EHA
ConfusedFunction Vulnerability Google Cloud Platform Let Attackers Escalate Privileges

ConfusedFunction Vulnerability in Google Cloud Platform Let Attackers Escalate Privileges

A newly discovered vulnerability in Google Cloud Platform (GCP) has raised significant security concerns among users and experts alike. The vulnerability, dubbed "ConfusedFunction," involves GCP's Cloud Functions and Cloud Build services, potentially allowing attackers...
SAPwned Widespread Supply-Chain Attacks Let Attackers Access Cloud Environments

SAPwned Vulnerability Attack Let Hackers Gain Control to Users Cloud Environments

Multiple vulnerabilities in SAP AI Core had been identified, giving malicious actors access to customer data and the ability to take control of the service. With SAP AI Core, users may leverage the company's extensive...
10 Best Cloud Security Companies 

10 Best Cloud Security Companies In 2024

In the digital age, cloud security is crucial as businesses increasingly depend on cloud services and top cloud security companies provide advanced solutions to protect data, applications, and infrastructure from cyber threats. These firms specialize...
Hackers Exploit Cloud Services Steal Data

Hackers Exploiting Amazon, Google & IBM Cloud Services To Steal Customer Data

Criminals are exploiting cloud storage services to host phishing websites for SMS scams by abusing the static website hosting feature of cloud storage to store HTML files with malicious URLs, which are included in...
How To Back Up Jira data

How To Back Up Jira data

Jira has become an integral solution for IT teams worldwide to manage tasks, track issues, and collaborate on projects. What’s more, this Atlassian tool empowers teams to streamline workflows, enhance productivity, and deliver better...
LeakyCLI: New Vulnerability Exposes Credentials In AWS, Azure & Google Cloud

LeakyCLI: New Vulnerability Exposes Credentials In AWS, Azure & Google Cloud

Multiple Cloud Service providers like Google Cloud, AWS, and Azure have been discovered with a new vulnerability that has been termed "LeakyCLI." As the name suggests, the Command line interfaces of Google Cloud (Gcloud CLI),...
Wiz to Acquire Gem Security for $350M to Address Cloud Security

Wiz to Acquire Gem Security for $350M to Address Cloud Security

Wiz, a leading cloud security company, has announced its acquisition of Gem Security for $350 million. This acquisition marks a significant milestone in Wiz's journey, which began just four years ago when its founders...
Adobe ColdFusion Flaw Let Attackers Gain Access to Sensitive Files – PoC Released

Adobe ColdFusion Flaw Let Attackers Gain Access to Sensitive Files – PoC Released

Adobe has addressed a critical vulnerability in its ColdFusion software, which could have allowed attackers to read files arbitrarily from the system. The flaw, identified as CVE-2024-20767, has been patched, but the details surrounding...
Microsoft Notifies DevOps Teams That Major Domain Change Is Coming

Microsoft Notifies DevOps Teams That Major Domain Change Is Coming

Microsoft is unifying its cloud domain for Microsoft 365 services under "cloud.microsoft" to streamline the user experience and administration, which aims to reduce domain fragmentation for authenticated user-facing apps and services.  The consolidation will enhance...
UK’s NCSC Releases SCADA Security Guidance to the Cloud

UK’s NCSC Releases SCADA Security Guidance to the Cloud

The National Cyber Security Centre (NCSC) of the United Kingdom has recently published a comprehensive set of guidelines designed to assist organizations in securely transitioning their Supervisory Control and Data Acquisition (SCADA) systems to...

Managed WAF

Website

Latest News