Tag: cloud
-
Cloud marketplace Pax8 accidentally exposes data on 1,800 MSP partners
Cloud marketplace and distributor Pax8 has confirmed that it mistakenly sent an email to fewer than 40 UK-based partners containing a spreadsheet with internal business information, including MSP customer and Microsoft licensing data. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/cloud-marketplace-pax8-accidentally-exposes-data-on-1-800-msp-partners/
-
Windows 365 update blocks access to Cloud PC sessions
Microsoft confirmed that a recent Windows 365 update is blocking customers from accessing their Microsoft 365 Cloud PC sessions. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-windows-365-update-blocks-access-to-cloud-pc-sessions/
-
Windows 365 update blocks access to Cloud PC sessions
Microsoft confirmed that a recent Windows 365 update is blocking customers from accessing their Microsoft 365 Cloud PC sessions. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/microsoft/microsoft-windows-365-update-blocks-access-to-cloud-pc-sessions/
-
AuraInspector: Open-Source Misconfiguration Detection for Salesforce Aura
Mandiant has released AuraInspector, an open-source command-line tool designed to help security teams identify and audit access control misconfigurations within the Salesforce Aura framework that could expose sensitive data, including credit card numbers, identity documents, and health information. The tool addresses a critical gap in Salesforce Experience Cloud security, where complex sharing rules and multi-level…
-
‘VoidLink’ Malware Poses Advanced Threat to Linux Systems
Researchers discovered a modular, cloud-first framework that is feature-rich and designed to maintain stealthy, long-term access to Linux environments. First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/voidlink-malware-advanced-threat-linux-systems
-
CrowdStrike to Buy Seraphic Security in Bid to Boost Browser Security
The browser protection and detection technology will be integrated into CrowdStrike’s Falcon platform to protect endpoints, browser sessions, and cloud applications. First seen on darkreading.com Jump to article: www.darkreading.com/remote-workforce/crowdstrike-buy-seraphic-security-boost-browser-security
-
January 2026 Microsoft Patch Tuesday: Actively exploited zero day needs attention
More priorities: Executives should also prioritize rapid patching and risk reduction efforts this month around the Windows Local Security Authority Subsystem Service Remote Code Execution, Windows Graphics Component Elevation of Privilege, and Windows Virtualization Based Security Enclave Elevation of Privilege flaws, Bicer said, as these vulnerabilities directly enable full system or trust boundary compromise.Strategic focus…
-
Vom MultiChaos zur einheitlichen Sichtbarkeit
Unternehmen stehen 2026 vor einer Kombination aus wachsender Komplexität von Multi-Cloud-Umgebungen, der weiter steigenden Konvergenz von IT und OT und immer strengerer Regulierung. In den letzten Jahren wurde die Einführung von KI und Cloud-Technologien beschleunigt, auch im kommenden Jahr werden IT-Teams in Unternehmen mit spürbaren Herausforderungen konfrontiert. Umfassendes Netzwerk-Monitoring kann dazu beitragen, viele dieser Herausforderungen…
-
Vom MultiChaos zur einheitlichen Sichtbarkeit
Unternehmen stehen 2026 vor einer Kombination aus wachsender Komplexität von Multi-Cloud-Umgebungen, der weiter steigenden Konvergenz von IT und OT und immer strengerer Regulierung. In den letzten Jahren wurde die Einführung von KI und Cloud-Technologien beschleunigt, auch im kommenden Jahr werden IT-Teams in Unternehmen mit spürbaren Herausforderungen konfrontiert. Umfassendes Netzwerk-Monitoring kann dazu beitragen, viele dieser Herausforderungen…
-
New VoidLink malware framework targets Linux cloud servers
A newly discovered advanced cloud-native Linux malware framework named VoidLink focuses on cloud environments, providing attackers with custom loaders, implants, rootkits, and plugins designed for modern infrastructures. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-voidlink-malware-framework-targets-linux-cloud-servers/
-
Overcoming Machine Identity Overload
CyberArk and Accenture Experts Discuss Modernization, Identity Sprawl, Securing AI. Enterprises are embracing modernization by adopting artificial intelligence tools, automation and DevOps-driven development in the cloud, but these new platforms have introduced an attack surface saturated with human and machine identities, said CyberArk’s Barak Feldman and Accenture’s Rex Thexton. First seen on govinfosecurity.com Jump to…
-
Analysis of VoidLink: A Cloud-Native Malware Threat Targeting Linux Systems
A sophisticated Linux malware framework, VoidLink, has been identified by Check Point Research, representing a significant escalation in threats targeting cloud-native environments. The advanced framework, developed by Chinese-affiliated developers, combines custom loaders, implants, rootkits, and over 30 modular plugins specifically engineered to maintain persistent access to Linux systems while evading detection through multiple layers of…
-
Hexaware Partners with AccuKnox for Cloud Security Services
Menlo Park, USA, January 13th, 2026, CyberNewsWire AccuKnox has entered into a partnership with Hexaware Technologies to expand its Zero Trust cloud security platform into enterprise accounts managing hybrid and multi-cloud infrastructure. With rising complexity across hybrid, multi-cloud, and agentic-AI environments, organizations are prioritizing robust cloud security infrastructure that can scale. The AccuKnox and Hexaware partnership…
-
Attackers Abuse Python, Cloudflare to Deliver AsyncRAT
The phishing campaign shows how attackers continue to weaponize legitimate cloud services and open source tools to evade detection and gain trust. First seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/attackers-abuse-python-cloudflare-deliver-asyncrat
-
ColorTokens Achieves FedRAMP® Moderate ATO for Xshield
ColorTokens is proud to announce that its Xshield Enterprise Microsegmentation Platform has achieved a FedRAMP® Moderate Authority to Operate (ATO), a significant milestone that underscores our commitment to delivering secure, resilient, and mission-ready cybersecurity solutions for the U.S. Federal Government. FedRAMP (the Federal Risk and Authorization Management Program) is the U.S. government’s gold standard for cloud security. Achieving a Moderate ATO means that Xshield has successfully met……
-
New Chinese-Made Malware Framework Targets Linux-Based Cloud Environments
Detected by Check Point researchers, VoidLink is a sophisticated malware framework that can be used to implant malware in the most common cloud environments First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/chinese-malware-framework-linux/
-
New Chinese-Made Malware Framework Targets Linux-Based Cloud Environments
Detected by Check Point researchers, VoidLink is a sophisticated malware framework that can be used to implant malware in the most common cloud environments First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/chinese-malware-framework-linux/
-
AuraInspector: Open-source tool to audit Salesforce Aura access control misconfigurations
Google and its Mandiant threat intelligence unit have released AuraInspector, an open-source tool aimed at auditing data access paths in Salesforce Experience Cloud … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/13/aurainspector-open-source-tool-salesforce-aura/
-
Minimal Ubuntu Pro expands Canonical’s cloud security offerings
Canonical has released Minimal Ubuntu Pro images for use on public cloud platforms, aiming to give teams a smaller base image with a narrower software footprint. The solution … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/13/canonical-minimal-ubuntu-pro/
-
New Advanced Linux VoidLink Malware Targets Cloud and container Environments
Cybersecurity researchers have disclosed details of a previously undocumented and feature-rich malware framework codenamed VoidLink that’s specifically designed for long-term, stealthy access to Linux-based cloud environmentsAccording to a new report from Check Point Research, the cloud-native Linux malware framework comprises an array of custom loaders, implants, rootkits, and modular First seen on thehackernews.com Jump to…
-
For application security: SCA, SAST, DAST and MAST. What next?
Tags: advisory, ai, application-security, automation, best-practice, business, cisa, cisco, cloud, compliance, container, control, cve, data, exploit, flaw, framework, gartner, government, guide, ibm, incident response, infrastructure, injection, kubernetes, least-privilege, ml, mobile, network, nist, resilience, risk, sbom, service, software, sql, supply-chain, threat, tool, training, update, vulnerability, waf<img loading="lazy" decoding="async" src="https://b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?quality=50&strip=all&w=1024" alt="Chart: Posture, provenance and proof." class="wp-image-4115680" srcset="https://b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?quality=50&strip=all 1430w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=300%2C168&quality=50&strip=all 300w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=768%2C431&quality=50&strip=all 768w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=1024%2C575&quality=50&strip=all 1024w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=1240%2C697&quality=50&strip=all 1240w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=150%2C84&quality=50&strip=all 150w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=854%2C480&quality=50&strip=all 854w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=640%2C360&quality=50&strip=all 640w, b2b-contenthub.com/wp-content/uploads/2026/01/posture-provenance-proof.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”575″ sizes=”auto, (max-width: 1024px) 100vw, 1024px” /> Sunil GentyalaOver the past year the community has admitted the obvious: the battleground is the software supply chain and…
-
Hybride IT-Landschaften sind kein Übergangsphänomen
Tags: cloudDas Jahr 2025 war in der IT-Sicherheit geprägt von tiefgreifenden Veränderungen, die sowohl technischer als auch organisatorischer Natur waren. Unternehmen haben zunehmend erkannt, dass hybride IT-Landschaften also der gleichzeitige Betrieb von Onpremises-Systemen und Cloud-Workloads kein Übergangsphänomen mehr sind. Die Cloud ersetzt bestehende IT nicht, sie ergänzt sie und dieser Realität mussten auch […] First seen…
-
Driving Passwordless Adoption with FIDO and Biometric Authentication
Tags: access, attack, authentication, awareness, banking, breach, business, cloud, compliance, container, control, credentials, cyber, data, defense, fido, finance, fraud, government, Hardware, iam, identity, insurance, login, mobile, passkey, password, phishing, risk, service, technology, threat, trainingDriving Passwordless Adoption with FIDO and Biometric Authentication madhav Tue, 01/13/2026 – 06:13 For decades, passwords have been the default mechanism for securing digital access. They are deeply embedded in enterprise systems and workflows, yet they were never designed to withstand today’s threat landscape. Cybersecurity Sarah Lefavrais – IAM Product Marketing Manager More About This…
-
Hexaware Partners with AccuKnox for Cloud Security Services
Menlo Park, USA, 13th January 2026, CyberNewsWire First seen on hackread.com Jump to article: hackread.com/hexaware-partners-with-accuknox-for-cloud-security-services/
-
IT-Sicherheit 2025 im Rückblick: Plattformvielfalt, Identitätsrisiken und neue Sichtbarkeit
Tags: cloud2025 war ein Jahr der Veränderungen in der IT-Sicherheit sowohl technisch als auch organisatorisch. Unternehmen haben zunehmend verstanden, dass hybride IT-Landschaften also die Kombination von On-Premises-Systemen und Cloud-Workloads nicht mehr nur eine Übergangslösung sind. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/it-sicherheit-2025-im-rueckblick-plattformvielfalt-identitaetsrisiken-und-neue-sichtbarkeit/a43334/
-
Botnet Threat Update July to December 2025
Botnet Command & Controller (C&C) activity increased 24% this period, with Remote Access Trojans (RATs) accounting for 42% of the Top 20 malware associated with botnets. Learn which Russia-based registrar saw a +9,608% surge in botnet C&C domains”, and which major cloud providers are taking action. Read the full report. First seen on securityboulevard.com Jump…
-
The 20 Coolest Cloud Security Companies Of The 2026 Cloud 100
The coolest cloud security companies on CRN’s Cloud 100 list for 2026 include venture-funded companies offering cloud data and AI security and established vendors providing a comprehensive CNAPP offering. First seen on crn.com Jump to article: www.crn.com/news/security/2026/the-20-coolest-cloud-security-companies-of-the-2026-cloud-100

