Browsing tag

Cloud

SolarWinds hackers, Nobelium, hit cloud providers and resellers

So far, Microsoft has informed 140 companies about the new attack campaign being carried out by Nobelium 14 of which were compromised by the group. The IT security researchers at Microsoft have revealed that the threat actors from the Nobelium group are back in action and currently targeting resellers and Cloud service providers. Nobelium is […]

Microsoft warns of Azure vulnerability which exposed users to data theft

Currently, there is no evidence that this particular Azure vulnerability was exploited to gain unauthorized access to customer data. In its newest blog post, Microsoft’s Security Response Center (MSRC) has warned Azure cloud computing users about a flaw in the system that allows hackers to access their data. RECENT: Hackers accessed primary keys of Azure’s Cosmos […]

HolesWarm crypto malware hits unpatched Linux, Windows servers

Researchers are calling the HolesWarm the “king of vulnerability exploitation” as the malware has already exploited 20 known Linux and Windows vulnerabilities in just a month. The IT security researchers at Tencent have disclosed details of a newly discovered malware with cryptomining capabilities leveraging over 20 known vulnerabilities, mainly in unpatched Windows and Linux servers. […]

23 Android apps caught leaking sensitive data of 100 million users

The massive data leak occurred due to misconfigured cloud services used by Android apps with millions of downloads. Personal data of over 100 million Android users were exposed due to misconfigured cloud services. The issue was identified in around 23 applications, which boasted up to 10 million downloads and included internal developer resources. SEE: Warning […]

How SASE Supports Digital Transformation

Digital transformation is a buzzword but it’s also a primary goal of many organizations. With the ability to see past the pandemic, many organizations are looking forward to how they can grow into the future. The ongoing evolution of technology means that these organizations have many options to choose from. However, securing these new devices […]

Warning as hackers breach MFA to target cloud services

According to CISA, it has verified one of the users had their account breached even though they were using “proper multi-factor authentication (MFA).” Last year, it was reported that threat actors have been using legitimate tools to compromise Cloud-based assets. Now, the US Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning to alert […]

What are the future prospects of a Cloud architect?

The people who are responsible for the management of the Cloud computing architecture in an organization are known as cloud architects. They are involved with everything related to cloud computing, from storage or delivery to servers and networks which are used to manage cloud storage. Cloud technologies are growing increasingly complex with a lot of […]

Sensitive source codes exposed in Microsoft Azure Blob account leak

The research team at vpnMentor, who discovered the data, believes that it belongs to Microsoft as some of the files appeared to originate from a series of pitches made to Microsoft Dynamics Recently vpnMentor’s research team led by Noam Rotem uncovered a data breach that may presumably be owned by one of the biggest companies […]

ScoutSuite – Multi-Cloud Security Auditing Tool

  Scout Suite is an open source multi-cloud security-auditing tool, which enables security posture assessment of cloud environments. Using the APIs exposed by cloud providers, Scout Suite gathers configuration data for manual inspection and highlights risk areas. Rather than going through dozens of pages on the web consoles, Scout Suite presents a clear view of […]

IBM Completes The $34 Billion Red Hat Acquisition

International Business Machines Corporation (IBM) has completed its acquisition of Red Hat for $34 billion, thus making it the world’s second-biggest technology acquisition ever. IBM has been struggling to adopt cloud-related technologies. With this deal, IBM will try to go after the market leaders like Amazon, Microsoft, and Google. The deal would position IBM as […]

Secure Cloud Migration Guide – Technical and Business Considerations

Cloud migration is the process of moving applications into the public and private cloud infrastructure to achieve cloud’s agility, resiliency and scalability drive business growth. Migrating to the cloud infrastructure provides the ability for the business to change the IT infrastructure as per their requirements. The cloud model is composed of three service models (SaaS, PaaS, IaaS) […]

6 Pieces of Tech Every Office Needs

Before you start buying any technology or furniture for your office, you must put in some planning and research time. There are so many options to consider and each one will have a direct impact on the functionality of your workspace and, as result, how productive you and your team are on a day to […]

IBM acquiring Red Hat for a whopping $34 billion

IBM (International Business Machine) is acquiring the world-renowned provider of open source cloud software Red Hat, Inc., for a whopping $34 billion, the news about the deal was announced on Sunday. IBM plans to pay $34 billion in cash for $190.00 per share. After the deal, Red Hat will join IBM’s Hybrid Cloud team while its CEO Jim Whitehurst will […]

New DemonBot Attack Hadoop Clusters to Performing DDoS Attacks using Powerful Cloud infrastructure servers

New Botnet called DemonBot targeting Hadoop Clusters in order to perform DDOS attack using powerful cloud infrastructure. Hadoop is an open source distributed processing framework that manages storage and data processing for big data applications running in clustered systems. Unlike Mirai based Botnet, DemonBot botnet spreading via centralized server and its rapidly exploiting the various […]

5 Ways the Cloud is Beneficial to Businesses

Businesses are constantly on the lookout for ways to improve and grow. There are so many things taking place on a daily basis, that looking for ways to enhance operations is key. One trend that is becoming common is using the cloud for multiple purposes in a business. This is likely because it offers several […]

How to Detect Load Balancing (HTTP/DNS) on Websites – Load Balancing Detector and Kali Linux

In computing, load balancing improves the distribution of workloads across multiple computing resources, such as computers, a computer cluster, network links, central processing units, or disk drives. Load balancing differs from channel bonding in that load balancing divides traffic between network interfaces on a network socket (OSI model layer 4) basis, while channel bonding implies […]

Parrot Security 4.0 The new tool for Cloud and IoT Pentesting

After a fairly long development process and quite a few updates, the release is ready; Parrot 4.0 is now available for download. According to information security experts, the new version includes the updated packages and bug fixes released in the latest version (3.11), this marks the end of the development process and testing of features experienced in […]

Indian Cricket Board Exposes Personal Data of Thousands of Players

The IT security researchers at Kromtech Security Center discovered a trove of personal and sensitive data belonging to around 15,000 to 20,000 Indian applicants participating in cricket seasons 2015-2018. The authority responsible for protecting this data was The Board of Control for Cricket in India (BCCI) but it was left exposed to the public in two […]

EMC, VMware security bugs throw gasoline on cloud security fire

Backups of virtual machines on some hosts could be accessed or altered by an attacker. While everyone was screaming about Meltdown and Spectre, another urgent security fix was already in progress for many corporate data centers and cloud providers who use products from Dell’s EMC and VMware units. A trio of critical, newly reported vulnerabilities in […]