Security News
Researchers have described a voltage glitching attack that shows AMD's Secure Encrypted Virtualization technology may not provide proper protection for confidential data in cloud environments. The TU Berlin researchers showed that an attacker who has physical access to the targeted system can gain access to SEV-protected VM memory content by launching a voltage fault injection attack on SP. In order to work as intended, integrated circuits need to operate within specific temperature, clock stability, electromagnetic field, and supply voltage ranges.
The combined public cloud IaaS and PaaS market is forecast to have revenues of $400 billion in 2025 with a compound annual growth rate of 28.8% during the 2021-2025 forecast period, according to IDC. Application development and testing, structured data management, and structured data analytics will be the largest workload segments by revenue share. "Enterprise spending on public cloud infrastructure continues to grow faster than traditional IT infrastructure segments," said Andrew Smith, research manager Cloud Infrastructure Services at IDC. "We expect all workload segments to grow in the double digits - some slightly faster than others - as enterprises emerge from 2020 and continue to prioritize workload migration and modernization using public cloud infrastructure."
ShopVue announced the availability of a cloud deployment solution. ShopVue now offers manufacturers the choice of on-premise or cloud deployment options based on their specific needs and preferences.
Ideally, engage with a cloud provider that can extend existing data center security into the cloud. The learning curve will be reduced for the security team and enables the same policies to be developed and deployed across physical and cloud infrastructure.
Toshiba is enabling businesses to easily leverage cloud-based workplace solutions for today's modern workforce. The company's Elevate Sky platform features a broad portfolio of Toshiba and third-party cloud-enabled systems, software and services including print, document and printer fleet management, workflow and beyond.
Threat Stack announced new alert context functionality to reduce mean-time-to-know within the Threat Stack Cloud Security Platform. Threat Stack's enhanced alert context provides meaningful data that will help guide security leaders' investigations into high severity alerts in real-time.
PacketFabric announced that it has released native support of IPsec VPN tunnels as a connection type for its Cloud Router product. "The cloud is all about scale and flexibility. But traditional cloud connectivity hasn't delivered scalability or flexibility. You've had to backhaul traffic through data centers, wait an entire ice age for circuits to provision, rely on unpredictable Internet, or deal with inflexible long-term telco-style contracts," said PacketFabric Chief Technology Officer and Chief Product Officer Anna Claiborne.
To help ease the transition to the cloud, VMware announced GE Healthcare will leverage VMware SD-WAN, now part of VMware SASE, to seamlessly deliver cloud-based services to GE Healthcare customers. "VMware SD-WAN provides this network overlay to prioritize and move high-fidelity, latency-sensitive data to the cloud and between edge locations. Leveraging VMware SD-WAN enables GE Healthcare to offer rapid, more securely deployed, and easily accessed virtual care solutions."
"We found a simple loophole that allowed us to intercept a portion of worldwide dynamic DNS traffic going through managed DNS providers like Amazon and Google," researchers Shir Tamari and Ami Luttwak from infrastructure security firm Wiz said. The exploitation process hinges on registering a domain on Amazon's Route53 DNS service with the same name as the DNS name server - which provides the translation of domain names and hostnames into their corresponding Internet Protocol addresses - resulting in a scenario that effectively breaks the isolation between tenants, thus allowing valuable information to be accessed.
"We found a simple loophole that allowed us to intercept a portion of worldwide dynamic DNS traffic going through managed DNS providers like Amazon and Google," researchers Shir Tamari and Ami Luttwak from infrastructure security firm Wiz said. The exploitation process hinges on registering a domain on Amazon's Route53 DNS service with the same name as the DNS name server - which provides the translation of domain names and hostnames into their corresponding Internet Protocol addresses - resulting in a scenario that effectively breaks the isolation between tenants, thus allowing valuable information to be accessed.