Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Omer_Shliva
Employee
Employee

Last Week in Cloud Security February 06 2025

Vulnerabilities and Case Studies

 

FUNNULL Unmasked: AWS, Azure Abused for Global Cybercrime Operations

 

Discover how cybercriminals use ‘Infrastructure Laundering’ to exploit AWS and Azure for scams, phishing, and money laundering. Learn about FUNNULL CDN’s tactics and their global impact on businesses and cybersecurity.

 

READ MORE

 

 

8 Million Requests Later, We Made The SolarWinds Supply Chain Attack Look Amateur

 

Surprise surprise, we've done it again. We've demonstrated an ability to compromise significantly sensitive networks, including governments, militaries, space agencies, cyber security companies, supply chains, software development systems and environments, and more.

 

READ MORE

 

 

How attackers abuse S3 Bucket Namesquatting — And How to Stop Them

 

With the sheer amount of data and users leveraging AWS, it’s easy for misconfigurations to slip through the cracks. One commonly overlooked area is the naming of S3 buckets.

 

READ MORE

 

 

Worth Knowing

 

Streamline container security with unified cloud-native threat protection

 

In the midst of the AI revolution that is reshaping our future, containerized platforms have become the core infrastructure for modern applications. Their unparalleled scalability, short deployment cycles, and efficiency make them indispensable for rapid application deployment. According to the Cloud Native Computing Foundation (CNCF), 80% of organizations using Kubernetes plan to build most of their new applications on cloud-native platforms within the next five years.

 

READ MORE

 

 

EMEA CISOs Plan 2025 Cloud Security Investment

 

Cybersecurity leaders at large enterprises are planning to ramp up spending on cloud security in 2025 and want channel partners to help them maximise their return on investment, according to new research by Westcon-Comstor.

 

READ MORE

 

 

The Basics of AWS Infrastructure Security

 

Discover key strategies to strengthen your AWS security posture, from applying protection at all layers to understanding shared responsibility in the cloud.

 

READ MORE

 

 

Watch Out For These 8 Cloud Security Shifts in 2025

 

As cloud security evolves in 2025 and beyond, organizations must adapt to both new and evolving realities, including the increasing reliance on cloud infrastructure for AI-driven workflows and the vast quantities of data being migrated to the cloud.

 

READ MORE

 

 

Competitive Information and the Cloud Security Market

 

Tenable to Acquire Vulcan Cyber to Boost Exposure Management Focus

 

The deal, expected to close this quarter, will give Tenable One Exposure Management much-needed integration with over 100 third-party security tools and platforms.

 

READ MORE

 

 

Exposure Management Provider CYE Acquires Solvo

 

The addition of Solvo CSPM to CYE Hyver aims to address the need for multicloud vulnerability monitoring and risk assessment.

 

READ MORE

0 Kudos
1 Reply
the_rock
Legend
Legend

Excellent!

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.