SEATTLE & LAS VEGAS--(BUSINESS WIRE)--Black Hat Conference -- Traditional cloud security issues often associated with cloud service providers (CSPs) are continuing to decrease in importance, according ...
Update, May 11, 2025: This story, originally published May 9, has been updated with more details on the move towards greater cloud Common Vulnerabilities and Exposures (CVE) transparency by both ...
Some data is so sensitive that it is processed only in specially protected cloud areas. These are designed to ensure that not even a cloud provider can access the data. ETH Zurich researchers have now ...
CyCognito today released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are ...
Organizations today widely use cloud services to scale operations, improve flexibility and focus more on their daily mission, rather than managing complex IT infrastructure. But dark clouds have ...
Researchers from ETH Zurich have uncovered significant security vulnerabilities in several widely used end-to-end encrypted (E2EE) cloud storage services. The cryptographic flaws could allow attackers ...
Fluent Bit, a widely deployed log-processing tool used in containers, Kubernetes DaemonSets, and major cloud platforms, has been found vulnerable to authentication bypass, file-write, and agent ...
Every day has the potential to be a bad day for a CSO. However, the second Tuesday of each month – Patch Tuesday – is almost ...
Black Hat Conference—Traditional cloud security issues often associated with cloud service providers (CSPs) are continuing to decrease in importance, according to the Top Threats to Cloud Computing ...