cloud security

Vulnerable cloud infrastructure experiencing increasing attacks
Attackers are increasingly targeting vulnerable cloud infrastructure to exploit it for covert cryptojacking or to deliver ransomware, Securonix researchers warn. Some attacks …

Agents of disruption: Four testing topics argue the case for agentless security
Let me introduce myself. I’m a set of flaws in your otherwise perfect, agent-based security world. Like all disruptive agents, I derail your best-laid plans with expensive …

Beware the man in the cloud: How to protect against a new breed of cyberattack
One malicious tactic that has become quite prevalent in recent years is known as a ‘man in the cloud’ (MitC) attack. This attack aims to access victims’ accounts without the …

Mining malware evades agent-based cloud security solutions
Cloud infrastructures are a growing target for threat actors looking to mine cryptocurrency, as their vast computational power allows them to multiply the mining …

CISO challenges and the path to cutting edge security
Zane Lackey is the co-founder and CSO at Signal Sciences, and the author of Building a Modern Security Program (O’Reilly Media). He serves on multiple Advisory Boards …

New security feature to prevent Amazon S3 bucket misconfiguration and data leaks
Hardly a week goes by that we don’t hear about an organization leaving sensitive data exposed on the Internet because they failed to properly configure their Amazon S3 …

Working from anywhere, keeping your files in sync and staying secure
Large, modern enterprises strive to achieve maximum productivity, so it’s no wonder most take advantage of the flexibility provided by remote working. People working …

Hybrid cloud complexity pushes organizations to look for more security tools
As more organizations embrace hybrid cloud – with more than 50 percent claiming a hybrid cloud setup – and serverless, now used by close to third of organizations, …

21% of all files in the cloud contain sensitive data
McAfee released its Cloud Adoption and Risk Report, which analyzed billions of events in anonymized customers production cloud use to assess the current state of cloud …

Organizations feel ready to put highly sensitive data in the cloud
Many corporate employees are ready to store highly sensitive data in the cloud. However, many are still skeptical of the security posture of their own organizations, according …

Safeguarding hybrid-cloud infrastructures through identity privilege management
Most enterprises have embraced the advantages a cloud infrastructure can bring to their computing, storage, network or other needs, and many are juggling multiple cloud …

Solving the cloud infrastructure misconfiguration problem
Security incidents involving cloud infrastructure have become a regular occurrence since many organizations began shifting their assets to the cloud. Many of these incidents …
Featured news
Resources
Don't miss
- How to find out if your AI vendor is a security risk
- From likes to leaks: How social media presence impacts corporate security
- Review: The Ultimate Kali Linux Book, Third Edition
- Enzoic AD Lite Password Audit Report
- WhatsApp vulnerability could be used to infect Windows users with malware (CVE-2025-30401)