Cloud Security

Cloud Security

ransomware RaaS

Use of ‘Hunter-Killer’ Malware on the Rise, Study Finds

Hackers are increasingly deploying “ultra-evasive, highly aggressive” malware with the ability to find and shut down enterprise security tools in compromised systems, allowing the bad actor to go undetected longer, according to ...
Security Boulevard
AI risk managed detection and response

How AI-Powered Risk Management Supports Cybersecurity

AI, in partnership with humans, offers the potential to solidify an organization's digital trust practice amid rising cybersecurity threats ...
Security Boulevard
zero-trust encrypted AI Trend Micro cybersecurity poverty line, data-centric, SUSE cloud Wiz Torq AirTag Skyhawk SASE security cloud security visibility PwC Survey Finds C-Level Execs Now View Cybersecurity as Biggest Risk

You Can’t Stop What You Can’t See: Addressing Encrypted Cloud Traffic

Forget AI. The most immediate and threatening cybersecurity challenge is visibility into an organization’s encrypted cloud traffic ...
Security Boulevard
Security Flaw in CoCalc: One Click and Your Cloud is Ruined

Security Flaw in CoCalc: One Click and Your Cloud is Ruined

TL;DR Imperva Threat Research discovered and reported a security flaw in the CoCalc Cloud environment. The flaw enabled potential attackers to completely take over a target’s account with only a single click ...
Andy Robbins (RedZone) - Azure Backdoors: How to Hide Them, How to Find Them - Ekoparty 2022

Directory.ReadWrite.All Is Not As Powerful As You Might Think

Directory.ReadWrite.All is an MS Graph permission that is frequently cited as granting high amounts of privilege, even being equated to the Global Admin Entra ID role.Why it mattersAzure admins and security professionals may put ...
DOJ AI crime

US Authorities Shut Down Sites Selling the WarZone RAT

An FBI-led international operation this month seized several domains that were used to sell the notorious WarZone malware that BlackBerry researchers once described as “the Remote Access Trojan (RAT) of choice for ...
Security Boulevard
Entro service account Machine Learning to Address Evolving Threats

The Service Accounts Conundrum: What They Are and How to Secure Them

The definition of a 'service account' is vague, their use is unstructured and that makes securing them incredibly challenging ...
Security Boulevard

Letter from Authomize’s CEO on Acquisition by Delinea

| | ciem, Cloud Security, ITDR
Good news everyone, Authomize has been acquired by Delinea.   After four years of building Authomize, we are thrilled to say that we’ve found the right partner to help us in the next ...
LockBit ransomware FBI

US Offers $10 Million Reward for Info About Hive Ransomware Leaders

The U.S. government appears eager to finish off what’s left of the notorious Hive ransomware group, offering a $10 million reward for information that leads to the identification and location of any ...
Security Boulevard
HR, cyberthreat, landscape, insider threats, HP Wolf TeamViewer, insider, application, insider risk, case, threat Palo Alto network IP theft

3 Best Practices for SOC Leaders for Staying Ahead In 2024

Keeping up with the cyberthreat landscape also fosters a culture of continuous improvement and adaptability, ensuring that the SOC remains resilient and prepared ...
Security Boulevard