Threat actors are actively incorporating public cloud services from Amazon and Microsoft into their malicious campaigns to deliver commodity remote access trojans...
Cybersecurity specialists report the detection of a critical vulnerability in some VMware products, including Cloud Foundation, Fusion and Workstation. According to the...
A few weeks ago Microsoft contacted a small group of Azure customers to inform them that they could be affected by a...
According to Gartner’s 2021 Magic Quadrant for Application Security Testing, “Modern application design and the continued adoption of DevSecOps are expanding the...
Threat actors are exploiting improperly-secured Google Cloud Platform (GCP) instances to download cryptocurrency mining software to the compromised systems as well as...
The latest cloud security breaches show that we have miles to go as we keep fighting to keep our sensitive data safe. ...
So far, Microsoft has informed 140 companies about the new attack campaign being carried out by Nobelium 14 of which were compromised...
Cybersecurity specialists report the detection of an unpatched vulnerability in iCloud Private Relay, a service implemented by Apple in its latest update...
LA County resident booked in iCloud phishing scam pretended to be an Apple representative. A Los Angeles County man identified as Hao...
The man was after sexually explicit photos and videos that he would then share online or store in his own collection
Being a USA-based web infrastructure and website security company, Cloudflare works for other companies managing connections to servers and web pages. Recently,...
Web infrastructure and website security company Cloudflare on Thursday disclosed that it mitigated the largest ever volumetric distributed denial of service (DDoS)...
The security teams of the technology firm Palo Alto Networks announced the correction of a set of vulnerabilities in Prisma Cloud Compute,...
Recently, in a joint warning, the cybersecurity agencies of the US and UK have released a set of large-scale brute-force attacks escorted...
A recent security report states that it is possible to hijack sessions on Google Compute Engine virtual machines to gain root access...
Using Windows Server in a “Windows container”? Then beware of it, as recently, it has been confirmed that highly sophisticated malware has...
In July 2018, when Guizhou-Cloud Big Data (GCBD) agreed to a deal with state-owned telco China Telecom to move iCloud data belonging...
According to CISA, it has verified one of the users had their account breached even though they were using “proper multi-factor authentication...
The people who are responsible for the management of the Cloud computing architecture in an organization are known as cloud architects. They...
Cybersecurity specialists from Intezer report the finding of a privilege escalation vulnerability in Microsoft Azure Functions whose exploitation would allow threat actors...
A group of specialists has detailed a method for abusing a well-known “H2C smuggling” technique in order to authenticate and bypass some...