Remove tag cloud-detection
article thumbnail

We Are Almost 3! Cloud Security Podcast by Google 2023 Reflections

Anton on Security

So, we ( Tim and Anton , the crew behind the podcast ) wanted to post another reflections blog based on our Cloud Security Podcast by Google being almost 3 (we will be 3 years old on Feb 11, 2024, to be precise), kind of similar to this one. Changes in 2022 and Beyond in Cloud Security” (2022 season opener!) “EP8 More video!

article thumbnail

Palo Alto Networks Adds Cloud Misconfiguration Tool

Security Boulevard

Palo Alto Networks today revealed that its Bridgecrew by Prisma Cloud offering has been extended using another tool that now makes it possible to also detect configuration drifts across multiple clouds. The post Palo Alto Networks Adds Cloud Misconfiguration Tool appeared first on Security Boulevard.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attackers use Google Calendar RAT to abuse Calendar service as C2 infrastructure

Security Affairs

. “While we have not seen the use of GCR in the wild to date, Mandiant has noted multiple actors sharing the public proof of concept on underground forums, illustrating the ongoing interest in abusing cloud services. ” Google TAG has previously observed threat actors abusing Google services in their operations. .

article thumbnail

Data Exfiltration taking place on Google Cloud Platform without trace

CyberSecurity Insiders

Can you believe that threat actors can easily steal data from Google Cloud Platform (GCP) leaving no forensic trace about their activities? However, the GCP Security team has taken a note of this incident and tagged it as a security deficiency. They realized they can smartly deal with it using efficient administrative skills.

article thumbnail

We Are Almost 3! Cloud Security Podcast by Google 2023 Reflections

Security Boulevard

So, we ( Tim and Anton , the crew behind the podcast ) wanted to post another reflections blog based on our Cloud Security Podcast by Google being almost 3 (we will be 3 years old on Feb 11, 2024, to be precise), kind of similar to this one. Changes in 2022 and Beyond in Cloud Security” (2022 season opener!) “EP8 More video!

article thumbnail

Shadowserver reported that +15K Citrix servers are likely vulnerable to attacks exploiting the flaw CVE-2023-3519

Security Affairs

Cloud Software Group strongly urges affected customers of NetScaler ADC and NetScaler Gateway to install the relevant updated versions as soon as possible.” The Citrix Cloud Software Group is strongly urging affected customers to install the relevant updated versions as soon as possible. reads the report published by Citrix.

VPN 88
article thumbnail

The DDR Advantage: Real-Time Data Defense

Security Affairs

This is the advantage of Data Detection and Response (DDR) for organizations aiming to build a real-time data defense. The advantage of Data Detection and Response (DDR) is that you no longer have to wait until the milk is spilled. What is Data Detection and Response (DDR)? Here’s how it works. And why do we need it?