ISV program to secure software migrations

Organizations must ensure secure migration of software to AWS using adequate security solutions like SentinelOne's Singularity Cloud Security.
Information security
fromThe Hacker News
3 months ago

AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation

Default IAM roles in AWS can be exploited, enabling privilege escalation and account compromise due to overly broad permissions.
Information security
fromThe Hacker News
3 months ago

AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation

Default IAM roles in AWS can be exploited, enabling privilege escalation and account compromise due to overly broad permissions.
fromHackernoon
1 year ago

The HackerNoon Newsletter: Agentic AI and the Rise of Outcome Engineering (8/10/2025) | HackerNoon

Immutable backups prevent ransomware and ensure data integrity, meeting compliance needs with secure, tamper-proof cloud data protection. They safeguard critical data effectively.
Tech industry
Data science
fromHackernoon
2 years ago

How a Startup Using Gremlin Beat Everyone to Google's Door | HackerNoon

Google's acquisition of Wiz for $32 billion signifies a decisive victory in the cloud security sector.
#artificial-intelligence
fromThe Hacker News
1 month ago
Artificial intelligence

The AI-Powered Security Shift: What 2025 Is Teaching Us About Cloud Defense

Cloud attacks are evolving; AI serves as both a weapon and a defense mechanism.
fromSecuritymagazine
3 months ago
Information security

84% of Organizations Are Now Using AI in the Cloud

The rapid adoption of AI in cloud environments has introduced significant vulnerabilities and increased security risks for organizations.
Tech industry
fromTechzine Global
1 month ago

Good quarterly results for Fortinet, but sharp decline in share price

Fortinet's second quarter of 2025 showed revenue growth, but the stock market reacted negatively to cautious forecasts, causing a significant drop in share price.
Privacy technologies
fromTechzine Global
1 month ago

Upwind drafts in Nyx for cloud security keyhole surgery

Upwind's acquisition of Nyx enhances application security through function-level runtime visibility for real-time threat detection and vulnerability prioritization.
#devops
#cryptojacking
fromSecuritymagazine
1 month ago
Privacy professionals

DevOps Missteps Fuel Crypto-Mining: Why Infrastructure Observability Is a Security Imperative

Cryptojacking poses a serious threat by exploiting misconfigured cloud environments, leading to significant cost increases and resource depletion.
fromThe Hacker News
3 months ago
DevOps

Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub

A new cryptojacking campaign exploits vulnerabilities in DevOps servers to mine cryptocurrencies.
Privacy technologies
fromTechzine Global
1 month ago

The browser is the next security frontier: how do we secure it?

Browsers have become critical endpoints and attack vectors, necessitating improved security measures that current EDR solutions can't provide.
Software development
fromInfoWorld
1 month ago

Microsegmentation for developers

Microsegmentation now involves separating workload behaviors rather than just network zones, reflecting both technical and cultural shifts in security responsibilities.
Tech industry
fromBusiness Insider
1 month ago

The cofounder of Wiz, Google's $32 billion acquisition target, says vibe coding must be met with 'vibe security'

Google's acquisition of Wiz signals a renewed interest in major tech deals.
Cryptocurrency
fromThe Hacker News
1 month ago

Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks

Two malware campaigns, Soco404 and Koske, exploit cloud vulnerabilities to deliver cryptocurrency miners.
Privacy technologies
fromHackernoon
3 months ago

Immutable Backups: Everything You Need To Know To Protect Your Cloud | HackerNoon

Immutable backups provide protection against ransomware and ensure data integrity by preventing alterations or deletions once created.
US politics
fromMedium
1 month ago

Unlock Your Potential as a Federal Cloud Solutions Architect!

CFCSA certification is crucial for designing compliant cloud solutions in the U.S. federal sector.
fromSocpub
2 months ago

How to Create a Data Backup Strategy for Your Business

One corrupt table or misconfigured bucket can stall an entire supply chain run. Fortunately, a clear-headed backup strategy turns that existential threat into a five-minute inconvenience.
Digital life
#ai
Privacy professionals
fromThe Hacker News
2 months ago

Securing Agentic AI: How to Protect the Invisible Identity Access

AI agents can automate processes but pose significant identity risks due to their reliance on high-privilege credentials and unpredictable behaviors.
Privacy professionals
fromInfoWorld
2 months ago

Three steps to boost Amazon S3 data security

Organizations must audit identities with SSE-C privileges to enhance data security.
Strictly manage user access to sensitive data to prevent breaches.
Vue
fromVuejobs
2 months ago

[Relocation Required] Junior Front-end Engineer (Vue) at HENNGE K.K.

HENNGE delivers cloud security solutions that empower flexible remote work, enhancing productivity while ensuring top-tier security.
Information security
fromHackernoon
2 years ago

I Thought My Cloud Setup Was Secure - Until It Wasn't | HackerNoon

Cloud security mistakes often stem from misconfigurations and lack of proper IAM auditing, leading to potential data breaches and increased costs.
from24/7 Wall St.
2 months ago

Summer 2025 Preview: Keep These 3 Stocks on Your Radar

As we prepare for the second half of 2025, investors should focus on stocks in the AI and cloud security sectors, which offer strong growth potential.
Startup companies
fromTechzine Global
2 months ago

The state of cloud security

According to Erik de Jong, the Wiz acquisition could be detrimental to customers; consolidation in the market rarely leads to lower prices.
Information security
Tech industry
fromTheregister
2 months ago

Microsoft to retire default outbound access for VMs in Azure

Microsoft is retiring default outbound access for VMs in Azure in September, requiring developers to understand networking better.
fromZDNET
2 months ago

NordPass lets you store passports and other IDs now - but is this safe?

NordPass has introduced 'Documents', a cloud-based encrypted vault for secure storage of vital documents, enhancing user convenience and security.
Privacy professionals
Privacy technologies
fromTechzine Global
2 months ago

AWS hits a big milestone: 100% MFA for root users

AWS mandated multi-factor authentication (MFA) for root access accounts in 2023, enhancing security in cloud environments.
MFA significantly boosts security but isn't infallible; additional measures are necessary to combat sophisticated attacks.
European startups
fromTechzine Global
2 months ago

CrowdStrike launches Falcon for AWS Security Incident Response

CrowdStrike introduces Falcon for AWS Security Incident Response, enhancing cloud cybersecurity with faster threat detection and incident response capabilities.
Artificial intelligence
fromSilicon Canals
3 months ago

London-based Maze secures 22.5M to beat hackers at their own game through an AI agent - Silicon Canals

Maze has raised $25M in Series A funding to enhance its AI-native cloud security platform for vulnerability investigation and resolution.
Information security
fromTechzine Global
3 months ago

Cisco warns of vulnerability in cloud passwords

A critical flaw in Cisco ISE allows attackers to access sensitive data and modify system settings across cloud platforms.
Remote access to sensitive data is possible due to shared credentials in cloud installations. It scores a CVSS of 9.9.
Information security
fromSecuritymagazine
3 months ago

71% of Organizations Cannot Cover the Cloud Environment With Current Tools

Complex cloud environments challenge organizations' cloud security management.
Despite high confidence in security, significant concerns about unauthorized services and tool coverage exist.
fromTechzine Global
3 months ago

Red Hat introduces cloud-optimized RHEL

The new approach, which will be available with the launch of Red Hat Enterprise Linux 10, offers users preconfigured, ready-to-use images designed to handle the unique characteristics of different hyperscalers.
Tech industry
Information security
fromTechzine Global
3 months ago

Active exploitation of vulnerabilities in Ivanti EPMM

Ivanti's Endpoint Manager Mobile has critical vulnerabilities exploited in both on-premises and cloud environments, allowing remote code execution without authentication.
fromInfoWorld
3 months ago

Cloud asset management: A crucial missing ingredient

Failing to recognize the need for CAM leads to additional problems. The financial aspect is the most paramount and urgent. Untracked and unmanaged resources such as idle virtual machines or overallocated storage accumulate costs that are often unnoticed until they appear on a bloated monthly statement.
Marketing tech
DevOps
fromMedium
4 months ago

How-to set up Google Cloud (GCP) credentials in HCP Terraform Cloud

Terraform Cloud deployment to GCP needs service account access with precise permissions to function properly.
Least privilege principle is crucial in assigning roles and permissions for security during infrastructure provisioning.
fromTheregister
4 months ago

Snowflake CISO talks lessons learned from breaches, improv

It was an unfortunate situation that our customers went through, and we've really pivoted from a shared-security model to more of a shared-destiny model with our customers.
Information security
fromHackernoon
2 years ago

The HackerNoon Newsletter: Vue.js: Propagating Props Like a Pro (5/10/2025) | HackerNoon

Quantum computing is fast approaching, threatening cloud security - leaders must act now to defend the emergence of data as new cryptographic risks.
Women in technology
Information security
fromInfoQ
4 months ago

Visibility in Cloud Security: How Exactly Are Our Cloud Environments Configured?

Understanding security posture management is essential for identifying breaches and misconfigurations in cloud environments.
NYC startup
fromTechzine Global
4 months ago

Upwind makes its M&A debut with Nyx acquisition

Upwind's acquisition of Nyx enhances real-time threat detection and integrates deeper application monitoring into its platform.
fromIT Pro
4 months ago

CISA issues warning in wake of Oracle cloud credentials leak

CISA warns of potential data breach risks from a security incident involving legacy Oracle cloud environments, urging enterprises to strengthen their security defenses.
Information security
[ Load more ]