Security News

27 flaws in USB over network SDK affect millions of cloud users
2021-12-07 15:15

Researchers have discovered 27 vulnerabilities in Eltima SDK, a library used by numerous cloud providers to remotely mount a local USB device. This necessity also increased cloud providers utilizing Eltima's SDK that allow employees to mount local USB mass storage devices for use on their cloud-based virtual desktops.

Apache Kafka Cloud Clusters Expose Sensitive Data for Large Companies
2021-12-06 16:14

Kafdrop is a management interface for Apache Kafka, which is an open-source, cloud-native platform for collecting, analyzing, storing and managing data streams. It connects and maps existing Kafka clusters automatically, Spectral researchers explained, allowing users to manage topic creation and removal, as well as "Understand the topology and layout of a cluster, drilling into hosts, topics, partitions, and consumers. It also allows you to sample and download live data from all topics and partitions, acting as a legitimate Kafka consumer."

What Are Your Top Cloud Security Challenges? Threatpost Poll
2021-12-03 17:47

We want to know what your biggest cloud security concerns and challenges are, and how your company is dealing with them. Weigh in with our exclusive poll!

Threat Group Takes Aim Again at Cloud Platform Provider Zoho
2021-12-03 13:17

State-backed adversaries expanded attacks against cloud platform company Zoho and its ManageEngine ServiceDesk Plus software, a help desk and asset management solution. Back in November, Unit 42 said it observed correlations between the tactics and tooling used in ADSelfService Plus campaigns and Threat Group 3390, also known as TG-3390 and Emissary Panda or APT27.

S3 Ep61: Call scammers, cloud insecurity, and facial recognition creepiness [Podcast+Transcript]
2021-12-02 20:50

Oh! No! The wannabe wizard that went to school with a trainee Sith. LISTEN NOW. Click-and-drag on the soundwaves below to skip to any point in the podcast.

Open source cloud native security analyzer Terrascan embeds security into native DevOps tooling
2021-12-02 05:30

Tenable enhanced Terrascan, an open source cloud native security analyzer that helps developers secure Infrastructure as Code. "It's now more critical than ever for developers to have tools that can detect compliance and security violations across their entire cloud systems, including IaC," said Nico Popp, chief product officer, Tenable.

Secure cloud products and services with new CIS Benchmarks
2021-11-30 04:00

This effort resulted in CIS Benchmarks specific to cloud CSP products and services. The product-level CIS Benchmarks complement the CIS Foundations Benchmarks by providing an additional layer of security built into the cloud services used within the cloud account.

82% of IT leaders looking to cloud for critical mainframe applications to remain competitive
2021-11-29 04:00

LzLabs announced the results of its latest global survey, conducted by Vanson Bourne, revealing that the desire to migrate, modernize and embrace cloud for critical mainframe applications is rapidly increasing amongst global IT decision makers. The survey of 650 IT leaders globally has confirmed that the trend of new IT modernization options being performed off the mainframe is continuing, with organizations seeking to reduce system breaks between applications on legacy platforms and those on open systems and the cloud.

Hackers Using Compromised Google Cloud Accounts to Mine Cryptocurrency
2021-11-29 02:56

Threat actors are exploiting improperly-secured Google Cloud Platform instances to download cryptocurrency mining software to the compromised systems as well as abusing its infrastructure to install ransomware, stage phishing campaigns, and even generate traffic to YouTube videos for view count manipulation. "While cloud customers continue to face a variety of threats across applications and infrastructure, many successful attacks are due to poor hygiene and a lack of basic control implementation," Google's Cybersecurity Action Team outlined as part of its recent Threat Horizons report published last week.

Cloud Security: Don’t wait until your next bill to find out about an attack!
2021-11-26 19:58

Firstly, crooks show up fast: occasionally, it takes them days to find newly-started, insecure cloud instances and break in, but Google wrote that discover-break-and-enter times were "As little as 30 minutes." Importantly, in our research, the cloud instances we used weren't the sort of cloud server that a typical company would set up, given that they were never actually named via DNS, advertised, linked to, or used for any real-world purpose.