Skip to content
TheCyberThrone

Thinking Security ! Always

  • Latest Story
  • AI
  • Application Security
  • Cloud Security
    • AWS Security
    • Azure Security
    • Google Security
  • Container Security
  • Data Breaches
  • Email Security
  • Mobile Security
  • Security Acquisition
  • ZeroDay
  • Certification Guide
    • Cloud Certifications
    • Network Certifications
    • Security Certifications
  • Security NewsLetter
  • About Author
  • facebook.com
  • twitter.com
  • t.me
  • instagram.com
  • youtube.com
Subscribe

cloudsecurity

  • Home
  • cloudsecurity
  • Page 11
Posted incloudsecurity

Tenable new feature for enhanced protection

Network security company Tenable Inc. today announced a number of new features, including new cloud scanning capabilities and measurement features designed to provide improved cloud security . Frictionless Assessment offers…
Posted by PravinKarthik October 5, 2020
Posted inAzure Security cloudsecurity

Azure Outage Post Mortem Report

It's been a tough week for Microsoft, outage after outage hits it's clous services results in global outage. Start of this week , number of Microsoft customers worldwide were impacted…
Posted by PravinKarthik October 2, 2020
Posted incloudsecurity

Azure victim of Gadolinium – APT 40

Security researchers at Microsoft say they upended a hacking campaign that used the company’s own Azure commercial cloud service as part of the command-and-control network for its malware. The hacking…
Posted by PravinKarthik September 25, 2020
Posted incloudsecurity cybersecurity Endpoint Security

Microsoft unifies Defender umbrella… Ignite 2020

Defender is getting ignited .. more products are getting in to one umbrella. Initially change of windows defender to Microsoft defender in early 2020, this comes as a products unification…
Posted by PravinKarthik September 23, 2020
Posted incloudsecurity cybersecurity Security

Team TNT stolen AWS Credentials

The frequent targeting of cloud and container environments are indicative of a vast attack surface for cybercriminals. Recently, Cado Security researchers have found a first-ever crypto-mining worm dubbed ‘TeamTNT’ containing…
Posted by PravinKarthik August 21, 2020
Posted incloudsecurity

Google App en gine and Azure App service hits with phishing

A phishing campaign abused both the Google App Engine and the Azure App Service to steal victims’ Microsoft Outlook credentials. A Google Cloud Platform (GCP) service used for developing and…
Posted by PravinKarthik August 13, 2020
Posted incloudsecurity

SkyArk.. New AWS Stealth watch for shadow IT

A new open-source tool designed to identify Shadow Admin accounts in Microsoft Corp. Azure and Amazon Web Services Inc. cloud environments. Called CyberArk SkyArk, the tool is designed to help…
Posted by PravinKarthik July 29, 2020
Posted incloudsecurity

Office 365 phishing now with fake SharePoint alerts

Employees using Microsoft Office 365 are targeted in a phishing campaign that makes use automated SharePoint notifications to steal their accounts. The phishing emails delivered as part of this phishing…
Posted by PravinKarthik July 28, 2020

Posts pagination

Previous page 1 … 9 10 11 12 13 Next page
Trending post
  • Udemy Data Breach — ShinyHunters Claims 1.4M Records
    Udemy Data Breach — ShinyHunters Claims 1.4M Records
  • CISSP Domain 4: Zero Hour Exam Cram Series
    CISSP Domain 4: Zero Hour Exam Cram Series
  • CISSP Executive Briefing: The Detection Gap
    CISSP Executive Briefing: The Detection Gap
  • Bitwarden CLI Supply Chain Compromise
    Bitwarden CLI Supply Chain Compromise
  • CISSP Domain 2 – Data Protection Techniques – Encryption Masking & Tokenization
    CISSP Domain 2 – Data Protection Techniques – Encryption Masking & Tokenization
  • CISSP Domain 2 – Data Lifecycle – From Creation to Destruction
    CISSP Domain 2 – Data Lifecycle – From Creation to Destruction
Archives

Click to Subscribe

Follow Us

  • Facebook
  • Twitter
  • Instagram
Copyright 2026 — TheCyberThrone. All rights reserved. Bloghash WordPress Theme
Scroll to Top