Check Point Adds Big Data Analytics Platform for Cybersecurity

Check Point Software Technologies this week launched a big data analytics platform providing analytics to give cybersecurity professionals visibility into every application and system they have deployed on the Amazon Web Services (AWS) public cloud. Z… Continue reading Check Point Adds Big Data Analytics Platform for Cybersecurity

NopSec, Palo Alto, & Microsoft – Enterprise Security Weekly #80

In the news, ServerSide exploits dominate threat landscape & OT vulnerabilities rise, Palo Alto extends security to all major cloud providers, NopSec awarded most innovative cybersecurity company in 2018, and more on this episode of Enterprise Sec… Continue reading NopSec, Palo Alto, & Microsoft – Enterprise Security Weekly #80

Hackers use ‘cloud-on-cloud’ attacks to evade detection, attribution

A stealthy group of hackers is using cloud infrastructure to attempt “low and slow” brute force attacks on Microsoft Office 365 logins of senior executives at a broad swath of Fortune 2000 companies, according to recent research. The cloud-on-cloud attacks, spotted earlier this year by Skyhigh Networks, appear to be an early example of a criminal or espionage group leveraging cloud infrastructure to hide not only their identity and the origins of their attack; but also the attack itself. The research highlights the increased complexity of security issues companies face when they move to the cloud. The attacks “came from multiple [cloud] providers and targeted multiple [Skyhigh] customers over a period of time,” explained Slawomir Ligier, the company’s senior vice president of engineering. “They were low and slow … designed to get under the radar.” In fact, Ligier said, Skyhigh only detected the attacks because they were able to correlate Office 365 API […]

The post Hackers use ‘cloud-on-cloud’ attacks to evade detection, attribution appeared first on Cyberscoop.

Continue reading Hackers use ‘cloud-on-cloud’ attacks to evade detection, attribution