Cloud Security
Storm-1977 has posed a significant threat to the education sector by targeting cloud tenants through password spraying attacks over the past year. The attacks utilize AzureChecker.exe, a command-line tool leveraged to compromise educational accounts. The perpetrators extract AES-encrypted data from external servers, which include lists of targeted
As cloud security becomes increasingly paramount, Microsoft has bolstered its arsenal with the launch of Azure Confidential Virtual Machines (VMs). Notably, in response to significant breaches such as the Storm-0558 incident, Microsoft has made substantial strides to enhance security measures through the implementation of cutting-edge
F5, a major player in application delivery and security, has unveiled significant updates to its F5 Application Delivery and Security Platform (ADSP). These advancements aim to enhance the protection of critical business applications amid a complex threat landscape. The ADSP now integrates advanced load balancing, traffic management, and
Cloud Access Security Brokers (CASBs) are becoming increasingly vital to the modern cybersecurity landscape. As organizations continue to move their operations to the cloud, securing these environments has become paramount. One of the most significant advancements aiding this transition is the integration of Artificial Intelligence (AI) into CASB
A newly discovered cyber attack targeting websites hosted on Amazon EC2 instances has grabbed the attention of cybersecurity professionals and website administrators around the globe. Since mid-March, hackers have been reported exploiting Server-Side Request Forgery (SSRF) vulnerabilities alongside Amazon’s EC2 Instance Metadata Service (IMDSv1)