Cloud Misconfigurations Expose 110,000 Domains to Extortion in Widespread Campaign

Security researchers at Palo Alto Networks discover a threat actor extorting organizations after compromising their cloud environments using inadvertently exposed environment variables.
The post Cloud Misconfigurations Expose 110,000 Domains to Extorti… Continue reading Cloud Misconfigurations Expose 110,000 Domains to Extortion in Widespread Campaign

Hide yo environment files! Or risk getting your cloud-stored data stolen and held for ransom

Cybercriminals are breaking into organizations’ cloud storage containers, exfiltrating their sensitive data and, in several cases, have been paid off by the victim organizations to not leak or sell the stolen data. “The attackers behind thi… Continue reading Hide yo environment files! Or risk getting your cloud-stored data stolen and held for ransom

Azure Health Bot Service Vulnerabilities Possibly Exposed Sensitive Data

Azure Health Bot Service vulnerabilities found by Tenable could have been exploited for lateral movement and may have allowed customer data exposure. 
The post Azure Health Bot Service Vulnerabilities Possibly Exposed Sensitive Data appeared first on S… Continue reading Azure Health Bot Service Vulnerabilities Possibly Exposed Sensitive Data

Scout Suite: Open-source cloud security auditing tool

Scout Suite is an open-source, multi-cloud security auditing tool designed to assess the security posture of cloud environments. By leveraging the APIs provided by cloud vendors, Scout Suite collects and organizes configuration data, making it easier t… Continue reading Scout Suite: Open-source cloud security auditing tool

Misconfigurations and IAM weaknesses top cloud security concerns

Traditional cloud security issues often associated with cloud service providers (CSPs) are continuing to decrease in importance, according to the Top Threats to Cloud Computing 2024 report by the Cloud Security Alliance. Misconfigurations, IAM weakness… Continue reading Misconfigurations and IAM weaknesses top cloud security concerns

StormBamboo Compromises ISP, Spreads Malware

Read more about a China-aligned cyberespionage threat actor dubbed StormBamboo, also known as Evasive Panda, which compromised an Internet Service Provider and infected targets with malware. Continue reading StormBamboo Compromises ISP, Spreads Malware