APT29 revamps its techniques to breach cloud environments

Russian threat actors APT29 are changing their techniques and expanding their targets to access cloud environments, members of the Five Eyes intelligence alliance have warned. About APT29 APT29 (aka Midnight Blizzard, aka Cozy Bear) is a cyber espionag… Continue reading APT29 revamps its techniques to breach cloud environments

Microsoft begins broadening free cloud logging capabilities

After select US federal agencies tested Microsoft’s expanded cloud logging capabilities for six months, Microsoft is now making them available to all agencies using Microsoft Purview Audit – regardless of license tier. “This change wi… Continue reading Microsoft begins broadening free cloud logging capabilities

Watch Now: Cloudy With a Chance of Threats: The Active Threat Landscape in the Cloud

Join the webinar to learn about active threats targeting common cloud deployments and what security teams can do to mitigate them.
The post Watch Now: Cloudy With a Chance of Threats: The Active Threat Landscape in the Cloud appeared first on Security… Continue reading Watch Now: Cloudy With a Chance of Threats: The Active Threat Landscape in the Cloud