Security News

Uniting the brightest minds in security, network and cloud
2024-08-23 03:26

Immerse is Cloudflare’s premier annual conference in Southeast Asia Partner Content Cloudflare is excited to present Immerse, our flagship event designed to connect attendees directly with the...

110K domains targeted in 'sophisticated' AWS cloud extortion campaign
2024-08-21 17:23

If you needed yet another reminder of what happens when security basics go awry It's a good news day for organizations that don't leave their AWS environment files publicly exposed because infosec...

Xeon Sender Tool Exploits Cloud APIs for Large-Scale SMS Phishing Attacks
2024-08-19 10:02

Malicious actors are using a cloud attack tool named Xeon Sender to conduct SMS phishing and spam campaigns on a large scale by abusing legitimate services. "Attackers can use Xeon to send...

Attackers Exploit Public .env Files to Breach Cloud Accounts in Extortion Campaign
2024-08-16 16:30

A large-scale extortion campaign has compromised various organizations by taking advantage of publicly accessible environment variable files that contain credentials associated with cloud and social media applications. Env files, out of which 7,000 belonged to organizations' cloud services and 1,500 variables are linked to social media accounts.

Hide yo environment files! Or risk getting your cloud-stored data stolen and held for ransom
2024-08-15 14:07

Cybercriminals are breaking into organizations' cloud storage containers, exfiltrating their sensitive data and, in several cases, have been paid off by the victim organizations to not leak or sell the stolen data. Exposed environment files hold keys to hosting cloud environments.

Evolve your cloud security knowledge
2024-08-12 08:52

Maybe not surprising then that cloud security often tops the CISO agenda but it's a complex topic to keep on top of. Entirely free of charge, this annual meeting of top security minds is an opportunity for security professionals everywhere to learn from, and network with, experts and peers to build on their existing cloud security knowledge.

Scout Suite: Open-source cloud security auditing tool
2024-08-12 04:30

Scout Suite is an open-source, multi-cloud security auditing tool designed to assess the security posture of cloud environments. By leveraging the APIs provided by cloud vendors, Scout Suite collects and organizes configuration data, making it easier to identify potential risks.

Misconfigurations and IAM weaknesses top cloud security concerns
2024-08-12 03:00

Traditional cloud security issues often associated with cloud service providers are continuing to decrease in importance, according to the Top Threats to Cloud Computing 2024 report by the Cloud Security Alliance. "It's tempting to think that the reason the same issues have remained in the top spots since the report was last issued stems from a lack of progress in securing these features. The larger picture speaks to the importance placed on these vulnerabilities by organizations and the degrees to which they are working to build ever more secure and resilient cloud environments," said Michael Roza, co-chair, Top Threats Working Group.

Get a Lifetime of 1TB Cloud Storage for Only $70 With FolderFort
2024-08-08 09:59

TL;DR: Get speedy, secure and user-friendly cloud storage with a lifetime subscription to the FolderFort 1TB Storage Pro Plan - it's currently on sale at 68% off for just $80. Cloud data storage is one of the most useful and convenient developments in technology for businesses. Though it's certainly been around long enough, plans offering large amounts of storage still tend to be either slow or pricey.

Cloud storage lockers from Microsoft and Google used to store and spread state-sponsored malware
2024-08-08 01:58

Black Hat State-sponsored cyber spies and criminals are increasingly using legitimate cloud services to attack their victims, according to Symantec's threat hunters who have spotted three such operations over recent months, plus new data theft and other malware tools in development by these goons. This piece of malware used Microsoft's Graph API to communicate with the attacker's command and control server, hosted on Microsoft OneDrive.