August 2, 2023

Amazon's AWS SSM agent can be used as post-exploitation RAT malware

Researchers have discovered a new post-exploitation technique in Amazon Web Services (AWS) that allows hackers to use the platform's System Manager (SSM) agent as an undetectable Remote Access Trojan (RAT).

June 26, 2023

The 10 Hottest Cloud Security Startups In 2023 (So Far)

Cybersecurity startups focused on securing data and identities in cloud environments are among those making big moves during the first half of the year.

June 23, 2023

How to Get the Most Out of Your Cloud Disaster Recovery Plan

Cloud disaster recovery is a complex field which requires careful diligence to execute properly. Learn some considerations and tips from industry experts.

June 5, 2023

Google Workspace exploit could let hackers steal your files without leaving any trace

A flaw in Google Workspace could make a hacked account even more troublesome

June 4, 2023

This Google Workspace security flaw could let hackers quietly steal your Drive files

Experts have uncovered a method for hackers to steal data from people’s Google Drive accounts without leaving any trace of the files they got away with.

June 1, 2023

Mitiga warns free Google Drive license lacks logging visibility

A security deficiency in Google Workspace could let an attacker exfiltrate data from Google Drive without being traced, a new Mitiga report warned.

June 1, 2023

Google Drive security flaw allows data to be stolen without trace

Cloud incident response company Mitiga has released research on a significant forensic security deficiency in Google Workspace that enables threat actors to exfiltrate data in Google Drive without any trace.

March 24, 2023

Human error is threatening Okta passwords, researchers warn

A simple error where Okta users are incorrectly typing their passwords into the username field during login could be leaving them exposed to future attacks.

March 24, 2023

Post-exploitation attack method exposes Okta passwords

New research reveals a potential post-exploitation attack method in Okta that enables adversaries to read users’ passwords in Okta audit logs.