Security pros from INE enjoyed a double billing at Black Hat USA yesterday (August 10) as they showcased penetration testing tools AWSGoat and AzureGoat. Amazon Web Services (AWS)...
As practically every organization shifts from managing their data in network-based data centers to storing it in the cloud, cloud data security policies are created to...
A new vulnerability has been found that could allow an attacker to gain unauthorized access to cloud-based Golang applications. The use of unsafe URL parsing methods built...
A vulnerability in AWS IAM Authenticator for Kubernetes could allow a malicious actor to impersonate other users and escalate privileges in Kubernetes clusters, a security researcher...
Kali Linux, the popular open source Linux distribution specialized for penetration testing, ethical hacking and security auditing, can now be used by Linode customers. Getting Kali...
MEGA claims that its storage service is private by design, but according to researchers, the technology is beset with “serious” security issues. Based in New Zealand,...
Oracle has patched a remote code execution (RCE) vulnerability impacting Oracle Fusion Middleware and various other Oracle systems. Security researchers ‘Peterjson’ and ‘Jang’ reported a pair...
Aptum has announced a report which examines the complexities inherent in hybrid cloud environments and their implications on security, data governance, compliance and disaster recovery. In particular, it...
The Cloud Security Alliance (CSA) released the Top Threats to Cloud Computing: The Pandemic 11 report, which found a marked change in what cloud security provider (CSP) security...
A Thales report, conducted by 451 Research, reveals that 45% of businesses have experienced a cloud-based data breach or failed audit in the past 12 months, up...
Recent Comments