Remove cloud-security for-service-accounts-accountability-is-key-to-security
article thumbnail

Google Cybersecurity Action Team Threat Horizons Report #6 Is Out!

Anton on Security

because of the security of the GCP platform most compromises in the cloud are simply from lack of passwords, poor password strength, reused and leaked credentials, or straightforwardly misconfigured software ” [ A.C. — this You can have fun in the cloud! make all the jokes about it being ‘so 1980s’ but this is the reality today.

article thumbnail

LastPass Breach

Schneier on Security

Last August, LastPass reported a security breach, saying that no customer information—or passwords—were compromised. These encrypted fields remain secured with 256-bit AES encryption and can only be decrypted with a unique encryption key derived from each user’s master password using our Zero Knowledge architecture.

Passwords 265
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NSA on Authentication Hacks (Related to SolarWinds Breach)

Schneier on Security

The NSA has published an advisory outlining how “malicious cyber actors” are “are manipulating trust in federated authentication environments to access protected data in the cloud.” Using the private keys, the actors then forge trusted authentication tokens to access cloud resources.

article thumbnail

Does moving to the cloud mean compromising on security?

Security Boulevard

Cloud security means multiple teams with a shared responsibility. The transition to cloud computing is an evolution that many organisations are still undertaking to improve efficiency, scalability, and flexibility in their operations. Clearly, the cloud is not the panacea some thought it would be.

article thumbnail

Your Phone May Soon Replace Many of Your Passwords

Krebs on Security

Apple , Google and Microsoft announced this week they will soon support an approach to authentication that avoids passwords altogether, and instead requires users to merely unlock their smartphones to sign in to websites or online services. Image: Blog.google.

Passwords 235
article thumbnail

Extracting Sensitive Information from the Azure Batch Service 

NetSpi Technical

We’ve recently seen an increased adoption of the Azure Batch service in customer subscriptions. As part of this, we’ve taken some time to dive into each component of the Batch service to help identify any potential areas for misconfigurations and sensitive data exposure.

article thumbnail

Google Cybersecurity Action Team Threat Horizons Report #6 Is Out!

Security Boulevard

Google Threat Horizons #6 “because of the security of the GCP platform most compromises in the cloud are simply from lack of passwords, poor password strength, reused and leaked credentials, or straightforwardly misconfigured software ” [ A.C. — this You can have fun in the cloud!