#cloud-security

[ follow ]
fromTheregister
3 days ago

Alibaba's new AI broke when we asked about Tiananmen Square

Alibaba Cloud is not inherently a security threat, but its ties to China and the legal environment create potential risks that Western companies must carefully evaluate. For low-risk applications (e.g., serving customers in Asia), it may be a viable option. For high-sensitivity operations, most security-conscious organizations opt for cloud providers based in allied countries with strong rule-of-law protections (e.g., AWS, Microsoft Azure, Google Cloud).
Artificial intelligence
Remote teams
fromAmazon Web Services
3 days ago

AWS re:Invent 2025: Transform your digital workplace with Amazon WorkSpaces | Amazon Web Services

Amazon WorkSpaces enables secure, AI-driven digital workplace transformation, reducing physical infrastructure costs and simplifying migration from legacy VDI solutions.
#zero-trust
fromHackernoon
6 years ago
Privacy professionals

Forget Perimeters: Here's How Context Is Redefining Cloud Security | HackerNoon

fromHackernoon
6 years ago
Privacy professionals

Forget Perimeters: Here's How Context Is Redefining Cloud Security | HackerNoon

fromIT Pro
1 week ago

CEOs admit majority of cloud environments were 'built by accident rather than design' - and it's coming back to haunt them

In the company's annual Cloud Readiness Report 70% of CEOs admit they built their current cloud environment "by accident, rather than by design" - this often entailed periodic upgrades aimed at addressing short-term needs, rather than focusing on longer term strategic improvements. Kyndryl said this shows that many lacked a "deliberate strategy" when pursuing cloud transformation projects, and the effects of this are starting to show with huge workload pressure placed on cloud environments, as well as growing security threats and evolving regulatory requirements.
Artificial intelligence
fromTechzine Global
1 week ago

Google gives concrete guidance with Unified Security Recommended

There are plenty of choices for businesses when it comes to security. One could say there are too many of them in the public cloud domain for little overall gain. Google wants to ensure that customers can trust those choices by guaranteeing interoperability and integration. In said attempt, it has unveiled the newly launched Unified Security Recommended program. CrowdStrike, Fortinet, and Wiz are the first to join in.
Information security
#mergers--acquisitions
fromTheregister
2 weeks ago
Information security

Google-Wiz $32B deal cleared by DOJ

The DOJ cleared Google's $32 billion acquisition of cloud security firm Wiz, marking Google's largest-ever acquisition and advancing integration of Wiz into Google Cloud.
fromTechCrunch
2 weeks ago
Tech industry

Google gets the US government's green light to acquire Wiz for $32B | TechCrunch

Google's $32 billion acquisition of cloud security company Wiz cleared U.S. DOJ antitrust review and is expected to close in early 2026.
Information security
fromIT Pro
2 weeks ago

'Data sprawl' is now your security team's biggest headache - and it's only going to get worse

Data sprawl across cloud and hybrid environments rapidly increases volumes, abandons storage, inflates costs, widens attack surfaces, and drives frequent, often staff-caused, data loss incidents.
fromTipRanks Financial
2 weeks ago

Google (GOOGL) Moves Closer to $32 Billion Wiz Deal after U.S. Review Ends - TipRanks.com

Alphabet (GOOGL) (GOOG) and Wiz have moved closer to completing their $32 billion deal. The U.S. Department of Justice has finished its review, which means the agency will not block the acquisition. The step marks an important move toward closing, even though other regulators are still looking into the deal. The news comes just a few days after Alphabet delivered its first-ever $100 billion quarter.
Silicon Valley
Silicon Valley
fromTechzine Global
2 weeks ago

Google's $32B Wiz deal gets green light from DOJ

The DOJ closed its investigation into Google's $32 billion acquisition of cybersecurity firm Wiz, making regulatory approval likely and targeting completion in 2026.
Information security
fromTheregister
2 weeks ago

AWS, Nvidia, Crowdstrike seek security startups

Early-stage cloud and AI security startups can apply by November 15 for a competitive accelerator offering AWS, CrowdStrike, and Nvidia resources and investor access.
fromThe Hacker News
4 weeks ago

Why Organizations Are Abandoning Static Secrets for Managed Identities

For decades, organizations have relied on static secrets, such as API keys, passwords, and tokens, as unique identifiers for workloads. While this approach provides clear traceability, it creates what security researchers describe as an "operational nightmare" of manual lifecycle management, rotation schedules, and constant credential leakage risks. This challenge has traditionally driven organizations toward centralized secret management solutions like HashiCorp Vault or CyberArk, which provide universal brokers for secrets across platforms.
Information security
Information security
fromThe Hacker News
4 weeks ago

"Jingle Thief" Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards

Jingle Thief targets retail and consumer cloud environments using phishing and smishing to steal credentials, issue unauthorized gift cards, and monetize them through gray markets.
EU data protection
fromTechzine Global
1 month ago

Data Governance in the Cloud: Balancing Innovation and Regulation

Effective governance of critical cloud-hosted data is essential to balance AI innovation with legal, ethical, privacy, and security requirements.
#incident-response
#aws
Information security
fromTechzine Global
5 months ago

SentinelOne joins AWS ISV program to secure software migrations

Organizations must ensure secure migration of software to AWS using adequate security solutions like SentinelOne's Singularity Cloud Security.
#finops
Information security
fromInfoWorld
1 month ago

Lessons from the Salesforce breach

Enterprise data interconnectedness requires continuous evolution of cloud security from both providers and customers to mitigate cascading breaches.
fromChannelPro
1 month ago

How bridging the IT visibility gap empowers channel partners

Cloud migration and flexible working policies have contributed to the sprawl, but part of the reason it's so unmanageable is that companies still rely on the same old discovery tools built for a static network. Whenever we scan a new environment, we always uncover a large number of devices that were completely off the radar and out of scope of the protection of their IT and security policies.
Information security
fromComputerWeekly.com
1 month ago

Building resilience in the cloud: Bridging SLA gaps and mitigating risk | Computer Weekly

Today, enterprises need a robust digital infrastructure for everything from customer engagement to operational continuity, and multi-cloud technology has become a fundamental enabler of enterprise success. However, with these increased complexities, organisations face increasing challenges in managing security risks, maintaining operational uptime, and above all, to maximise value from their cloud investments. Emerging technologies and innovative approaches are reshaping the way enterprises navigate these challenges, and at the same time service level agreements (SLAs) too are evolving to align with these developments.
Information security
DevOps
fromAmazon Web Services
1 month ago

Moeve: Controlling resource deployment at scale with AWS CloudFormation Guard Hooks | Amazon Web Services

Moeve enforces proactive cloud governance using AWS Control Tower, CloudFormation Hooks, SCPs, and mandatory Infrastructure as Code to ensure secure, compliant deployments.
#bug-bounty
#vulnerability-management
fromSecurityWeek
1 month ago
Venture

Mondoo Raises $17.5 Million for Vulnerability Management Platform

Mondoo raised $17.5 million in a Series A extension to expand its agentic vulnerability management platform and grow US and EMEA operations.
fromSilicon Canals
5 months ago
Artificial intelligence

London-based Maze secures 22.5M to beat hackers at their own game through an AI agent - Silicon Canals

Maze has raised $25M in Series A funding to enhance its AI-native cloud security platform for vulnerability investigation and resolution.
fromSilicon Canals
5 months ago
Artificial intelligence

London-based Maze secures 22.5M to beat hackers at their own game through an AI agent - Silicon Canals

fromInfoWorld
1 month ago

When personal ambitions undermine enterprise security

Cloud computing forms the backbone of our increasingly digital world, enabling businesses to operate more efficiently, grow faster, and innovate with flexibility. Despite its advantages, the cloud is not immune to data breaches caused by weak security practices. Alarmingly, some of the biggest risks do not stem from technical errors or malicious hackers but from the very people responsible for protecting cloud resources: security professionals themselves.
Information security
Information security
fromTechzine Global
1 month ago

Check Point and Wiz launch integrated cloud security

Integrated Check Point and Wiz solution provides real-time visibility and AI-driven prevention to secure cloud environments and reduce gateway configuration risks.
fromTechzine Global
1 month ago

Darktrace launches fully automated cloud forensics

Darktrace introduces the industry's first fully automated cloud forensics solution. Forensic Acquisition & Investigation aims to reduce investigation times from days to minutes by collecting evidence immediately when threats are detected. A survey of 300 cloud security decision-makers shows that nearly 90 percent of organizations suffer damage before they can contain cloud incidents. Additionally, investigations in cloud environments take three to five days longer than those in on-premises environments.
Information security
fromThe Verge
1 month ago

DOGE might be storing every American's SSN on an insecure cloud server

A new report from Senate Democrats claims members of Elon Musk's DOGE team have access to the Social Security Numbers of all Americans in a cloud server lacking verified security measures, despite an internal assessment of potential "catastrophic" risk. The report, released by Sen. Gary Peters (D-MI), cites numerous disclosures from whistleblowers, including one who said a worst-case scenario could involve having to re-issue SSNs to everyone in the country.
US politics
fromZDNET
1 month ago

Battered by cyberattacks, is Salesforce facing a trust problem?

ZDNET's key takeaways The FBI warned about the alarming trend of compromised accounts. The success rate of threat actors could tarnish Salesforce's reputation. The most recent wave of attacks was likely preventable.
Information security
US politics
fromNextgov.com
1 month ago

Democrat report: DOGE is risking Americans' data by operating outside federal law

Department of Government Efficiency personnel uploaded Americans' sensitive personal data into insecure cloud environments, creating serious cybersecurity, privacy, and corruption risks.
Information security
fromTechzine Global
1 month ago

Cloud security cannot be outsourced - it's up to your organization

Cloud security requires rigorous vendor scrutiny, clear prioritization of critical systems, and a balanced approach between usability, protection, and cost.
fromSecurityWeek
1 month ago

Researchers Earn $150,000 for L1TF Exploit Leaking Data From Public Cloud

Academic researchers from Vrije Universiteit Amsterdam have demonstrated that transient execution CPU vulnerabilities are practical to exploit in real-world scenarios to leak memory from VMs running on public cloud services. The research shows that L1TF (L1 Terminal Fault), also known as Foreshadow, a bug in Intel processors reported in January 2018, and half-Spectre, gadgets believed unexploitable on new-generation CPUs, as they cannot directly leak secret data, can be used together to leak data from the public cloud.
Information security
Information security
fromComputerWeekly.com
1 month ago

Balancing IT security with AI and cloud innovation | Computer Weekly

Cloud-based AI adoption ties organisational AI strategies to cloud security and availability while SLAs often omit data protection, breach response, and regulatory responsibilities.
fromArs Technica
2 months ago

Microsoft's Entra ID vulnerabilities could have been catastrophic

Microsoft built security controls around identity like conditional access and logs, but this internal impression token mechanism bypasses them all,
Information security
fromTheregister
2 months ago

OpenAI plugs ShadowLeak bug in ChatGPT

ChatGPT's research assistant sprung a leak - since patched - that let attackers steal Gmail secrets with just a single carefully crafted email. Deep Research, a tool unveiled by OpenAI in February, enables users to ask ChatGPT to browse the internet or their personal email inbox and generate a detailed report on its findings. The tool can be integrated with apps like Gmail and GitHub, allowing people to do deep dives into their own documents and messages without ever leaving the chat window.
Information security
Business
fromTechzine Global
2 months ago

Netskope reaches valuation of $8.6 billion after IPO

Netskope's Nasdaq IPO closed 18% higher, valuing the company at about $8.6 billion after raising $908 million amid strong ARR growth and cloud-security demand.
fromWIRED
2 months ago

This Microsoft Entra ID Vulnerability Could Have Caused a Digital Catastrophe

Mollema has studied Entra ID security in depth and published multiple studies about weaknesses in the system, which was formerly known as Azure Active Directory. But while preparing to present at the Black Hat security conference in Las Vegas in July, Mollema discovered two vulnerabilities that he realized could be used to gain global administrator privileges-essentially god mode-and compromise every Entra ID directory, or what is known as a "tenant."
Information security
Information security
fromArs Technica
2 months ago

Trump admin says Social Security database wasn't "leaked, hacked, or shared"

A whistleblower alleged SSA placed a high-value asset containing data on over 450 million people in an uncontrolled AWS cloud environment, prompting an involuntary resignation.
fromSecurityWeek
2 months ago

Virtual Event Today: Attack Surface Management Summit

SecurityWeek's Attack Surface Management Virtual Summit is now LIVE and runs today from 11AM - 4PM ET. Join the online event where cybersecurity leaders and practitioners will dive into the strategies, tools, and innovations shaping the future of ASM. As digital assets and cloud services continue to expand, defenders are shifting tactics to continuously discover, inventory, classify, prioritize, and monitor their attack surfaces.
Information security
Information security
fromDataBreaches.Net
2 months ago

Scattered Spider Tied to Fresh Attacks on Financial Services - DataBreaches.Net

Some Scattered Spider actors continue active, sophisticated intrusions, breaching a U.S. bank and targeting cloud repositories like AWS and Snowflake after claiming to retire.
Information security
fromInfoWorld
2 months ago

Are cloud providers neglecting security to chase AI?

Rapid AI and hybrid cloud investments are fragmenting cloud security, eroding enterprise trust in cloud platforms' ability to protect systems.
fromSecurityWeek
2 months ago

In Other News: $900k for XSS Bugs, HybridPetya Malware, Burger King Censors Research

Two researchers reported finding serious vulnerabilities, including ones that expose employee information and drive-through orders, in systems run by Restaurant Brands International (RBI), which owns the Tim Hortons, Burger King and Popeyes brands. The vulnerabilities were reported to the vendor and quickly fixed. In addition, RBI said the system targeted by the researchers is still in early development. However, the company still sent a DMCA complaint to the researchers to force them to remove the blog post detailing their findings.
Information security
fromIT Pro
2 months ago

The unseen risks of cloud storage for businesses

Cloud storage is used by most businesses, with 78% of respondents to a 2024 PwC survey indicating they've adopted cloud across most of their organizations. But many firms are unknowingly opening themselves up to security and data protection risks: sensitive data is being held in 9% of publicly-accessible cloud storage, and 97% of this information is classified as restricted or confidential, according to Tenable's 2025 Cloud Security Risk Report.
Information security
Information security
fromComputerWeekly.com
2 months ago

SLA promises, security realities: Navigating the shared responsibility gap | Computer Weekly

Shared responsibility and SLAs often leave a gap where customers remain responsible for data protection, configurations, identities, and compliance.
#social-security
fromTechCrunch
2 months ago
Information security

DOGE uploaded live copy of Social Security database to 'vulnerable' cloud server, says whistleblower | TechCrunch

fromTechCrunch
2 months ago
Information security

DOGE uploaded live copy of Social Security database to 'vulnerable' cloud server, says whistleblower | TechCrunch

fromwww.theguardian.com
2 months ago

Elon Musk's Doge put sensitive social security data at risk, whistleblower says

The complaint from Charles Borges, the chief data officer at the SSA, alleges that Doge staffers effectively created a live copy of the entire country's social security data from its numerical identification system database. The information is a goldmine for bad actors, the complaint alleges, and was placed on a server without independent oversight that only Doge officials could access.
US politics
#cybersecurity
Online learning
fromEntrepreneur
3 months ago

These IT Skills Could Be the Career Edge You Need, for Just $35 | Entrepreneur

A massive cybersecurity and IT training bundle offers 16 courses for $34.97, helping individuals gain certifications and skills for real-world applications.
Java
fromThe Hacker News
4 months ago

Alert: Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS

Attackers exploit exposed JDWP interfaces to gain code execution and deploy cryptocurrency miners on compromised systems.
fromClickUp
2 months ago

10 Best Wiz Competitors and Alternatives for Cloud Security

Is Wiz giving you solid visibility but falling short on real-time remediation, host-level telemetry, or network traffic analysis? Safe to say, you're not the only one noticing the gaps. As cloud environments become increasingly complex, security teams require tools that identify risks and help mitigate them. This blog post breaks down some of the best Wiz competitors that fill in those missing pieces. Stick around till the end to see how ClickUp (yes, the productivity platform!) supports efficient cloud security collaboration. 🔐
Information security
fromHackernoon
1 year ago

The HackerNoon Newsletter: Agentic AI and the Rise of Outcome Engineering (8/10/2025) | HackerNoon

Immutable backups prevent ransomware and ensure data integrity, meeting compliance needs with secure, tamper-proof cloud data protection. They safeguard critical data effectively.
Tech industry
Data science
fromHackernoon
2 years ago

How a Startup Using Gremlin Beat Everyone to Google's Door | HackerNoon

Google's acquisition of Wiz for $32 billion signifies a decisive victory in the cloud security sector.
#artificial-intelligence
fromThe Hacker News
3 months ago
Artificial intelligence

The AI-Powered Security Shift: What 2025 Is Teaching Us About Cloud Defense

Cloud attacks are evolving; AI serves as both a weapon and a defense mechanism.
fromSecuritymagazine
5 months ago
Information security

84% of Organizations Are Now Using AI in the Cloud

The rapid adoption of AI in cloud environments has introduced significant vulnerabilities and increased security risks for organizations.
Tech industry
fromTechzine Global
3 months ago

Good quarterly results for Fortinet, but sharp decline in share price

Fortinet's second quarter of 2025 showed revenue growth, but the stock market reacted negatively to cautious forecasts, causing a significant drop in share price.
Privacy technologies
fromTechzine Global
3 months ago

Upwind drafts in Nyx for cloud security keyhole surgery

Upwind's acquisition of Nyx enhances application security through function-level runtime visibility for real-time threat detection and vulnerability prioritization.
DevOps
fromDevOps.com
3 months ago

BMC Extends Scope and Reach of DevOps Mainframe Workflows - DevOps.com

BMC AMI zAdviser Enterprise enhances DevOps for mainframe environments by integrating Git data collection and AI assistance.
Privacy professionals
fromSecuritymagazine
3 months ago

DevOps Missteps Fuel Crypto-Mining: Why Infrastructure Observability Is a Security Imperative

Cryptojacking poses a serious threat by exploiting misconfigured cloud environments, leading to significant cost increases and resource depletion.
Privacy technologies
fromTechzine Global
3 months ago

The browser is the next security frontier: how do we secure it?

Browsers have become critical endpoints and attack vectors, necessitating improved security measures that current EDR solutions can't provide.
Software development
fromInfoWorld
3 months ago

Microsegmentation for developers

Microsegmentation now involves separating workload behaviors rather than just network zones, reflecting both technical and cultural shifts in security responsibilities.
Tech industry
fromBusiness Insider
3 months ago

The cofounder of Wiz, Google's $32 billion acquisition target, says vibe coding must be met with 'vibe security'

Google's acquisition of Wiz signals a renewed interest in major tech deals.
Cryptocurrency
fromThe Hacker News
3 months ago

Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks

Two malware campaigns, Soco404 and Koske, exploit cloud vulnerabilities to deliver cryptocurrency miners.
Privacy technologies
fromHackernoon
5 months ago

Immutable Backups: Everything You Need To Know To Protect Your Cloud | HackerNoon

Immutable backups provide protection against ransomware and ensure data integrity by preventing alterations or deletions once created.
US politics
fromMedium
4 months ago

Unlock Your Potential as a Federal Cloud Solutions Architect!

CFCSA certification is crucial for designing compliant cloud solutions in the U.S. federal sector.
fromSocpub
4 months ago

How to Create a Data Backup Strategy for Your Business

One corrupt table or misconfigured bucket can stall an entire supply chain run. Fortunately, a clear-headed backup strategy turns that existential threat into a five-minute inconvenience.
Digital life
fromTechzine Global
4 months ago

Zero Trust is the compass in the AI storm

Zscaler's architecture was designed from the outset with the priority of data privacy in mind, as Europe attaches importance to this issue.
Privacy technologies
Privacy professionals
fromThe Hacker News
4 months ago

Securing Agentic AI: How to Protect the Invisible Identity Access

AI agents can automate processes but pose significant identity risks due to their reliance on high-privilege credentials and unpredictable behaviors.
Privacy professionals
fromInfoWorld
4 months ago

Three steps to boost Amazon S3 data security

Organizations must audit identities with SSE-C privileges to enhance data security.
Strictly manage user access to sensitive data to prevent breaches.
Vue
fromVuejobs
4 months ago

[Relocation Required] Junior Front-end Engineer (Vue) at HENNGE K.K.

HENNGE delivers cloud security solutions that empower flexible remote work, enhancing productivity while ensuring top-tier security.
Information security
fromHackernoon
2 years ago

I Thought My Cloud Setup Was Secure - Until It Wasn't | HackerNoon

Cloud security mistakes often stem from misconfigurations and lack of proper IAM auditing, leading to potential data breaches and increased costs.
from24/7 Wall St.
4 months ago

Summer 2025 Preview: Keep These 3 Stocks on Your Radar

As we prepare for the second half of 2025, investors should focus on stocks in the AI and cloud security sectors, which offer strong growth potential.
Startup companies
fromTechzine Global
4 months ago

The state of cloud security

According to Erik de Jong, the Wiz acquisition could be detrimental to customers; consolidation in the market rarely leads to lower prices.
Information security
Tech industry
fromTheregister
4 months ago

Microsoft to retire default outbound access for VMs in Azure

Microsoft is retiring default outbound access for VMs in Azure in September, requiring developers to understand networking better.
fromZDNET
5 months ago

NordPass lets you store passports and other IDs now - but is this safe?

NordPass has introduced 'Documents', a cloud-based encrypted vault for secure storage of vital documents, enhancing user convenience and security.
Privacy professionals
Privacy technologies
fromTechzine Global
5 months ago

AWS hits a big milestone: 100% MFA for root users

AWS mandated multi-factor authentication (MFA) for root access accounts in 2023, enhancing security in cloud environments.
MFA significantly boosts security but isn't infallible; additional measures are necessary to combat sophisticated attacks.
European startups
fromTechzine Global
5 months ago

CrowdStrike launches Falcon for AWS Security Incident Response

CrowdStrike introduces Falcon for AWS Security Incident Response, enhancing cloud cybersecurity with faster threat detection and incident response capabilities.
[ Load more ]