#cloud-security

[ follow ]
fromTechCrunch
2 days ago

Microsoft gave FBI a set of BitLocker encryption keys to unlock suspects' laptops: reports | TechCrunch

Microsoft provided the FBI with the recovery keys to unlock encrypted data on the hard drives of three laptops as part of a federal investigation, Forbes reported on Friday. Many modern Windows computers rely on full-disk encryption, called BitLocker, which is enabled by default. This type of technology should prevent anyone except the device owner from accessing the data if the computer is locked and powered off.
Privacy professionals
#cybersecurity
fromDataBreaches.Net
2 days ago
Information security

NL: Police warned about security hole used by Russian hackers in major theft of police data - DataBreaches.Net

fromZDNET
5 months ago
Information security

DripDropper Linux malware cleans up after itself - how it works

DripDropper exploits vulnerabilities in ActiveMQ to gain persistent access to cloud Linux systems while covering its tracks.
fromThe Hacker News
5 months ago
Privacy professionals

Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft

An end-to-end privilege escalation chain in Amazon ECS can be exploited, enabling lateral movement and control over cloud environments.
fromDataBreaches.Net
2 days ago
Information security

NL: Police warned about security hole used by Russian hackers in major theft of police data - DataBreaches.Net

Information security
fromSecuritymagazine
3 days ago

Security Vendors, Fortune 500 Companies Exposed and Exploited

Exposed training applications in customer-managed enterprise clouds are actively exploited, with malicious artifacts, obfuscated scripts, and connections to privileged cloud identities enabling lateral movement.
Information security
fromTechzine Global
5 days ago

What Aikido teaches us about software and security

Developer-first security integration reduces alert noise and embeds continuous vulnerability detection into developers' workflows, accelerating secure software delivery.
fromInfoQ
6 days ago

Preventing Data Exfiltration: A Practical Implementation of VPC Service Controls at Enterprise Scale in Google Cloud Platform

The cloud revolution has transformed application development and deployment. Still, traditional network security, the castle and moat approach that served on-premises data centers, falls short in cloud native architectures where resources are distributed, ephemeral, and accessed from anywhere. Data exfiltration through insider threats, compromised credentials and misconfigured services has become critical for enterprises migrating to public cloud. Industry reports show data breaches involving cloud misconfiguration cost organizations an average of $4.45 million per incident.
Information security
Information security
fromInfoWorld
1 week ago

Google Vertex AI security permissions could amplify insider threats

Unmonitored service-agent identities and platform components can allow elevated, undetected access; treat service agents as privileged and monitor their activity to detect abuse.
Information security
fromArs Technica
1 week ago

Never-before-seen Linux malware is "far more advanced than typical"

VoidLink is a modular Linux malware framework providing over 30 modules for stealthy reconnaissance, privilege escalation, lateral movement, and cloud-specific targeting.
#identity-security
Startup companies
fromTechCrunch
2 weeks ago

Data security startup Cyera hits $9B valuation six months after being valued at $6B | TechCrunch

Cyera raised $400 million at a $9 billion valuation, has now raised over $1.7 billion, and posted rapid revenue growth with major investor backing.
#alphabet
Information security
fromBusiness Matters
2 weeks ago

Understanding the Safety of the Cloud: How Threat Protection Strengthens Your Business

Cloud safety requires continuous, coordinated threat protection that detects suspicious activity early to protect data, maintain productivity, and enable scalable operations.
fromInfoWorld
2 weeks ago

What drives your cloud security strategy?

Consider a fictitious company, DeltaSite, and an all-too-common scenario for rapidly expanding SaaS providers. Within months, DeltaSite embarked on an ambitious multicloud migration, deploying critical workloads across AWS, Azure, and Google Cloud. DeltaSite's board approved a seven-figure investment in the latest cloud security tools, including AI-powered monitoring and automated compliance frameworks, believing this would virtually guarantee security. Yet just six months after going live, DeltaSite suffered a major breach: A single misconfigured storage bucket exposed sensitive customer data to the public internet.
Information security
fromComputerworld
1 month ago

Global uncertainty is reshaping cloud strategies in Europe

From a management perspective, the path was clear to Teams,
Miscellaneous
#bug-bounty
Information security
fromIT Pro
1 month ago

Trend Micro issues warning over rise of 'vibe crime' as cyber criminals turn to agentic AI to automate attacks

Agentic AI will automate and scale cybercrime into continuous, autonomous operations, transforming criminal business models and forcing defensive automation.
Law
fromNextgov.com
1 month ago

US charges former Accenture employee with misleading feds on cloud platform's security

A former Accenture Federal Services product manager was charged for misleading federal auditors about a cloud platform’s required security controls and obstructing audits.
fromThe Hacker News
1 month ago

Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes

AWS Identity Misconfigurations: We will show how attackers abuse simple setup errors in AWS identities to gain initial access without stealing a single password. Hiding in AI Models: You will see how adversaries mask malicious files in production by mimicking the naming structures of your legitimate AI models. Risky Kubernetes Permissions: We will examine "overprivileged entities"-containers that have too much power-and how attackers exploit them to take over infrastructure.
Information security
Information security
fromInfoWorld
1 month ago

GitHub Action Secrets aren't secret anymore: exposed PATs now a direct path into cloud environments

Exposed GitHub Personal Access Tokens enable attackers to access GitHub Action Secrets and pivot into cloud environments, compromising CSP credentials and infrastructure.
Information security
fromTechzine Global
1 month ago

Ransomware increasingly targeting hypervisors

Attackers increasingly target hypervisors (VMware ESXi, Microsoft Hyper-V) to compromise entire virtual environments, enabling large-scale ransomware impact by controlling the virtualization layer.
from24/7 Wall St.
1 month ago

CrowdStrike Enters Mature Phase While Zscaler Accelerates With AI Security Acquisitions

CrowdStrike's Q3 fiscal 2026 results showed $1.23 billion in revenue, up 22% year over year, missing the $1.24 billion estimate. Net new annual recurring revenue hit $265 million, up 73% from last year. CEO George Kurtz called it "one of our best quarters in company history." Operating cash flow hit a record $398 million. Free cash flow reached $296 million.
Information security
Software development
fromInfoWorld
1 month ago

AWS unveils Frontier AI agents for software development

AWS launched frontier AI agents—Kiro, AWS Security Agent, and AWS DevOps Agent—that autonomously handle extended, complex software development, security, and operations tasks.
Information security
fromInfoWorld US
1 month ago

Spotlight: Making the most of multicloud

Successful multicloud deployments require strategic business alignment, strong governance, and proactive security to balance agility with visibility, compliance, and developer productivity.
Information security
fromThe Hacker News
1 month ago

Why Organizations Are Turning to RPAM

RPAM secures and manages privileged remote access across hybrid, cloud, and third-party environments, enforcing least-privilege and session monitoring without relying on VPNs.
Tech industry
fromWhitepaper Repository -
1 month ago

Spotlight: Making the most of multicloud - Whitepaper Repository -

Multicloud success requires strategic alignment, strong governance, and proactive security to balance agility with visibility, compliance, and developer productivity.
#wiz
Information security
fromwww.mercurynews.com
1 month ago

Anthropic called to testify in House on china-backed cyberattack

House Homeland Security Committee asked Anthropic CEO Dario Amodei to testify Dec. 17 about a Chinese AI-orchestrated cyber-espionage campaign that used the Claude chatbot.
fromAxios
1 month ago

Exclusive: Anthropic CEO called to testify before Congress about Chinese AI cyberattack

For the first time, we are seeing a foreign adversary use a commercial AI system to carry out nearly an entire cyber operation with minimal human involvement,
US politics
#fluent-bit
fromThe Hacker News
2 months ago
Information security

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Five Fluent Bit vulnerabilities enable authentication bypass, log manipulation, denial-of-service, and remote code execution, risking cloud and Kubernetes infrastructure compromise.
fromTheregister
2 months ago
Information security

Years-old bugs in open source took out major clouds at risk

Multiple trivial-to-exploit vulnerabilities in Fluent Bit left cloud and AI deployments open for years, enabling full cloud disruption and data alteration.
Information security
fromComputerworld
2 months ago

How has cloud flipped the regular security narrative?

In cloud environments, compromised identity credentials and excessive permissions allow attackers to bypass defenses and exfiltrate massive sensitive data across interconnected services.
fromTheregister
2 months ago

Alibaba's new AI broke when we asked about Tiananmen Square

Alibaba Cloud is not inherently a security threat, but its ties to China and the legal environment create potential risks that Western companies must carefully evaluate. For low-risk applications (e.g., serving customers in Asia), it may be a viable option. For high-sensitivity operations, most security-conscious organizations opt for cloud providers based in allied countries with strong rule-of-law protections (e.g., AWS, Microsoft Azure, Google Cloud).
Artificial intelligence
Remote teams
fromAmazon Web Services
2 months ago

AWS re:Invent 2025: Transform your digital workplace with Amazon WorkSpaces | Amazon Web Services

Amazon WorkSpaces enables secure, AI-driven digital workplace transformation, reducing physical infrastructure costs and simplifying migration from legacy VDI solutions.
#zero-trust
fromHackernoon
6 years ago
Privacy professionals

Forget Perimeters: Here's How Context Is Redefining Cloud Security | HackerNoon

fromHackernoon
6 years ago
Privacy professionals

Forget Perimeters: Here's How Context Is Redefining Cloud Security | HackerNoon

fromIT Pro
2 months ago

CEOs admit majority of cloud environments were 'built by accident rather than design' - and it's coming back to haunt them

In the company's annual Cloud Readiness Report 70% of CEOs admit they built their current cloud environment "by accident, rather than by design" - this often entailed periodic upgrades aimed at addressing short-term needs, rather than focusing on longer term strategic improvements. Kyndryl said this shows that many lacked a "deliberate strategy" when pursuing cloud transformation projects, and the effects of this are starting to show with huge workload pressure placed on cloud environments, as well as growing security threats and evolving regulatory requirements.
Artificial intelligence
fromTechzine Global
2 months ago

Google gives concrete guidance with Unified Security Recommended

There are plenty of choices for businesses when it comes to security. One could say there are too many of them in the public cloud domain for little overall gain. Google wants to ensure that customers can trust those choices by guaranteeing interoperability and integration. In said attempt, it has unveiled the newly launched Unified Security Recommended program. CrowdStrike, Fortinet, and Wiz are the first to join in.
Information security
#mergers--acquisitions
Information security
fromIT Pro
2 months ago

'Data sprawl' is now your security team's biggest headache - and it's only going to get worse

Data sprawl across cloud and hybrid environments rapidly increases volumes, abandons storage, inflates costs, widens attack surfaces, and drives frequent, often staff-caused, data loss incidents.
Silicon Valley
fromTechzine Global
2 months ago

Google's $32B Wiz deal gets green light from DOJ

The DOJ closed its investigation into Google's $32 billion acquisition of cybersecurity firm Wiz, making regulatory approval likely and targeting completion in 2026.
Information security
fromTheregister
2 months ago

AWS, Nvidia, Crowdstrike seek security startups

Early-stage cloud and AI security startups can apply by November 15 for a competitive accelerator offering AWS, CrowdStrike, and Nvidia resources and investor access.
fromThe Hacker News
3 months ago

Why Organizations Are Abandoning Static Secrets for Managed Identities

For decades, organizations have relied on static secrets, such as API keys, passwords, and tokens, as unique identifiers for workloads. While this approach provides clear traceability, it creates what security researchers describe as an "operational nightmare" of manual lifecycle management, rotation schedules, and constant credential leakage risks. This challenge has traditionally driven organizations toward centralized secret management solutions like HashiCorp Vault or CyberArk, which provide universal brokers for secrets across platforms.
Information security
Information security
fromThe Hacker News
3 months ago

"Jingle Thief" Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards

Jingle Thief targets retail and consumer cloud environments using phishing and smishing to steal credentials, issue unauthorized gift cards, and monetize them through gray markets.
fromTechzine Global
3 months ago

Data Governance in the Cloud: Balancing Innovation and Regulation

The cloud has become the backbone of modern business, enabling rapid scalability, advanced analytics, and collaboration across global teams. In the age of artificial intelligence (AI), the cloud's role is even more critical, both serving as the storage and processing hub for vast quantities of data that feed machine learning models, power real-time analytics, and drive business innovation. With this innovation comes a high-risk balancing act.
EU data protection
#incident-response
#aws
#finops
Information security
fromInfoWorld
3 months ago

Lessons from the Salesforce breach

Enterprise data interconnectedness requires continuous evolution of cloud security from both providers and customers to mitigate cascading breaches.
fromChannelPro
3 months ago

How bridging the IT visibility gap empowers channel partners

Cloud migration and flexible working policies have contributed to the sprawl, but part of the reason it's so unmanageable is that companies still rely on the same old discovery tools built for a static network. Whenever we scan a new environment, we always uncover a large number of devices that were completely off the radar and out of scope of the protection of their IT and security policies.
Information security
fromComputerWeekly.com
3 months ago

Building resilience in the cloud: Bridging SLA gaps and mitigating risk | Computer Weekly

Today, enterprises need a robust digital infrastructure for everything from customer engagement to operational continuity, and multi-cloud technology has become a fundamental enabler of enterprise success. However, with these increased complexities, organisations face increasing challenges in managing security risks, maintaining operational uptime, and above all, to maximise value from their cloud investments. Emerging technologies and innovative approaches are reshaping the way enterprises navigate these challenges, and at the same time service level agreements (SLAs) too are evolving to align with these developments.
Information security
DevOps
fromAmazon Web Services
3 months ago

Moeve: Controlling resource deployment at scale with AWS CloudFormation Guard Hooks | Amazon Web Services

Moeve enforces proactive cloud governance using AWS Control Tower, CloudFormation Hooks, SCPs, and mandatory Infrastructure as Code to ensure secure, compliant deployments.
Venture
fromSecurityWeek
3 months ago

Mondoo Raises $17.5 Million for Vulnerability Management Platform

Mondoo raised $17.5 million in a Series A extension to expand its agentic vulnerability management platform and grow US and EMEA operations.
fromInfoWorld
3 months ago

When personal ambitions undermine enterprise security

Cloud computing forms the backbone of our increasingly digital world, enabling businesses to operate more efficiently, grow faster, and innovate with flexibility. Despite its advantages, the cloud is not immune to data breaches caused by weak security practices. Alarmingly, some of the biggest risks do not stem from technical errors or malicious hackers but from the very people responsible for protecting cloud resources: security professionals themselves.
Information security
Information security
fromTechzine Global
3 months ago

Check Point and Wiz launch integrated cloud security

Integrated Check Point and Wiz solution provides real-time visibility and AI-driven prevention to secure cloud environments and reduce gateway configuration risks.
fromTechzine Global
4 months ago

Darktrace launches fully automated cloud forensics

Darktrace introduces the industry's first fully automated cloud forensics solution. Forensic Acquisition & Investigation aims to reduce investigation times from days to minutes by collecting evidence immediately when threats are detected. A survey of 300 cloud security decision-makers shows that nearly 90 percent of organizations suffer damage before they can contain cloud incidents. Additionally, investigations in cloud environments take three to five days longer than those in on-premises environments.
Information security
fromThe Verge
4 months ago

DOGE might be storing every American's SSN on an insecure cloud server

A new report from Senate Democrats claims members of Elon Musk's DOGE team have access to the Social Security Numbers of all Americans in a cloud server lacking verified security measures, despite an internal assessment of potential "catastrophic" risk. The report, released by Sen. Gary Peters (D-MI), cites numerous disclosures from whistleblowers, including one who said a worst-case scenario could involve having to re-issue SSNs to everyone in the country.
US politics
fromZDNET
4 months ago

Battered by cyberattacks, is Salesforce facing a trust problem?

ZDNET's key takeaways The FBI warned about the alarming trend of compromised accounts. The success rate of threat actors could tarnish Salesforce's reputation. The most recent wave of attacks was likely preventable.
Information security
US politics
fromNextgov.com
4 months ago

Democrat report: DOGE is risking Americans' data by operating outside federal law

Department of Government Efficiency personnel uploaded Americans' sensitive personal data into insecure cloud environments, creating serious cybersecurity, privacy, and corruption risks.
Information security
fromTechzine Global
4 months ago

Cloud security cannot be outsourced - it's up to your organization

Cloud security requires rigorous vendor scrutiny, clear prioritization of critical systems, and a balanced approach between usability, protection, and cost.
fromSecurityWeek
4 months ago

Researchers Earn $150,000 for L1TF Exploit Leaking Data From Public Cloud

Academic researchers from Vrije Universiteit Amsterdam have demonstrated that transient execution CPU vulnerabilities are practical to exploit in real-world scenarios to leak memory from VMs running on public cloud services. The research shows that L1TF (L1 Terminal Fault), also known as Foreshadow, a bug in Intel processors reported in January 2018, and half-Spectre, gadgets believed unexploitable on new-generation CPUs, as they cannot directly leak secret data, can be used together to leak data from the public cloud.
Information security
Information security
fromComputerWeekly.com
4 months ago

Balancing IT security with AI and cloud innovation | Computer Weekly

Cloud-based AI adoption ties organisational AI strategies to cloud security and availability while SLAs often omit data protection, breach response, and regulatory responsibilities.
fromArs Technica
4 months ago

Microsoft's Entra ID vulnerabilities could have been catastrophic

Microsoft built security controls around identity like conditional access and logs, but this internal impression token mechanism bypasses them all,
Information security
fromTheregister
4 months ago

OpenAI plugs ShadowLeak bug in ChatGPT

ChatGPT's research assistant sprung a leak - since patched - that let attackers steal Gmail secrets with just a single carefully crafted email. Deep Research, a tool unveiled by OpenAI in February, enables users to ask ChatGPT to browse the internet or their personal email inbox and generate a detailed report on its findings. The tool can be integrated with apps like Gmail and GitHub, allowing people to do deep dives into their own documents and messages without ever leaving the chat window.
Information security
Business
fromTechzine Global
4 months ago

Netskope reaches valuation of $8.6 billion after IPO

Netskope's Nasdaq IPO closed 18% higher, valuing the company at about $8.6 billion after raising $908 million amid strong ARR growth and cloud-security demand.
fromWIRED
4 months ago

This Microsoft Entra ID Vulnerability Could Have Caused a Digital Catastrophe

Mollema has studied Entra ID security in depth and published multiple studies about weaknesses in the system, which was formerly known as Azure Active Directory. But while preparing to present at the Black Hat security conference in Las Vegas in July, Mollema discovered two vulnerabilities that he realized could be used to gain global administrator privileges-essentially god mode-and compromise every Entra ID directory, or what is known as a "tenant."
Information security
Information security
fromArs Technica
4 months ago

Trump admin says Social Security database wasn't "leaked, hacked, or shared"

A whistleblower alleged SSA placed a high-value asset containing data on over 450 million people in an uncontrolled AWS cloud environment, prompting an involuntary resignation.
fromSecurityWeek
4 months ago

Virtual Event Today: Attack Surface Management Summit

SecurityWeek's Attack Surface Management Virtual Summit is now LIVE and runs today from 11AM - 4PM ET. Join the online event where cybersecurity leaders and practitioners will dive into the strategies, tools, and innovations shaping the future of ASM. As digital assets and cloud services continue to expand, defenders are shifting tactics to continuously discover, inventory, classify, prioritize, and monitor their attack surfaces.
Information security
Information security
fromDataBreaches.Net
4 months ago

Scattered Spider Tied to Fresh Attacks on Financial Services - DataBreaches.Net

Some Scattered Spider actors continue active, sophisticated intrusions, breaching a U.S. bank and targeting cloud repositories like AWS and Snowflake after claiming to retire.
Information security
fromInfoWorld
4 months ago

Are cloud providers neglecting security to chase AI?

Rapid AI and hybrid cloud investments are fragmenting cloud security, eroding enterprise trust in cloud platforms' ability to protect systems.
fromSecurityWeek
4 months ago

In Other News: $900k for XSS Bugs, HybridPetya Malware, Burger King Censors Research

Two researchers reported finding serious vulnerabilities, including ones that expose employee information and drive-through orders, in systems run by Restaurant Brands International (RBI), which owns the Tim Hortons, Burger King and Popeyes brands. The vulnerabilities were reported to the vendor and quickly fixed. In addition, RBI said the system targeted by the researchers is still in early development. However, the company still sent a DMCA complaint to the researchers to force them to remove the blog post detailing their findings.
Information security
fromIT Pro
4 months ago

The unseen risks of cloud storage for businesses

Cloud storage is used by most businesses, with 78% of respondents to a 2024 PwC survey indicating they've adopted cloud across most of their organizations. But many firms are unknowingly opening themselves up to security and data protection risks: sensitive data is being held in 9% of publicly-accessible cloud storage, and 97% of this information is classified as restricted or confidential, according to Tenable's 2025 Cloud Security Risk Report.
Information security
fromComputerWeekly.com
4 months ago

SLA promises, security realities: Navigating the shared responsibility gap | Computer Weekly

SLAs typically cover metrics like uptime, support response times and service performance, but often overlook critical elements such as data protection, breach response and regulatory compliance. This creates a responsibility gap, where assumptions about who is accountable can lead to serious blind spots. For instance, a customer might assume that the cloud provider's SLA guarantees data protection, only to realise that their own misconfigurations or weak identity management practices have led to a data breach.
Information security
#social-security
fromTechCrunch
5 months ago
Information security

DOGE uploaded live copy of Social Security database to 'vulnerable' cloud server, says whistleblower | TechCrunch

fromTechCrunch
5 months ago
Information security

DOGE uploaded live copy of Social Security database to 'vulnerable' cloud server, says whistleblower | TechCrunch

fromwww.theguardian.com
5 months ago

Elon Musk's Doge put sensitive social security data at risk, whistleblower says

The complaint from Charles Borges, the chief data officer at the SSA, alleges that Doge staffers effectively created a live copy of the entire country's social security data from its numerical identification system database. The information is a goldmine for bad actors, the complaint alleges, and was placed on a server without independent oversight that only Doge officials could access.
US politics
fromClickUp
5 months ago

10 Best Wiz Competitors and Alternatives for Cloud Security

Is Wiz giving you solid visibility but falling short on real-time remediation, host-level telemetry, or network traffic analysis? Safe to say, you're not the only one noticing the gaps. As cloud environments become increasingly complex, security teams require tools that identify risks and help mitigate them. This blog post breaks down some of the best Wiz competitors that fill in those missing pieces. Stick around till the end to see how ClickUp (yes, the productivity platform!) supports efficient cloud security collaboration. 🔐
Information security
fromHackernoon
2 years ago

The HackerNoon Newsletter: Agentic AI and the Rise of Outcome Engineering (8/10/2025) | HackerNoon

Immutable backups prevent ransomware and ensure data integrity, meeting compliance needs with secure, tamper-proof cloud data protection. They safeguard critical data effectively.
Tech industry
fromThe Hacker News
5 months ago

The AI-Powered Security Shift: What 2025 Is Teaching Us About Cloud Defense

In today's cloud-native world, real-time, context-aware defense is a baseline expectation, not a competitive edge.
Artificial intelligence
Tech industry
fromTechzine Global
5 months ago

Good quarterly results for Fortinet, but sharp decline in share price

Fortinet's second quarter of 2025 showed revenue growth, but the stock market reacted negatively to cautious forecasts, causing a significant drop in share price.
Privacy technologies
fromTechzine Global
5 months ago

Upwind drafts in Nyx for cloud security keyhole surgery

Upwind's acquisition of Nyx enhances application security through function-level runtime visibility for real-time threat detection and vulnerability prioritization.
DevOps
fromDevOps.com
5 months ago

BMC Extends Scope and Reach of DevOps Mainframe Workflows - DevOps.com

BMC AMI zAdviser Enterprise enhances DevOps for mainframe environments by integrating Git data collection and AI assistance.
Privacy professionals
fromSecuritymagazine
5 months ago

DevOps Missteps Fuel Crypto-Mining: Why Infrastructure Observability Is a Security Imperative

Cryptojacking poses a serious threat by exploiting misconfigured cloud environments, leading to significant cost increases and resource depletion.
Privacy technologies
fromTechzine Global
5 months ago

The browser is the next security frontier: how do we secure it?

Browsers have become critical endpoints and attack vectors, necessitating improved security measures that current EDR solutions can't provide.
Software development
fromInfoWorld
5 months ago

Microsegmentation for developers

Microsegmentation now involves separating workload behaviors rather than just network zones, reflecting both technical and cultural shifts in security responsibilities.
[ Load more ]