Security News

Hackers exploit Looney Tunables Linux bug, steal cloud creds
2023-11-06 20:26

The operators of the Kinsing malware are targeting cloud environments with systems vulnerable to "Looney Tunables," a Linux security issue identified as CVE-2023-4911 that allows a local attacker to gain root privileges on the system. In a report from cloud security company Aqua Nautilus, researchers describe a Kinsing malware attack where the threat actor exploited CVE-2023-4911 to elevate permissions on a compromised machine.

The perils of over-reliance on single cloud providers
2023-11-06 04:30

The risk associated with dependence on a particular cloud provider for multiple business capabilities is in the top five emerging risks for organizations for the second consecutive quarter, according to a survey by Gartner. In September 2023, Gartner surveyed 294 risk executives about their views on emerging risk or over-the-horizon risks.

EleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation
2023-11-03 19:31

In the active Elektra-Leak campaign, attackers hunt for Amazon IAM credentials within public GitHub repositories before using them for cryptomining. New research from Palo Alto Networks's Unit 42 exposes an active attack campaign in which a threat actor hunts for Amazon IAM credentials in real time in GitHub repositories and starts using them less than five minutes later.

Kinsing Actors Exploiting Recent Linux Flaw to Breach Cloud Environments
2023-11-03 13:12

The threat actors linked to Kinsing have been observed attempting to exploit the recently disclosed Linux privilege escalation flaw called Looney Tunables as part of a "new experimental campaign"...

Amazon Web Services Launches Independent European Cloud as Calls for Data Sovereignty Grow
2023-11-01 17:10

Amazon Web Services has launched an independent cloud for Europe designed for public sector customers and companies operating in highly regulated industries within the European Union. The AWS Sovereign Cloud will operate both "Physically and logically" separate from AWS's existing cloud regions and has been engineered specifically to meet the data residency and regulatory requirements of European customers.

Helping you bridge the cloud security gap
2023-10-24 08:15

Sponsored Post The job of the cyber security professional is never easy, and it gets progressively harder with the movement of sensitive data and applications across the multiple different on and off premise systems that make up modern hybrid cloud environments. That's why SANS has created a training and certification curriculum devoted specifically to cloud security, designed to help those responsible for implementing effective cloud security measures within their organisation to broaden their knowledge and skills.

New Netskope Report Exposes Increasing Use of Cloud Apps to Spread Malware
2023-10-17 20:14

A new report from Netskope detailing the top techniques used by cybercriminals to attack organizations found that cloud apps are increasingly being used by threat actors, representing 19% of all clicks on spearphishing links. Netskope recently reported that Microsoft OneDrive is the most popular cloud app used in enterprises, so it is not a surprise that attackers leverage this target a lot, alongside Microsoft Teams, SharePoint and Outlook.

Critical Vulnerabilities Uncovered in Open Source CasaOS Cloud Software
2023-10-17 14:37

Two critical security flaws discovered in the open-source CasaOS personal cloud software could be successfully exploited by attackers to achieve arbitrary code execution and take over susceptible...

How organizations can combat rising cloud costs with FinOps
2023-10-16 04:00

When it comes to the cloud, many organizations prioritize speed over spend. Spending on public cloud services is forecasted to grow 21.7% to a total of $597.3 billion in 2023, according to Gartner.

530K people's info feared stolen from cloud PC gaming biz Shadow
2023-10-13 18:57

Shadow, which hosts Windows PC gaming in the cloud among other services, has confirmed criminals stole a database containing customer data following a social-engineering attack against one of its employees. Customers can also access remote PC instances for development work and other tasks as well as cloud storage.