Quantcast
Channel: Cloud Archives - Security Affairs
Browsing all 13 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

DDoS Mitigation – Choosing a Cloud-based solution

An introduction of DDoS mitigation techniques focused on Cloud-based DDoS Mitigation solution, an approach implemented by many companies. Despite their prevalence, DDoS (Distributed Denial of Service)...

View Article



Image may be NSFW.
Clik here to view.

Cyberespionage – Chinese Hackers targeting US Cloud service providers

U.S.-China Economic and Security Review Commission reported for the first time that cloud computing “represents a potential espionage threat.” U.S.-China Economic and Security Review Commission...

View Article

Image may be NSFW.
Clik here to view.

LinkedIn – Surge of fake profiles and increment of illicit activities

LinkedIn company filed a complaint in San Francisco against unknown hackers responsible for the creation of an impressive amount of fake profiles. LinkedIn is considered the social network of...

View Article

Image may be NSFW.
Clik here to view.

SERT Q4 2013 Threat Intelligence Report on threat landscape evolution

Solutionary security firm published SERT Q4 2013 Threat Intelligence Report to provide an overview of the overall threat landscape. Recently Solutionary security firm published SERT Q4 2013 Threat...

View Article

Image may be NSFW.
Clik here to view.

Hackers exploit cloud services to build Money-Mining Botnet

Two security experts will present at the next BlackHat conference how to exploit cloud services to build Money-Mining Botnet. Cloud computing is becoming the paradigm most abused by cybercrime, cloud...

View Article


Image may be NSFW.
Clik here to view.

Shadow Cloud Services a serious risk for Government Networks

Cloud Security Alliance revealed that shadow cloud service used by employees and unmanaged by IT can pose a major security problem for organizations. Last month, Cloud Security Alliance found out that...

View Article

Image may be NSFW.
Clik here to view.

The US government created new rules for Cloud Providers

A new set of rules was created by the Department of Defense (DoD) for Cloud Providers to report security holes when dealing with US government data. A new set of rules was created by the Department of...

View Article

Image may be NSFW.
Clik here to view.

ZeroDB, the end-to-end encrypted database, goes open source

The End-to-end encrypted database ZeroDB becomes open source and its code is available on GitHub, try it and contribute to the community with your experience. While politicians and experts are...

View Article


Image may be NSFW.
Clik here to view.

cuteRansomware leverages Google Docs to avoid detection

A newly strain of ransomware dubbed cuteRansomware leverages on a Google Doc to host the decryption key and command-and-control features. A recently discovered strain of ransomware, dubbed...

View Article


Image may be NSFW.
Clik here to view.

CloudFanta Malware Steals Banking Information Via Cloud Storage Apps

Watch out, threat research labs Netskope spotted the CloudFanta Malware Stealing Banking Information Via Cloud Storage Apps. Threat Research Labs, Netskope, published a detailed research on the malware...

View Article

NSA warns of cloud attacks on authentication mechanisms

The US National Security Agency (NSA) warns of two techniques abused by threat actors for escalating attacks from local networks to cloud infrastructure. The US National Security Agency has published...

View Article

Image may be NSFW.
Clik here to view.

New Pro-Ocean crypto-miner targets Apache ActiveMQ, Oracle WebLogic, and...

The Rocke group is using a new piece of cryptojacking malware dubbed Pro-Ocean to target Apache ActiveMQ, Oracle WebLogic, and Redis installs. The cybercrime group Rocke is using a new piece of...

View Article

Image may be NSFW.
Clik here to view.

Critical Microsoft Azure RCE flaw impacted multiple services

Researchers found a new critical remote code execution (RCE) flaw impacting multiple services related to Microsoft Azure. Researchers from Ermetic found a remote code execution flaw, dubbed...

View Article

Browsing all 13 articles
Browse latest View live




Latest Images