Identity Documents Exposed in FedEx-Owned Amazon S3 Bucket

More than 119,000 scanned identity documents, including passports and drivers’ licenses, belonging to people from the United States and abroad were exposed in an insecure Amazon S3 storage bucket. The storage bucket belonged to a company called Bongo International that provided services for cross-border transactions between U.S.-based online merchants and international customers, complete with anti-fraud..
Read more

Cloud Security This Week – February 16, 2018

Evident.io in the News Open AWS S3 Bucket Exposes Private Info on Thousands of Fedex Customers “There’s a whole hacker cottage industry around finding and exploiting S3 buckets, and it’s growing because as cloud environments grow, so do the number of unsecured assets that are discoverable. Hackers are going after S3 buckets and other repositories... Read more » The post Cloud Security This Week – February 16, 2018 appeared first on Cloud Sentry Blog.
Read more

The Olympics and 4,000 Government Websites Got Owned

Two recent discoveries in the world of cybersecurity – from the Olympics and via cryptojacking – highlight potential trends we can expect to see more of. High profile and brash, they portend an alarming extension of hacker activity. Olympic Destroyer One was a malware attack called “Olympic Destroyer” that targeted the opening ceremonies of the... Read more » The post The Olympics and 4,000 Government Websites Got Owned appeared first on Cloud Sentry Blog.
Read more

The Olympics and 4,000 Government Websites Got Owned

Two recent discoveries in the world of cybersecurity – from the Olympics and via cryptojacking – highlight potential trends we can expect to see more of. High profile and brash, they portend an alarming extension of hacker activity. Olympic Destroyer One was a malware attack called “Olympic Destroyer” that targeted the opening ceremonies of the... Read more » The post The Olympics and 4,000 Government Websites Got Owned appeared first on Cloud Sentry Blog.
Read more

I Heart Security

There isn’t a state of being that any organism seeks more than security. Pleasure and excitement are wonderful, but unless doled out in small doses, their effect wears out quickly. Security never loses its appeal, and in a world that can be unexpectedly harsh at times, security braces us and provides comfort. In the pursuit... Read more » The post I Heart Security appeared first on Cloud Sentry Blog.
Read more

I Heart Security

There isn’t a state of being that any organism seeks more than security. Pleasure and excitement are wonderful, but unless doled out in small doses, their effect wears out quickly. Security never loses its appeal, and in a world that can be unexpectedly harsh at times, security braces us and provides comfort. In the pursuit... Read more » The post I Heart Security appeared first on Cloud Sentry Blog.
Read more

Cloud Security This Week – February 9, 2018

New from Evident.io WEBINAR: The Evolution of DevSecOps Revisited Register for our webinar on Thursday, February 22nd, 2018 where our panel of experts will discuss relationship between DevOps and SecOps and explore whether or not it has evolved to be as harmonious as we hoped. The Growth Mindset Applied to Cloud Security in Five Steps... Read more » The post Cloud Security This Week – February 9, 2018 appeared first on Cloud Sentry Blog.
Read more

Cloud Security This Week – February 9, 2018

New from Evident.io WEBINAR: The Evolution of DevSecOps Revisited Register for our webinar on Thursday, February 22nd, 2018 where our panel of experts will discuss relationship between DevOps and SecOps and explore whether or not it has evolved to be as harmonious as we hoped. The Growth Mindset Applied to Cloud Security in Five Steps... Read more » The post Cloud Security This Week – February 9, 2018 appeared first on Cloud Sentry Blog.
Read more

Back to Basics: Indispensable Security Processes for Detection and Response

For our new research project focused on starting your detection and response effort, we are thinking about an essential bundle of security operations processes needed for such effort. Sort of “security operations processes you must get right in the beginning” inspired by what is done here for all security processes. So, let’s start (and keep
Read more
Page 1 of 712345...Last »