#misconfiguration

[ follow ]
Information security
fromTheregister
1 week ago

Mandiant plugs Salesforce leaks with open source tool

AuraInspector detects Salesforce Aura access-control misconfigurations that can expose sensitive data and automates read-only tests plus remediation suggestions.
#cloud-security
fromInfoWorld
2 weeks ago
Information security

What drives your cloud security strategy?

Organizations must prioritize cultivating cloud security skills and training instead of relying primarily on tools to prevent breaches caused by misconfigurations and credential failures.
fromIT Pro
3 months ago
Information security

Cloud security: How to detect breaches and stop them quickly

Slow detection and remediation leave cloud breaches exposed: only 9% detected within an hour and most enterprises take over 24 hours to recover.
Information security
fromTheregister
4 months ago

CIO made dangerous mistake, demanded it go into production

A flawed firewall rule update deployed under managerial pressure caused European office firewalls to go offline, triggering a major incident and disaster recovery activation.
Privacy professionals
fromThe Hacker News
5 months ago

Misconfigurations Are Not Vulnerabilities: The Costly Confusion Behind Security Risks

Misconfigurations and vulnerabilities are distinct concepts in SaaS security, both posing different risks that require specific attention.
Privacy technologies
fromIT Pro
6 months ago

26 million CVs were exposed when a recruiting software firm left a misconfigured Azure container open - cybersecurity experts warn it's an easy mistake that's becoming far too common

A recruitment database leak exposed nearly 26 million resumes due to misconfigured storage, raising concerns about targeted phishing risks.
[ Load more ]