Cloud
New OilRig Downloaders Abusing Microsoft Cloud APIs for C&C Communications
Threat actors engage in cyberespionage to gain the following advantages:-StrategicPoliticalEconomicMilitaryHackers do so by stealing the following key things from the targeted organizations or nations:-Confidential...
Cloud
HCL Investigating Ransomware Attack on Isolated Cloud Environment
In the dynamic realm of IT, HCL Technologies, the Noida-based juggernaut, recently found itself navigating choppy digital waters. The revelation of a targeted ransomware incident...
Cloud
Cloud Engineer Sentenced for Deleting Ex-employer’s Code Repos & Logs
San Francisco resident Miklos Daniel Brody, 38, took revenge on his former employer, a bank, by hacking valuable computer code and damaging the bank's cloud system....
Cloud
Broadcom Completes the $61 Billion Acquisition of VMware
Broadcom Inc., a multinational semiconductor manufacturing company headquartered in San Jose, CA, has announced the successful acquisition of VMware in a $61 billion deal.VMware...
Cloud
Google Drive Users Files Suddenly Disappeared, Tech Gaint Investigating
In a perplexing turn of events, a notable cohort of Google Drive users is grappling with the disappearance of files from their accounts. Reports indicate...
Cloud
Chinese APT Infrastructure Mimics Cloud Backup Services
Cambodian government entities were discovered to be targeted and compromised by Chinese APT actors.The threat actors are using the infrastructure to masquerade as...
Cloud
IBM Unveils Cloud-Native QRadar SIEM to Maximize Power of SOC Professionals
IBM has recently announced the launch of its Cloud-Native SIEM solution, which is designed to enhance the scale, speed, and flexibility of security teams....
Cloud
Hackers Actively Exploiting Linux Privilege Escalation Flaw to Attack Cloud Environments
Linux Privilege Escalation flaw is one of the highly critical flaws as it can allow an attacker to gain elevated privileges on a system,...