- CheckMates
- :
- Products
- :
- CloudMates Products
- :
- Weekly Reports
- :
- Last Week in Cloud Security December 12 2024
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Last Week in Cloud Security December 12 2024
Check Point Securing the Cloud
Empowering MSSPs with CloudGuard CSPM: Secure Multi-Cloud Environments with Confidence
As organizations embrace cloud infrastructure at a rapid pace, they face a growing number of challenges: maintaining visibility, ensuring compliance, and mitigating cloud misconfigurations. Managed Security Service Providers (MSSPs) are uniquely positioned to help businesses navigate these hurdles—but they need the right tools to succeed.
|
||||
Vulnerabilities and Case Studies
Tales from the cloud trenches: Unwanted visitor
Amazon Simple Email Service (SES) is a common target for attackers to send out spam or phishing emails. In this post, we explore specific techniques regarding persistence within AWS SES that we have observed used by an attacker. What made this intrusion notable was the attacker's use of an external account under their control to assume a role within the victim's environment.
Oasis Security Research Team Discovers Microsoft Azure MFA Bypass
Oasis Security's research team uncovered a critical vulnerability in Microsoft's Multi-Factor Authentication (MFA) implementation, allowing attackers to bypass it and gain unauthorized access to the user’s account, including Outlook emails, OneDrive files, Teams chats, Azure Cloud, and more. Microsoft has more than 400 million paid Office 365 seats, making the consequences of this vulnerability far-reaching.
Cloud threat report: Possible trend in cloud credential “oversaturation”
For years now, the dark web has built and maintained its own evolving economy, supported by the acquisition and sales of stolen data, user login credentials and business IP. But much like any market today, the dark web economy is subject to supply and demand.
ShinyHunters, Nemesis Linked to Hacks After Leaking Their AWS S3 Bucket
Cybersecurity researchers have identified a large-scale hacking operation linked to notorious ShinyHunters and Nemesis hacking groups. In this operation, hackers exploited vulnerabilities in millions of websites and took advantage of misconfiguration to access sensitive information including customer data, infrastructure credentials, and proprietary source code.
|
||||
Worth Knowing
Genetec Physical Security Report Shows Accelerating Hybrid Cloud Adoption
More than 4% of US attempted e-commerce transactions between Thanksgiving and Cyber Monday suspected to be fraudulent.
Snowflake Rolls Out Mandatory MFA Plan
As part of the commitment to CISA's Secure by Design pledge, Snowflake will begin blocking sign-ins using single-factor authentication next year.
|
||||
Competitive Information
As part of the commitment to CISA's Secure by Design pledge, Snowflake will begin blocking sign-ins using single-factor authentication next year.
As a part of Upwind’s runtime-powered threat detection capabilities, the Upwind Platform integrates seamlessly with AWS CloudTrail to provide real-time monitoring and detection of cloud logs. By leveraging AWS CloudTrail Logs generated at runtime, Upwind is able to provide deep runtime context and automatically alert you to suspicious or malicious log events.
|