Skip to content
TheCyberThrone

Thinking Security ! Always

  • Latest Story
  • AI
  • Application Security
  • Cloud Security
    • AWS Security
    • Azure Security
    • Google Security
  • Container Security
  • Data Breaches
  • Email Security
  • Mobile Security
  • Security Acquisition
  • ZeroDay
  • Certification Guide
    • Cloud Certifications
    • Network Certifications
    • Security Certifications
  • Security NewsLetter
  • About Author
  • facebook.com
  • twitter.com
  • t.me
  • instagram.com
  • youtube.com
Subscribe

Cloud at Risk

  • Home
  • Cloud at Risk
Posted inCloud cloudsecurity

Securing Cloud Environment

Cloud has now become the new normal. The digital transformation strategy of enterprises globally has come to revolve around the cloud. Reports suggest that the cloud market will expand to…
Posted by PravinKarthik July 5, 2021
Solarwinds 🌞 end aspect is acquiring cloud asset
Posted incloudsecurity

Solarwinds 🌞 end aspect is acquiring cloud asset

Microsoft says that the end goal of the SolarWinds supply chain compromise was to pivot to the victims' cloud assets after deploying the Sunburst/Solorigate backdoor on their local networks. No…
Posted by PravinKarthik December 30, 2020
Posted incloudsecurity

Cloud services hit by Phishing campaign

Researchers analyzed a new phishing campaign that pretends to from a help desk named “servicedesk.com” that mimics similar wording used by real IT helpdesk domains in corporate environments. The email…
Posted by PravinKarthik July 20, 2020
Posted inCloud

Cloud services are the main targets during this pandemic

Attackers are increasingly hitting collaboration services such as Microsoft 365 to access cloud accounts with stolen credentials, says McAfee. The move to remote working spurred by the pandemic has triggered a…
Posted by PravinKarthik May 27, 2020
Trending post
  • CISSP Domain 1 Zero Hour Cram Series
    CISSP Domain 1 Zero Hour Cram Series
  • Beyond Prompts: Engineering the LLM Security Control Plane
    Beyond Prompts: Engineering the LLM Security Control Plane
  • TheCyberThrone CyberSecurity Newsletter Top 5 Articles –  March 2026
    TheCyberThrone CyberSecurity Newsletter Top 5 Articles –  March 2026
  • CISSP Domain 2 – Data Security Controls – How Classification Drives Protection
    CISSP Domain 2 – Data Security Controls – How Classification Drives Protection
  • CVE-2026-35616 — Fortinet FortiClient EMS Critical Pre-Auth RCE
    CVE-2026-35616 — Fortinet FortiClient EMS Critical Pre-Auth RCE
  • UNC4736 DRIFT: The Governance Failure Inside Multisig
    UNC4736 DRIFT: The Governance Failure Inside Multisig
Archives

Click to Subscribe

Follow Us

  • Facebook
  • Twitter
  • Instagram
Copyright 2026 — TheCyberThrone. All rights reserved. Bloghash WordPress Theme
Scroll to Top