NSA’s Top 10 Cloud Best Practices

NSA’s Top 10 Cloud Best Practices

NSA researchers released cloud security mitigation strategies in an attempt to educate best security practices. Threat actors mostly target cloud users while they shift their data to cloud environments. For…
Silver SAML Attack Dissection

Silver SAML Attack Dissection

Golden SAML attack, if you remember SolarWinds attack that affected organizations around the world that deployed malicious code into Orion IT management and monitoring software. To mitigate or overcome this,…
AWS Detective adds new Capabilities

AWS Detective adds new Capabilities

AWS Detective adds four new capabilities to save time and strengthen your security operations. First feature is, Detective investigations for IAM that helps to investigate AWS IAM objects, such as users and roles, for indicators of…
EleKtra-Leak Campaign Targets AWS

EleKtra-Leak Campaign Targets AWS

Palo Alto Networks Unit 42 warns about a new campaign targeting AWS IAM credentials within public GitHub repositories. The campaign dubbed as EleKtra-Leak, described as both sophisticated and concerning, due…
AWS Console and MFA Requirements

AWS Console and MFA Requirements

AWS customers will be required to use MFA to log into their AWS Management Console starting mid-2024 in a move designed to strengthen the security posture of AWS. The decision…
AWS Introduces Dedicated Local Zones

AWS Introduces Dedicated Local Zones

AWS has introduced Dedicated Local Zones, enabling customers to isolate sensitive workloads to meet their digital sovereignty requirements. This new option is designed for public sector and regulated industry customers…
Google Cross-Cloud Network

Google Cross-Cloud Network

In the recent Google Cloud Next conference, Google has announced Cross-Cloud Network, a solution to connect applications across different clouds. The new platform aims to simplify multi-cloud networking with a…