Predicting the future is not possible , but based on the previous experiences one can be frame things quite a bit . Like Log4j , can suspect wildcard giant killers…
A vulnerability in Microsoft Azure App Service has been found to expose hundreds of source code repositories. Dubbed “NotLegit,” involves insecure default behavior in the Azure App Service. The vulnerability,…
Security researchers discovered a new botnet, named Abcbot, that focused on Chinese cloud hosting providers Alibaba Cloud, Baidu, Tencent, and Huawei Cloud. The Abcbot botnet that was targeting Linux systems…
Datto has announced the availability of Datto Continuity for Microsoft Azure. This new technology partnership provides comprehensive Business Continuity and Disaster Recovery (BCDR) solutions that protect MSPs and their client…
Zscaler announced the general availability of its new Workload Communications solution, part of the Zscaler Zero Trust Exchange, which extends Zero Trust security to workloads and applications hosted in public…
A vulnerability in a library created by network virtualization firm Eltima and used by a variety of vendors, including Amazon has left more than a dozen cloud services vulnerable to…
Google announced that its Cloud IDS for network based threat detection is now generally available. The service acronym refers to “intrusion detection system,” is designed as a cloud native managed…
Researchers have identified two distinct clusters of activity, tracked UNC3004 and UNC2652, that were associated with the Russia-linked Nobelium APT group (aka UNC2452). The NOBELIUM APT is the threat actor…