Malware Delivery via Cloud Services Exploits Unicode Trick to Deceive Users

May 21, 2024 at 11:05AM A new attack campaign named CLOUD#REVERSER is using Google Drive and Dropbox for malicious activities. It starts with a phishing email containing a fake Excel file. The file drops multiple payloads, setting up persistence on the host and downloading additional PowerShell scripts to execute commands and download files from cloud … Read more

Google Pitches Workspace as Microsoft Email Alternative Citing CSRB Report

May 20, 2024 at 06:16PM Google is leveraging a recent critical report of Microsoft’s security practices by the US Cyber Safety Review Board to promote its own Google Workspace suite. The report highlighted security failures and weaknesses in Microsoft’s Exchange Online. Google is offering a Secure Alternative Program with special pricing to attract organizations to … Read more

Critical Bug Allows DoS, RCE, Data Leaks in All Major Cloud Platforms

May 20, 2024 at 04:04PM A severe memory corruption vulnerability named “Linguistic Lumberjack” is found in the popular cloud logging tool Fluent Bit, impacting numerous major cloud service providers and organizations. The bug, tracked under CVE-2024-4323, enables denial of service, data leakage, and remote code execution. Maintainers have released a fix, urging prompt updates or … Read more

Vulnerability Found in Fluent Bit Utility Used by Major Cloud, Tech Companies

May 20, 2024 at 11:42AM Fluent Bit, a widely used logging utility, has a critical vulnerability allowing DoS attacks, information disclosure, and potential RCE. Tenable found a memory corruption flaw, affecting major cloud and tech companies. While a patch is developed, it’s not released. Users are advised to mitigate risks by restricting API access and … Read more

10 Ways a Digital Shield Protects Apps and APIs

May 17, 2024 at 03:02PM As network architectures evolved to hybrid and multicloud environments, protecting apps and APIs became more complex. To address this, a digital shield is proposed, consisting of essential elements such as standardized communication, uniform policy, proper visibility, reliable alerting, response capability, good governance, central controls, vendor agnosticism, defense-in-depth, and simplified operations. … Read more

Kinsing Hacker Group Exploits More Flaws to Expand Botnet for Cryptojacking

May 17, 2024 at 01:30PM Cloud security firm Aqua recently uncovered the evolving threat of Kinsing, a persistent cryptojacking group utilizing newly disclosed vulnerabilities to expand its botnet. The malware exploits various flaws to enroll systems in crypto-mining, targeting open-source applications and utilizing scripts and binaries to carry out attacks on Linux and Windows systems. … Read more

Whose Data Is It Anyway? Equitable Access in Cybersecurity

May 17, 2024 at 10:03AM In today’s data-driven cybersecurity landscape, it’s clear that securing log data is vital. Legacy systems struggle in the cloud era, driving up costs and technical demands. Cybercrime impacts not just businesses but also society. The industry’s projected growth indicates the urgency for standardized log data management and collaboration to enhance … Read more

A Cost-Effective Encryption Strategy Starts With Key Management

May 14, 2024 at 04:09PM In today’s digital landscape, companies grapple with encryption challenges and find that a one-size-fits-all approach doesn’t suffice. While encryption is crucial for data security, managing decryption keys is equally essential. Additionally, the rising adoption of cloud services necessitates a thorough evaluation of key management practices. Finally, organizations should proactively prepare … Read more

Reality Defender Wins RSAC Innovation Sandbox Competition

May 10, 2024 at 02:20PM Reality Defender, an AI-based security startup, won the Most Innovative Startup at RSA Conference’s Innovation Sandbox for its deepfake detection platform. With a focus on preventing deepfake fraud, the company uses AI to identify manipulated audio, video, and text in real time. The competition also featured pitches from nine other … Read more

Researchers Uncover ‘LLMjacking’ Scheme Targeting Cloud-Hosted AI Models

May 10, 2024 at 04:03AM Cybersecurity researchers have uncovered a new attack, LLMjacking, targeting cloud-hosted large language model (LLM) services. Attackers use stolen cloud credentials to access LLMs, exploiting vulnerable systems like Laravel Framework and AWS. By querying logging settings, attackers aim to evade detection while racking up substantial costs for victims. Organizations are advised … Read more