Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Omer_Shliva
Employee
Employee

Last Week in Cloud Security January 16 2025

Check Point Securing the Cloud

 

3 CloudGuard Differentiators for Container Security

 

Kubernetes has become an enterprise’s go-to platform for orchestrating and managing container workloads for cloud-native software. As more organizations adopt it and cloud-native software scales and becomes more complex, the need for container security is high. Kubernetes and container workloads have become a prime enterprise attack surface—67% of organizations delayed or slowed down deployment due to Kubernetes security concerns.

 

READ MORE

 

 

Vulnerabilities and Case Studies

 

Abusing AWS Native Services: Ransomware Encrypting S3 Buckets with SSE-C

 

The Halcyon RISE Team has identified a concerning new ransomware campaign targeting Amazon S3 buckets. This attack leverages AWS’s Server-Side Encryption with Customer Provided Keys (SSE-C) to encrypt data, demanding ransom payments for the symmetric AES-256 keys required to decrypt it.

Checkpoint CloudGuard detects Credential Access, Discovery and Impact steps of the attack

 

READ MORE

 

 

Malicious Kong Ingress Controller Image Found on DockerHub

 

A critical security breach in the software supply chain has been detected. An attacker accessed Kong’s DockerHub account and replaced the legitimate Kong Ingress Controller v.3.4.0 image with a malicious version.

 

READ MORE

 

 

Taking legal action to protect the public from abusive AI-generated content

 

Microsoft’s Digital Crimes Unit (DCU) is taking legal action to ensure the safety and integrity of our AI services. In a complaint unsealed in the Eastern District of Virginia, we are pursuing an action to disrupt cybercriminals who intentionally develop tools specifically designed to bypass the safety guardrails of generative AI services, including Microsoft’s, to create offensive and harmful content.

Checkpoint CloudGuard detects Resource Development, Initial Access, Credential Access, and Impact steps of the attack

 

READ MORE

 

 

Wiz Research Identifies Exploitation in the Wild of Aviatrix Controller RCE (CVE-2024-50603)

 

The Wiz Incident Response team is currently responding to multiple incidents involving CVE-2024-50603, an Aviatrix Controller unauthenticated RCE vulnerability, that can lead to privileges escalation in the AWS control plane. Organizations should patch urgently.

 

READ MORE

 

 

Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool

 

As many as six security vulnerabilities have been disclosed in the popular Rsync file-synchronizing tool for Unix systems, some of which could be exploited to execute arbitrary code on a client.

 

READ MORE

 

 

Worth Knowing

 

Cloud, AI demands raise funding for Israeli cybersecurity sector

 

The latest State of the Cyber Nation Report by YL Ventures showed that Israel's cybersecurity sector secured $4 billion in 2024, more than double the $1.89 billion that cyber firms raised in 2023, according to Reuters.

 

READ MORE

 

 

Addressing the Security Risks of AI in the Cloud

 

Enterprises have wholeheartedly embraced the cloud. As AI takes center stage, are companies ready for the risks?

 

READ MORE

 

 

Competitive Information

 

Meet Orca Sensor: Providing Deeply Integrated Runtime Visibility and Protection Into Cloud Detection and Response

 

The average cost of a data breach globally reached a record total last year, according to IBM. Among the incidents included in their analysis, those targeting public cloud environments cost organizations the most. While cloud computing continues to attract attention and investment from companies, the same is true of attackers.

 

READ MORE

 

 

Wiz Recognized as a 2024 Customers’ Choice in Gartner® Peer Insights report

 

Wiz named as a Customers’ Choice for Cloud Native Application Protection Platforms

 

READ MORE

 

 

Snyk security researcher deploys malicious NPM packages targeting Cursor.com

 

Every morning I get up and check what malicious packages my detector had found the night before. It’s like someone checking their fishing nets to see what fish they caught.

 

READ MORE

1 Reply
the_rock
Legend
Legend

Great read!

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.