Cloud Security | News, how-tos, features, reviews, and videos
Microsoft’s cloud services have come under scrutiny in recent months, with APIs at the heart of the matter. Here are some strategies to help mitigate security issues that can arise when using APIs.
Technology reduces risks of data exposure and can be used with AWS Key Management Service, Microsoft Azure Key Vault, and Google Cloud Key Management Service.
Vulnerabilities affect data center services commonly used by organizations and could be exploited by attackers to gain system access and perform remote code execution.
The solution enables governments to build cybersecurity skills and capabilities and facilitate knowledge sharing and collaboration.
Sweet is a runtime security software that uses eBPF technology to scan and respond to runtime anomalies in cloud environments.
Exploiting Cloudflare Tunnel requires little skill and potentially could compromise and entire network.
Malware and backdoors used in attacks affecting some Fortune 500 companies.
XDR platform uses native and third-party attack signals across hybrid cloud domains including AWS, Microsoft Azure, and Google Cloud as well as networks and endpoints.
A new proof of concept shows that attackers can use Azure AD CTS to leap to Microsoft and non-Microsoft application across tenants.
A new report from anti-ransomware vendor Halcyon said that virtual private server provider Cloudzy is being used to host malicious activity from numerous sources.