- CheckMates
- :
- Products
- :
- CloudMates Products
- :
- Weekly Reports
- :
- Re: Last Week in Cloud Security January 16 2025
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Last Week in Cloud Security January 16 2025
Check Point Securing the Cloud
3 CloudGuard Differentiators for Container Security
Kubernetes has become an enterprise’s go-to platform for orchestrating and managing container workloads for cloud-native software. As more organizations adopt it and cloud-native software scales and becomes more complex, the need for container security is high. Kubernetes and container workloads have become a prime enterprise attack surface—67% of organizations delayed or slowed down deployment due to Kubernetes security concerns.
|
|||||
Vulnerabilities and Case Studies
Abusing AWS Native Services: Ransomware Encrypting S3 Buckets with SSE-C
The Halcyon RISE Team has identified a concerning new ransomware campaign targeting Amazon S3 buckets. This attack leverages AWS’s Server-Side Encryption with Customer Provided Keys (SSE-C) to encrypt data, demanding ransom payments for the symmetric AES-256 keys required to decrypt it. Checkpoint CloudGuard detects Credential Access, Discovery and Impact steps of the attack
Malicious Kong Ingress Controller Image Found on DockerHub
A critical security breach in the software supply chain has been detected. An attacker accessed Kong’s DockerHub account and replaced the legitimate Kong Ingress Controller v.3.4.0 image with a malicious version.
Taking legal action to protect the public from abusive AI-generated content
Microsoft’s Digital Crimes Unit (DCU) is taking legal action to ensure the safety and integrity of our AI services. In a complaint unsealed in the Eastern District of Virginia, we are pursuing an action to disrupt cybercriminals who intentionally develop tools specifically designed to bypass the safety guardrails of generative AI services, including Microsoft’s, to create offensive and harmful content. Checkpoint CloudGuard detects Resource Development, Initial Access, Credential Access, and Impact steps of the attack
Wiz Research Identifies Exploitation in the Wild of Aviatrix Controller RCE (CVE-2024-50603)
The Wiz Incident Response team is currently responding to multiple incidents involving CVE-2024-50603, an Aviatrix Controller unauthenticated RCE vulnerability, that can lead to privileges escalation in the AWS control plane. Organizations should patch urgently.
Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool
As many as six security vulnerabilities have been disclosed in the popular Rsync file-synchronizing tool for Unix systems, some of which could be exploited to execute arbitrary code on a client.
|
|||||
Worth Knowing
Cloud, AI demands raise funding for Israeli cybersecurity sector
The latest State of the Cyber Nation Report by YL Ventures showed that Israel's cybersecurity sector secured $4 billion in 2024, more than double the $1.89 billion that cyber firms raised in 2023, according to Reuters.
Addressing the Security Risks of AI in the Cloud
Enterprises have wholeheartedly embraced the cloud. As AI takes center stage, are companies ready for the risks?
|
|||||
Competitive Information
Meet Orca Sensor: Providing Deeply Integrated Runtime Visibility and Protection Into Cloud Detection and Response
The average cost of a data breach globally reached a record total last year, according to IBM. Among the incidents included in their analysis, those targeting public cloud environments cost organizations the most. While cloud computing continues to attract attention and investment from companies, the same is true of attackers.
Wiz Recognized as a 2024 Customers’ Choice in Gartner® Peer Insights report
Wiz named as a Customers’ Choice for Cloud Native Application Protection Platforms
Snyk security researcher deploys malicious NPM packages targeting Cursor.com
Every morning I get up and check what malicious packages my detector had found the night before. It’s like someone checking their fishing nets to see what fish they caught.
|
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Great read!