Remove tag cloud-security
article thumbnail

We Are Almost 3! Cloud Security Podcast by Google 2023 Reflections

Anton on Security

So, we ( Tim and Anton , the crew behind the podcast ) wanted to post another reflections blog based on our Cloud Security Podcast by Google being almost 3 (we will be 3 years old on Feb 11, 2024, to be precise), kind of similar to this one. Changes in 2022 and Beyond in Cloud Security” (2022 season opener!) “EP8

article thumbnail

Attackers use Google Calendar RAT to abuse Calendar service as C2 infrastructure

Security Affairs

. “While we have not seen the use of GCR in the wild to date, Mandiant has noted multiple actors sharing the public proof of concept on underground forums, illustrating the ongoing interest in abusing cloud services. ” Google TAG has previously observed threat actors abusing Google services in their operations. .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tags and Labels – Make Sense of Multi-Cloud, Hybrid, and On-Premises Networks in an Atomized Network World.

Security Boulevard

Tags and labels are essential for providing visibility, context, automation, and operational governance into modern Atomized Networks, which are made up of multi-cloud, hybrid, and on-premises networks. The post Tags and Labels – Make Sense of Multi-Cloud, Hybrid, and On-Premises Networks in an Atomized Network World.

article thumbnail

Palo Alto Networks Adds Cloud Misconfiguration Tool

Security Boulevard

Palo Alto Networks today revealed that its Bridgecrew by Prisma Cloud offering has been extended using another tool that now makes it possible to also detect configuration drifts across multiple clouds. The post Palo Alto Networks Adds Cloud Misconfiguration Tool appeared first on Security Boulevard.

article thumbnail

TL;DR of TAG Cyber and Sonrai Security?

Security Boulevard

Reading Time: 6 minutes As business leaders recognize the increased revenue growth associated with cloud strategies, Information Security teams must find ways to adapt and, more importantly, participate in this rapid deployment approach. TAG Cyber worked with Sonrai Security to better understand how cloud […].

article thumbnail

Coldriver threat group targets high-ranking officials to obtain credentials

Malwarebytes

Researchers at Google’s Threat Analysis Group (TAG) have published their findings about a group they have dubbed Coldriver. Recently, TAG has noticed that the group uses “lure documents” to install a backdoor on the target’s system. It is mainly in use by security researchers to classify malware.

article thumbnail

New Argo CD Bug Could Let Hackers Steal Secret Info from Kubernetes Apps

The Hacker News

The flaw, tagged as CVE-2022-24348 (CVSS score: 7.7), affects all versions and has been addressed in versions 2.3.0, Cloud security firm

Passwords 113