Tuesday, March 19, 2024

New OilRig Downloaders Abusing Microsoft Cloud APIs for C&C Communications

0
Threat actors engage in cyberespionage to gain the following advantages:-StrategicPoliticalEconomicMilitaryHackers do so by stealing the following key things from the targeted organizations or nations:-Confidential...
HCL Ransomware Attack

HCL Investigating Ransomware Attack on Isolated Cloud Environment

0
In the dynamic realm of IT, HCL Technologies, the Noida-based juggernaut, recently found itself navigating choppy digital waters. The revelation of a targeted ransomware incident...

Cloud Engineer Sentenced for Deleting Ex-employer’s Code Repos & Logs

0
San Francisco resident Miklos Daniel Brody, 38, took revenge on his former employer, a bank, by hacking valuable computer code and damaging the bank's cloud system....

Broadcom Completes the $61 Billion Acquisition of VMware

0
Broadcom Inc., a multinational semiconductor manufacturing company headquartered in San Jose, CA, has announced the successful acquisition of VMware in a $61 billion deal.VMware...
Google Drive Users Files

Google Drive Users Files Suddenly Disappeared, Tech Gaint Investigating

0
In a perplexing turn of events, a notable cohort of Google Drive users is grappling with the disappearance of files from their accounts. Reports indicate...

Chinese APT Infrastructure Mimics Cloud Backup Services

0
Cambodian government entities were discovered to be targeted and compromised by Chinese APT actors.The threat actors are using the infrastructure to masquerade as...
IBM Cloud-Native QRadar SIEM

IBM Unveils Cloud-Native QRadar SIEM to Maximize Power of SOC Professionals

0
IBM has recently announced the launch of its Cloud-Native SIEM solution, which is designed to enhance the scale, speed, and flexibility of security teams....

Hackers Actively Exploiting Linux Privilege Escalation Flaw to Attack Cloud Environments

0
Linux Privilege Escalation flaw is one of the highly critical flaws as it can allow an attacker to gain elevated privileges on a system,...

Top 10 SaaS Security Checklist in 2023

0
Software as a Service (SaaS) security refers to the measures and practices employed to protect SaaS solutions' data, applications, and infrastructure.SaaS is a...

Cloud Hosting Provider Lost all Customer Data Following Ransomware Attack

0
There has been a cyber attack on two cloud hosting providers, namely CloudNordic and Azero Cloud, which Certiqa Holding owns. The cyberattack has resulted...

Managed WAF protection

Website

Recent Articles