Tag: cloud
-
PCPJack Worm Targets Docker, Kubernetes, Redis, and MongoDB Credentials
Tags: breach, cloud, container, credentials, cyber, data-breach, docker, extortion, framework, fraud, infrastructure, kubernetes, malware, spam, threat, wormA newly identified malware framework dubbed PCPJack is targeting exposed cloud and container infrastructure to steal credentials at scale while actively removing artifacts linked to the TeamPCP threat actor. Unlike typical cloud-focused campaigns, PCPJack skips cryptomining entirely and instead appears optimized for fraud, spam, extortion, and resale of stolen access. TeamPCP itself drew attention earlier in 2026…
-
WatchGuard Strengthens Cloud Detection With Perimeters Buy
WatchGuard Aims to Reduce Alert Fatigue Through Telemetry Correlation. WatchGuard acquired SaaS security startup Perimeters to strengthen cloud detection and response capabilities spanning identity threat detection, cloud posture management and shadow IT discovery as enterprises face escalating attacks targeting cloud applications and distributed environments. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/watchguard-strengthens-cloud-detection-perimeters-buy-a-31630
-
After Replacing TeamPCP Malware, ‘PCPJack’ Steals Cloud Secrets
PCPJack makes innovative use of parquet files for stealthy, pre-validated target discovery as it canvasses multiple cloud environments. First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/teampcp-malware-pcpjack-steals-cloud-secrets
-
New PCPJack worm steals credentials, cleans TeamPCP infections
A new malware framework called PCPJack is stealing credentials from exposed cloud infrastructure while actively removing TeamPCP’s access to the systems. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-pcpjack-worm-steals-credentials-cleans-teampcp-infections/
-
PCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud Systems
Tags: cloud, container, credentials, cve, cybersecurity, data, data-breach, exploit, finance, framework, infrastructure, service, theft, wormCybersecurity researchers have disclosed details of a new credential theft framework dubbed PCPJack that targets exposed cloud infrastructure and ousts any artifacts linked to TeamPCP from the environments.”The toolset harvests credentials from cloud, container, developer, productivity, and financial services, then exfiltrates the data through attacker-controlled infrastructure while attempting First seen on thehackernews.com Jump to article:…
-
Omada Identity stellt mit <> eigene Private-Cloud vor
Omada Identity stellt ‘Omada Identity Cloud Private” für regulierte Unternehmen und Behörden vor. Die neue Bereitstellungsoption bietet regulierten Unternehmen und Regierungsorganisationen die gesamte Omada-Identity-Cloud-Plattform innerhalb ihres eigenen Microsoft-Azure-Tenants. Sie beseitigt damit den Kompromiss zwischen Cloud-nativer IGA und der Tenant-Eigentümerschaft, die ihre Prüfer, Aufsichtsbehörden und Risiko-Analysten erwarten. Kunden haben nun drei Möglichkeiten, Omada-Identity-Cloud zu nutzen: Multi-Tenant-SaaS,…
-
Spring Vulnerabilities Open Door to Arbitrary File Access and GCP Secret Leaks
Security researchers have identified four new vulnerabilities in the Spring Cloud Config Server, ranging from medium to critical severity. These newly disclosed flaws could allow attackers to access arbitrary files, leak Google Cloud Platform (GCP) secrets, and manipulate system directories. Administrators, please patch your systems immediately to prevent active exploitation. Spring Vulnerabilities Critical Directory Traversal…
-
Omada löst ein Cloud-Dilemma: Identity Security für regulierte Unternehmen ohne Kontrollverlust
Mit Omada Identity Cloud Private wird die vollständige Omada Identity Cloud-Plattform innerhalb des kundeneigenen Microsoft Azure-Tenants bereitgestellt. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/omada-loest-ein-cloud-dilemma-identity-security-fuer-regulierte-unternehmen-ohne-kontrollverlust/a45033/
-
Salesforce Marketing Cloud Vulnerabilities Expose Cross-Tenant Subscriber Data Risks
A recently disclosed set of vulnerabilities in Salesforce Marketing Cloud, widely known as SFMC, has drawn attention to the security risks tied to centralized marketing infrastructure. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/salesforce-sfmc-ampscript-vulnerability/
-
How orphaned applications are quietly fueling your shadow IT problem
Tags: access, ai, api, awareness, business, cloud, compliance, control, credentials, data, finance, framework, governance, infrastructure, monitoring, risk, security-incident, service, threat, tool, updateOperational and financial overhead: Orphaned applications continue consuming licenses and infrastructure while cluttering configuration management databases (CMDBs). They introduce undocumented dependencies that skew asset management and complicate troubleshooting.Security exposure: Applications without active ownership are rarely reviewed. This means updates are missed, underlying components are no longer maintained, and access paths remain open far longer than intended.Hidden data…
-
How orphaned applications are quietly fueling your shadow IT problem
Tags: access, ai, api, awareness, business, cloud, compliance, control, credentials, data, finance, framework, governance, infrastructure, monitoring, risk, security-incident, service, threat, tool, updateOperational and financial overhead: Orphaned applications continue consuming licenses and infrastructure while cluttering configuration management databases (CMDBs). They introduce undocumented dependencies that skew asset management and complicate troubleshooting.Security exposure: Applications without active ownership are rarely reviewed. This means updates are missed, underlying components are no longer maintained, and access paths remain open far longer than intended.Hidden data…
-
How orphaned applications are quietly fueling your shadow IT problem
Tags: access, ai, api, awareness, business, cloud, compliance, control, credentials, data, finance, framework, governance, infrastructure, monitoring, risk, security-incident, service, threat, tool, updateOperational and financial overhead: Orphaned applications continue consuming licenses and infrastructure while cluttering configuration management databases (CMDBs). They introduce undocumented dependencies that skew asset management and complicate troubleshooting.Security exposure: Applications without active ownership are rarely reviewed. This means updates are missed, underlying components are no longer maintained, and access paths remain open far longer than intended.Hidden data…
-
Watchguard übernimmt CloudSpezialisten Perimeters.io und erweitert das Cloud-Sicherheitsportfolio
Mit der gerade bekannt gegebenen Akquise des in den USA ansässigen Unternehmens Perimeters.io sichert sich Watchguard Technologies zusätzliche Kompetenz im Bereich Cloud-Application- Security. Zeitgleich wurde bereits die Lösung <> (CloudDR) vorgestellt, die auf der Sicherheitstechnologie von Perimeters basiert. CloudDR bietet durchgängige Transparenz, integrierte Erkennung und automatisierte Reaktionsmöglichkeiten für Cloud-Anwendungen über eine […] First seen on…
-
AI evaluation startup Braintrust confirms breach, tells every customer to rotate sensitive keys
Braintrust, a startup that makes an “operating system for engineers building AI software,” notified customers that hackers broke into one of its Amazon cloud environments, and is asking customers to rotate their API keys. First seen on techcrunch.com Jump to article: techcrunch.com/2026/05/06/ai-evaluation-startup-braintrust-confirms-breach-tells-every-customer-to-rotate-sensitive-keys/
-
In 82 Prozent der Sicherheitsvorfälle ist die künstliche Intelligenz bereits involviert
Gigamon, ein führender Anbieter von Deep-Observability, veröffentlicht die neue Ausgabe seiner jährlichen Studie zur Hybrid-Cloud-Sicherheit, die einen umfassenden weitgehend von KI getriebenen Wandel in der Cyberbedrohungs-landschaft aufzeigt. Für die bereits zum vierten Mal durchgeführte Studie wurden mehr als 1.000 IT- und Sicherheitsentscheider in Australien, Frankreich, Deutschland, Singapur, Großbritannien und den USA befragt. Eine […] First…
-
Cloud and data sovereignty caught in a paradox
We asked the hyperscalers how they would respond to US court-ordered eavesdropping on foreign citizen data and got responses that highlight a paradoxical situation First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366642487/Cloud-and-data-sovereignty-caught-in-a-paradox
-
Salesforce Marketing Cloud Vulnerability Exposes Email Data Risk
Salesforce Marketing Cloud (SFMC) recently patched a cluster of high”‘impact vulnerabilities that could have allowed attackers to read and enumerate marketing emails and subscriber data across tenants, including Fortune 500 organizations. Modern enterprises rely on centralised marketing clouds to deliver branded, trackable campaigns at massive scale. SFMC (formerly ExactTarget) is one of the dominant platforms, powering dynamic…
-
Train like you fight: Why cyber operations teams need no-notice drills
Tags: breach, business, cloud, communications, credentials, cyber, cybersecurity, detection, framework, healthcare, injection, login, military, psychology, ransomware, risk, skills, soc, threat, training, updateThe Yerkes-Dodson inverted-U curve: Performance rises with arousal to an optimal point, then falls sharply.Wikimedia Commons, CC-ZeroWhat repeated no-notice drills do is shift a team’s position on that curve. By building familiarity with threat-level arousal, they raise the threshold at which stress becomes performance-impairing. The stimulus is no longer novel. The cascade is shorter. Executive…
-
Private Fabric für Agenten und Multi Cloudflare Mesh: Privates Netzwerk für Nutzer, Server und KI-Agenten
First seen on security-insider.de Jump to article: www.security-insider.de/cloudflare-mesh-privates-netzwerk-fuer-nutzer-server-und-ki-agenten-a-d6ee0546115f7da0d5dafbe87c5c9412/
-
Attackers Bypass Azure AD Conditional Access Using Phantom Device Registration
A recent authorized red team operation by Howler Cell has demonstrated a critical attack path that completely bypasses Microsoft Entra ID (Azure AD) Conditional Access. Azure Conditional Access acts as the primary gatekeeper for cloud identity security, enforcing access rules based on user location, device compliance, and calculated risk scores. However, by starting with a…
-
Weniger Microsoft-Schwachstellen, aber mehr kritische Sicherheitslücken
Die diesjährigen Zahlen des neuesten Microsoft Vulnerabilities Reports zeigen eine deutliche Verlagerung bei den ermittelten Sicherheitsrisiken: Einerseits hat sich die Gesamtzahl identifizierter Schwachstellen stabilisiert, aber andererseits haben die kritischen Anfälligkeiten stark zugenommen, wodurch Schweregrad und Auswirkungen der Sicherheitslücken rapide steigen [1]. Insgesamt gibt es 2025 ein verändertes Risikoprofil, das durch KI-beschleunigte Schwachstellenerkennung, eine wachsende Cloud-Akzeptanz……
-
Amazon SES Phishing: Angriffe über geleakte AWS-Zugangsdaten
Cyberkriminelle setzen verstärkt auf legitime Cloud-Dienste, um täuschend echte Phishing-Angriffe durchzuführen. Besonders Amazon Simple Email Service gerät dabei ins Visier, da er eigentlich für vertrauenswürdige Unternehmens-Kommunikation genutzt wird. Sicherheits-Forscher sehen darin eine neue Eskalationsstufe. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/amazon-ses-phishing
-
Backdoored PyTorch Lightning package drops credential stealer
A malicious version of the PyTorch Lightning package published on the Python Package Index (PyPI) delivers a credential-stealing payload targeting browsers, environment files, and cloud services. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/backdoored-pytorch-lightning-package-drops-credential-stealer/
-
Introducing Wallarm Middle East Cloud: Built for Data Residency Compliance
As API and AI adoption grows across the Middle East, so do the expectations around how data is handled. For many organizations operating in this region, it’s not just about securing applications. It’s about doing it in a way that keeps data in-country and aligned with local requirements. Today, we’re introducing the Wallarm Middle East…
-
Why data centers now belong on the critical infrastructure list
As AI drives deeper dependence across business, supply chains, and national security, the buildings that run the cloud are becoming critical infrastructure, and increasingly attractive targets. First seen on cyberscoop.com Jump to article: cyberscoop.com/data-centers-critical-infrastructure-ai-security-op-ed/
-
Frameworks Don’t Build Trust. Adoption Does
As AI evolves toward autonomy, the Cloud Security Alliance is launching the STAR for AI Catastrophic Risk Annex to codify auditable controls for agentic systems First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/05/frameworks-dont-build-trust-adoption-does/
-
Best Security Solutions for Oracle ERP Cloud in 2026
As Oracle ERP Cloud has become central to finance and operations, its security posture has become a board”‘level concern. The system processes high”‘value transactions, exposes critical data, and sits at the heart of many key business processes. The core question for 2026 is not “Is Oracle secure?” but “What security solution for Oracle ERP Cloud……
-
Top Oracle Risk Management Cloud Alternatives for Oracle ERP Cloud in 2026
If your risk and controls strategy feels constrained by what Oracle Risk Management Cloud can do, you’re not alone. Many Oracle customers in 2026 are asking a more strategic question: What role should a Risk Management solution for Oracle ERP Cloud play in our overall risk architecture”, and where do we need something more? This…

