- CheckMates
- :
- Products
- :
- CloudMates Products
- :
- Weekly Reports
- :
- Re: Last Week in Cloud Security February 06 2025
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Last Week in Cloud Security February 06 2025
Vulnerabilities and Case Studies
FUNNULL Unmasked: AWS, Azure Abused for Global Cybercrime Operations
Discover how cybercriminals use ‘Infrastructure Laundering’ to exploit AWS and Azure for scams, phishing, and money laundering. Learn about FUNNULL CDN’s tactics and their global impact on businesses and cybersecurity.
8 Million Requests Later, We Made The SolarWinds Supply Chain Attack Look Amateur
Surprise surprise, we've done it again. We've demonstrated an ability to compromise significantly sensitive networks, including governments, militaries, space agencies, cyber security companies, supply chains, software development systems and environments, and more.
How attackers abuse S3 Bucket Namesquatting — And How to Stop Them
With the sheer amount of data and users leveraging AWS, it’s easy for misconfigurations to slip through the cracks. One commonly overlooked area is the naming of S3 buckets.
|
||||
Worth Knowing
Streamline container security with unified cloud-native threat protection
In the midst of the AI revolution that is reshaping our future, containerized platforms have become the core infrastructure for modern applications. Their unparalleled scalability, short deployment cycles, and efficiency make them indispensable for rapid application deployment. According to the Cloud Native Computing Foundation (CNCF), 80% of organizations using Kubernetes plan to build most of their new applications on cloud-native platforms within the next five years.
EMEA CISOs Plan 2025 Cloud Security Investment
Cybersecurity leaders at large enterprises are planning to ramp up spending on cloud security in 2025 and want channel partners to help them maximise their return on investment, according to new research by Westcon-Comstor.
The Basics of AWS Infrastructure Security
Discover key strategies to strengthen your AWS security posture, from applying protection at all layers to understanding shared responsibility in the cloud.
Watch Out For These 8 Cloud Security Shifts in 2025
As cloud security evolves in 2025 and beyond, organizations must adapt to both new and evolving realities, including the increasing reliance on cloud infrastructure for AI-driven workflows and the vast quantities of data being migrated to the cloud.
|
||||
Competitive Information and the Cloud Security Market
Tenable to Acquire Vulcan Cyber to Boost Exposure Management Focus
The deal, expected to close this quarter, will give Tenable One Exposure Management much-needed integration with over 100 third-party security tools and platforms.
Exposure Management Provider CYE Acquires Solvo
The addition of Solvo CSPM to CYE Hyver aims to address the need for multicloud vulnerability monitoring and risk assessment.
|
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Excellent!
![](/skins/images/7A1782F19EEDD3757E1DDB3CF96B7DC3/responsive_peak/images/icon_anonymous_message.png)