Clouding the issue: what cloud threats lie in wait in 2022?

Credit to Author: Christopher Boyd| Date: Thu, 17 Mar 2022 13:25:43 +0000

We offer up some thoughts on where new and continuing attacks in the world of cloud may occur, alongside linking some current examples.

The post Clouding the issue: what cloud threats lie in wait in 2022? appeared first on Malwarebytes Labs.

Read more

Smart Check Validated for New Bottlerocket OS

Credit to Author: Trend Micro| Date: Tue, 10 Mar 2020 23:35:40 +0000

Containers provide a list of benefits to organizations that use them. They’re light, flexible, add consistency across the environment and operate in isolation. However, security concerns prevent some organizations from employing containers. This is despite containers having an extra layer of security built in – they don’t run directly on the host OS. To make…

The post Smart Check Validated for New Bottlerocket OS appeared first on .

Read more

Trend Micro Cloud App Security Blocked 12.7 Million High-Risk Email Threats in 2019 – in addition to those detected by cloud email services’ built-in security

Credit to Author: Chris Taylor| Date: Tue, 10 Mar 2020 17:27:10 +0000

On March 3, 2020, the cyber division of Federal Bureau of Investigation (FBI) issued a private industry notification calling out Business Email Compromise (BEC) scams through exploitation of cloud-based email services. Microsoft Office 365 and Google G Suite, the two largest cloud-based email services, are targeted by cyber criminals based on FBI complaint information since…

The post Trend Micro Cloud App Security Blocked 12.7 Million High-Risk Email Threats in 2019 – in addition to those detected by cloud email services’ built-in security appeared first on .

Read more

Harden your public cloud environment against APT-style attacks

Credit to Author: Editor| Date: Tue, 25 Feb 2020 13:36:43 +0000

A new APT-style attack combines a bypassing technique with a multi-platform payload to target both Windows and Linux cloud workloads. Stop the attack with technical advice from Sophos.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/q61MwUx5OsI” height=”1″ width=”1″ alt=””/>

Read more

Sophos Cloud Optix breakthrough IAM visualization is here

Credit to Author: Rich Beckett| Date: Mon, 17 Feb 2020 15:46:55 +0000

Easily visualize the relationships between IAM roles, IAM users, and services, and much more with the latest Sophos Cloud Optix release.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/W2wW5OLmqeQ” height=”1″ width=”1″ alt=””/>

Read more

Four Reasons Your Cloud Security Is Keeping You Up At Night

Credit to Author: Trend Micro| Date: Tue, 04 Feb 2020 13:01:47 +0000

We are excited to introduce guest posts from our newest Trenders from Cloud Conformity, now Trend Micro Cloud One – Conformity. More insights will be shared from this talented team to help you be confident and in control of the security of your cloud environments! Why your cloud security is keeping you up at night…

The post Four Reasons Your Cloud Security Is Keeping You Up At Night appeared first on .

Read more