cloud security
![AT&T](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/31150800/att-1500-400x200.webp)
Hackers stole call, text records of “nearly all” of AT&T’s cellular customers
Hackers leveraging stolen Snowflake account credentials have stolen records of calls and texts made by “nearly all” of AT&T’s cellular customers from May to …
![Snowflake](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/01214043/snowflake-4-1500-400x200.webp)
Info of 2,3+ million individuals stolen in Advance Auto Parts data breach
Personal information of over 2,3 million individuals has been stolen by attackers as part of the massive data grab via compromised Snowflake accounts without MFA protection, …
![Authy](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/11143217/twilio-authy-1500-400x200.webp)
Using Authy? Beware of impending phishing attempts
Do you use Authy for your multi-factor authentication needs? If you do, you should keep an eye out for phishing attempts, as well as implement defenses against SIM swapping …
![AWS](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/12155825/aws-1500-cloud-400x200.webp)
AWS unveils new and improved security features
At its annual re:Inforce conference, Amazon Web Services (AWS) has announced new and enhanced security features and tools. Additional multi-factor authentication option To …
![Snowflake](https://img.helpnetsecurity.com/wp-content/uploads/2024/05/31203450/snowflake-3-1500-400x200.webp)
The number of known Snowflake customer data breaches is rising
LendingTree subsidiary QuoteWizard and automotive parts provider Advance Auto Parts have been revealed as victims of attackers who are trying to sell data stolen from …
![Cisco Webex](https://img.helpnetsecurity.com/wp-content/uploads/2024/06/05171009/webex-cisco-1500-1-400x200.webp)
Vulnerability in Cisco Webex cloud service exposed government authorities, companies
The vulnerability that allowed a German journalist to discover links to video conference meetings held by Bundeswehr (the German armed forces) and the Social Democratic Party …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2023/12/15121401/cloud-red-400x200.jpg)
Cloud security incidents make organizations turn to AI-powered prevention
Cloud security incidents are alarmingly on the rise, with 61% of organizations reporting breaches within the last year, marking a significant increase from 24% the year …
![cloud security](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/29120648/cloud_security-1-400x200.jpg)
Building a strong cloud security posture
In this Help Net Security video, David Kellerman, Field CTO at Cymulate, discusses how cloud security still seems to lag even as the cloud grows in popularity and usage. Many …
![Cloud Console Cartographer](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/15182239/cloud_console_cartographer-1500-400x200.webp)
Cloud Console Cartographer: Open-source tool helps security teams transcribe log activity
Cloud Console Cartographer is an open-source tool that maps noisy log activity into highly consolidated, succinct events to help security practitioners cut through the noise …
![cloud security](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/29120634/cloud_security-1400-400x200.jpg)
Exposing the top cloud security threats
Many companies consider AI-powered threats to be the top cloud security threat to their business. Concerningly, less than half are confident in their ability to tackle those …
![Microsoft](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/03095125/microsoft-threat-1500-400x200.webp)
A “cascade” of errors let Chinese hackers into US government inboxes
Microsoft still doesn’t known how Storm-0558 attackers managed to steal the Microsoft Services Account cryptographic key they used to forge authentication tokens needed …
![cloud active defense](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/25191712/cloud_active_defense-1500-400x200.webp)
Cloud Active Defense: Open-source cloud protection
Cloud Active Defense is an open-source solution that integrates decoys into cloud infrastructure. It creates a dilemma for attackers: risk attacking and being detected …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders