Security News
The acquisition will help Accenture build cloud-based industrial internet of things platforms that speed up and optimize clients' production and logistics and enable them to reduce quality and waste issues along the entire supply chain. SALT Solutions will join Accenture Industry X, which helps clients improve how they operate factories and plants.
With these capabilities, Oracle is the only cloud service provider to offer a cloud security posture management dashboard at no additional cost, with numerous pre-built tools that automate response to reduce customer risk quickly and efficiently. Oracle Maximum Security Zones and Oracle Cloud Guard embed decades of enterprise security expertise and best practices into the Oracle public cloud in an autonomous fashion, accelerating customers' ability to ramp up to their cloud estate securely from inception.
Oracle on Monday announced the general availability of its Cloud Guard and Maximum Security Zones cloud security tools. Cloud Guard and Maximum Security Zones were some of the new security services univeled by Oracle in September 2019.
There's a growing, organized and increasingly sophisticated pattern of attacks on cloud native infrastructure, according to Aqua Security. While most attacks were aimed at abusing public cloud compute resources for cryptocurrency mining, the methods used open the door for higher-value targets that leverage security gaps in container software supply chains and runtime environments.
Users of 70 different adult dating and e-commerce websites have had their personal information exposed, thanks to a misconfigured, publicly accessible Elasticsearch cloud server. The data kept on the server was connected to a notification tool used by Mailfire's clients to market to their website users and, in the case of dating sites, notify website users of new messages from potential matches.
The TeamTNT cybercrime gang is back, attacking Docker and Kubernetes cloud instances by abusing a legitimate cloud-monitoring tool called Weave Scope, according to researchers. It can be integrated with Docker, Kubernetes, the Distributed Cloud Operating System and Amazon Web Services Elastic Compute Cloud - and it gives cybercriminals a perfect entree into a company's cloud infrastructure.
A hacking group was observed employing a legitimate tool to gain visibility into and control of compromised cloud environments, threat detection and response company Intezer reported on Tuesday. In a recent attack the adversary no longer deployed malware onto the compromised systems.
A cybercrime group that has previously struck Docker and Kubernetes cloud environments has evolved to repurpose genuine cloud monitoring tools as a backdoor to carry out malicious attacks, according to new research. "To our knowledge, this is the first time attackers have been caught using legitimate third party software to target cloud infrastructure," Israeli cybersecurity firm Intezer said in a Tuesday analysis.
Lenovo Data Center Group announces a range of new and updated hyperconverged infrastructure solutions and Lenovo Cloud Services to enable customers to keep pace with evolving business needs. Lenovo, in collaboration with Microsoft, announce the new Lenovo ThinkAgile MX Azure Stack HCI Edge and Data Center Solutions, enabling customers to rapidly deploy a hybrid cloud infrastructure.
Netskope announced the Cloud Threat Exchange, one of the industry's first cloud-based solutions for the ingestion, curation, and real-time sharing of threat intelligence across enterprise security enforcement points. Any certified, partner, vendor, or customer may use Cloud Threat Exchange to automate the delivery and distribution of high-value, actionable threat intelligence, thus reducing the time to protection and eliminating gaps in coverage.