Thursday, May 1, 2025

Cloud

Chinese APT Infrastructure Mimics Cloud Backup Services

Cambodian government entities were discovered to be targeted and compromised by Chinese APT actors. The threat actors are using the infrastructure to masquerade as...

IBM Unveils Cloud-Native QRadar SIEM to Maximize Power of SOC Professionals

IBM has recently announced the launch of its Cloud-Native SIEM solution, which is designed to enhance the scale, speed, and flexibility of security teams....

Hackers Actively Exploiting Linux Privilege Escalation Flaw to Attack Cloud Environments

Linux Privilege Escalation flaw is one of the highly critical flaws as it can allow an attacker to gain elevated privileges on a system,...

Top 10 SaaS Security Checklist in 2025

Software as a Service (SaaS) security refers to the measures and practices employed to protect SaaS solutions' data, applications, and infrastructure. SaaS is a...

Cloud Hosting Provider Lost all Customer Data Following Ransomware Attack

There has been a cyber attack on two cloud hosting providers, namely CloudNordic and Azero Cloud, which Certiqa Holding owns. The cyberattack has resulted...

Cloud Security Best Practices – A Complete Cloud Protection Guide 2023

As the world moves increasingly into a digital realm, the security of data stored in the cloud is an ever-growing concern for businesses and...

CISA Released Free Cloud Security Tools to Secure Cloud Data

The Cybersecurity & Infrastructure Security Agency (CISA) has released a list of free tools for organizations to secure themselves in cloud environments. The post...

Data Security With Cloud Compliance: Meeting Regulations & Standards

Businesses from all industries are aware of the benefits of cloud computing. Some organizations are just getting started with migration as part of digital...