Microsoft Azure

Hackers Abusing Microsoft Azure to Deploy Malware and C2 Servers Using Evasion Technique

Now Microsoft Azure becomes a sweet spot for hackers to host powerful malware and also as a command and control server for sending and receiving commands to compromised systems. Microsoft Azure is a cloud...
Cloud Security Solutions

Most Important Key Factors Organizations Should Consider in Implementing the Cloud Security Solutions

Cloud Security Solutions is one of the challenging tasks while performing the cloud migration for any organization and they need to ensure the best adaptable and equipped solution to handle the wider range of cyber attacks.
Hybrid Cloud

How secure is the Hybrid Cloud?

The use of process management and storage services in public and private clouds is encouraging organizations to change and simplify their approach to security by abandoning traditional tools and adopting new solutions. With the popularization of cloud storage services, the first...

250,000 Sensitive Legal Documents Leaked Online via Unprotected Elasticsearch Cluster

Security researchers discovered 257,287 legal documents from unprotected Elasticsearch cluster that hosted on a US-based Amazon AWS server. The unprotected sensitive documents labeled as "not designated for publication‘" and the data contains 4.7GB...
Firefox Send

Firefox Send – Free Encrypted File Transfer Service to Share Your Personal Information Securely

Mozilla launched it's free encrypted file transfer service Firefox Send that allows users to share the files simply and securely from any browsers. You can send files up to 2.5GB by having a Firefox...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended