article thumbnail

Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc

The Last Watchdog

Cloud migration, obviously, is here to stay. But there’s no doubt that the exodus to a much greater dependency on hybrid cloud and multi-cloud resources – Infrastructure-as-a-Service ( IaaS ) and Platforms-as-a-Service ( PaaS ) – is in full swing. We recently released an article about a malware we dubbed Cloud Snooper.

article thumbnail

Cloud Migration Security Woes

Anton on Security

I use this label to describe a case when an organization wants to keep every single security technology that they use on-premise after they move to the public cloud. The list can be very long and tedious; it may include such staples as firewalls, anti-malware, SIEM, EDR , NIDS, and even network forensics and NDR.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

The Last Watchdog

LW: What obstacles are companies running into with cloud migration? Tamir: The problem is that companies have thousands of applications and systems that they need to migrate to the cloud, including older applications and homegrown applications. This becomes a barrier to cloud migration.

article thumbnail

Defenders Be Prepared: Cyberattacks Surge Against Linux Amid Cloud Migration

Dark Reading

Ransomware in particular poses a major threat, but security vendors say there has been an increase in Linux-targeted cryptojacking, malware, and vulnerability exploits as well, and defenders need to be ready.

article thumbnail

Q&A: The lesser role VPNs now play for enterprises, SMBs — in a post-pandemic world

The Last Watchdog

It’s easy to imagine organizations migrating to cloud-hosted solutions for everything going forward, but the reality is that many legacy, on-prem applications aren’t easily ported to the cloud, or are massive sunk costs for organizations potentially costing millions to acquire. For SMB you see more SonicWall and Fortinet.

VPN 213
article thumbnail

Security Affairs newsletter Round 474 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

Ticketmaster confirms data breach impacting 560 million customers Critical Apache Log4j2 flaw still threatens global finance Crooks stole more than $300M worth of Bitcoin from the exchange DMM Bitcoin ShinyHunters is selling data of 30 million Santander customers Over 600,000 SOHO routers were destroyed by Chalubo malware in 72 hours LilacSquid APT (..)

article thumbnail

Menlo Security Finds Cloud Migration and Remote Work Gives Rise to New Era of Malware, Highly Evasive Adaptive Threats (HEAT)

CyberSecurity Insiders

HEAT attacks are used to deliver malware or to compromise credentials, that in many cases leads to ransomware attacks. In an analysis of almost 500,000 malicious domains, The Menlo Security Labs research team discovered that 69% of these websites used HEAT tactics to deliver malware. About Menlo Security.