Security News

How much does cloud-based identity expand your attack surface?
2024-03-29 06:00

We all know using a cloud-based identity provider expands your attack surface, but just how big does that attack surface get? And can we even know for sure? The first step towards mitigating the expanded attack surface in the cloud is recognizing the risks and potential vulnerabilities of cloud identity providers.

56,000+ cloud-based apps at risk of malware exfiltration
2023-05-10 03:30

Even more alarming are the revelations in this year's report about browser session cookies - unquestionably the most prized data exfiltrated by malware. SpyCloud recaptured 1.87 billion malware cookie records tied to Fortune 1000 employees.

Amazon Linux 2023: Create and execute cloud-based applications with enhanced security
2023-03-16 08:30

AWS has been offering Amazon Linux, a cloud-optimized Linux distribution, since 2010. Amazon Linux 2023 is provided at no additional charge.

Cloud-based Cryptocurrency Miners Targeting GitHub Actions and Azure VMs
2022-07-11 20:24

GitHub Actions and Azure virtual machines are being leveraged for cloud-based cryptocurrency mining, indicating sustained attempts on the part of malicious actors to target cloud resources for illicit purposes. "Attackers can abuse the runners or servers provided by GitHub to run an organization's pipelines and automation by maliciously downloading and installing their own cryptocurrency miners to gain profit easily," Trend Micro researcher Magno Logan said in a report last week.

New cloud-based Microsoft Defender for home now generally available
2022-06-16 15:14

Microsoft has announced today the general availability of Microsoft Defender for Individuals, the company's new security solution for personal phones and computers. This new cross-device security solution is available for all Microsoft 365 customers with Personal or Family subscriptions starting today.

How to eliminate the weak link in public cloud-based multi-party computation
2022-05-27 04:00

Regardless of how centralized or distributed, the weak link appears when private keys or other MPC components must be computationally executed on a CPU. The point of the encryption protocols is that the algorithm is public, and the security relies only on the keys. If an attacker infiltrates multiple hosts, and gains access to the required pieces, they can perform the multi-party computation on their own and steal digital assets and funds.

Microsoft tests new cloud-based Microsoft Defender for home users
2022-03-09 20:32

Microsoft has announced that the company's new cloud-based Microsoft Defender security solution has entered preview for home customers in the United States. While Microsoft paints a pretty picture of Microsoft Defender Preview's capabilities, in reality, the application is in its very early stages.

SafeDNS: Cloud-based Internet Security and Web Filtering Solution for MSPs
2022-02-15 05:16

Why is a web filtering important and what are the main features necessary for MSPs? Managed service providers have been struggling with finding the right web filtering solutions. Web filtering is necessary for businesses because it prevents the staff from accessing malicious and harmful content while using the corporate network or while working from home, besides offering other advantages like monitoring their performance and keeping it to the maximum to ensure productivity.

Convergence Ahoy: Get Ready for Cloud-Based Ransomware
2021-12-17 15:45

Oliver Tavakoli, CTO at Vectra AI, takes us inside the coming nexus of ransomware, supply-chain attacks and cloud deployments. Why are ransomware and the supply chain coming together? Historically, what started out as nation-state techniques make their way into pen-testing and red teaming tools and eventually become commoditized in attacks undertaken by hackers seeking profit.

40% of organizations suffered a cloud-based data breach in the past 12 months
2021-11-02 05:00

Despite increasing cyberattacks targeting data in the cloud, 83% of businesses are still failing to encrypt half of the sensitive data they store in the cloud, raising even greater concerns as to the impact cyber criminals can have. 40% of organizations have experienced a cloud-based data breach in the past 12 months, according to a study conducted by 451 Research.