Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Omer_Shliva
Employee
Employee

Last Week in Cloud Security December 12 2024

Check Point Securing the Cloud

 

Empowering MSSPs with CloudGuard CSPM: Secure Multi-Cloud Environments with Confidence

 

As organizations embrace cloud infrastructure at a rapid pace, they face a growing number of challenges: maintaining visibility, ensuring compliance, and mitigating cloud misconfigurations. Managed Security Service Providers (MSSPs) are uniquely positioned to help businesses navigate these hurdles—but they need the right tools to succeed.

 

READ MORE

 

 

Vulnerabilities and Case Studies

 

Tales from the cloud trenches: Unwanted visitor

 

Amazon Simple Email Service (SES) is a common target for attackers to send out spam or phishing emails. In this post, we explore specific techniques regarding persistence within AWS SES that we have observed used by an attacker. What made this intrusion notable was the attacker's use of an external account under their control to assume a role within the victim's environment.

 

READ MORE

 

 

Oasis Security Research Team Discovers Microsoft Azure MFA Bypass

 

Oasis Security's research team uncovered a critical vulnerability in Microsoft's Multi-Factor Authentication (MFA) implementation, allowing attackers to bypass it and gain unauthorized access to the user’s account, including Outlook emails, OneDrive files, Teams chats, Azure Cloud, and more. Microsoft has more than 400 million paid Office 365 seats, making the consequences of this vulnerability far-reaching.

 

READ MORE

 

 

Cloud threat report: Possible trend in cloud credential “oversaturation”

 

For years now, the dark web has built and maintained its own evolving economy, supported by the acquisition and sales of stolen data, user login credentials and business IP. But much like any market today, the dark web economy is subject to supply and demand.

 

READ MORE

 

 

ShinyHunters, Nemesis Linked to Hacks After Leaking Their AWS S3 Bucket

 

Cybersecurity researchers have identified a large-scale hacking operation linked to notorious ShinyHunters and Nemesis hacking groups. In this operation, hackers exploited vulnerabilities in millions of websites and took advantage of misconfiguration to access sensitive information including customer data, infrastructure credentials, and proprietary source code.

 

READ MORE

 

 

Worth Knowing

 

Genetec Physical Security Report Shows Accelerating Hybrid Cloud Adoption

 

More than 4% of US attempted e-commerce transactions between Thanksgiving and Cyber Monday suspected to be fraudulent.

 

READ MORE

 

 

Snowflake Rolls Out Mandatory MFA Plan

 

As part of the commitment to CISA's Secure by Design pledge, Snowflake will begin blocking sign-ins using single-factor authentication next year.

 

READ MORE

 

 

Competitive Information

 

As part of the commitment to CISA's Secure by Design pledge, Snowflake will begin blocking sign-ins using single-factor authentication next year.

 

As a part of Upwind’s runtime-powered threat detection capabilities, the Upwind Platform integrates seamlessly with AWS CloudTrail to provide real-time monitoring and detection of cloud logs. By leveraging AWS CloudTrail Logs generated at runtime, Upwind is able to provide deep runtime context and automatically alert you to suspicious or malicious log events.

 

READ MORE

0 Replies

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.