Tag: cloud
-
Fluent Bit vulnerabilities could enable full cloud takeover
Tags: backdoor, cloud, computing, container, cve, docker, flaw, malicious, open-source, remote-code-execution, vulnerabilityFile writes, container overflow, and full agent takeover: Oligo also disclosed a chain of remote code execution (RCE) and path traversal vulnerabilities affecting the tool. CVE-2025-12972 targets the “out_file” output plugin. When Tag values are user-controlled, and no fixed File parameter is set, attackers can abuse the Tag value (e.g.,”../”) to cause path-traversal file writes…
-
Fluent Bit vulnerabilities could enable full cloud takeover
Tags: backdoor, cloud, computing, container, cve, docker, flaw, malicious, open-source, remote-code-execution, vulnerabilityFile writes, container overflow, and full agent takeover: Oligo also disclosed a chain of remote code execution (RCE) and path traversal vulnerabilities affecting the tool. CVE-2025-12972 targets the “out_file” output plugin. When Tag values are user-controlled, and no fixed File parameter is set, attackers can abuse the Tag value (e.g.,”../”) to cause path-traversal file writes…
-
Critical Fluent Bit Vulnerabilities Allow Remote Attacks on Cloud Environments
Tags: attack, authentication, cloud, container, cyber, open-source, remote-code-execution, risk, vulnerabilityFive newly discovered critical vulnerabilities in Fluent Bit, the open-source log processor embedded in billions of containers, are sending shockwaves through the cloud security community. Oligo Security’s research uncovers attack chains that enable adversaries to bypass authentication, perform path traversal, hijack tags, and even achieve remote code execution all of which risk the very foundation…
-
Critical Fluent Bit Vulnerabilities Allow Remote Attacks on Cloud Environments
Tags: attack, authentication, cloud, container, cyber, open-source, remote-code-execution, risk, vulnerabilityFive newly discovered critical vulnerabilities in Fluent Bit, the open-source log processor embedded in billions of containers, are sending shockwaves through the cloud security community. Oligo Security’s research uncovers attack chains that enable adversaries to bypass authentication, perform path traversal, hijack tags, and even achieve remote code execution all of which risk the very foundation…
-
Critical Fluent Bit Vulnerabilities Allow Remote Attacks on Cloud Environments
Tags: attack, authentication, cloud, container, cyber, open-source, remote-code-execution, risk, vulnerabilityFive newly discovered critical vulnerabilities in Fluent Bit, the open-source log processor embedded in billions of containers, are sending shockwaves through the cloud security community. Oligo Security’s research uncovers attack chains that enable adversaries to bypass authentication, perform path traversal, hijack tags, and even achieve remote code execution all of which risk the very foundation…
-
Critical Fluent Bit Vulnerabilities Allow Remote Attacks on Cloud Environments
Tags: attack, authentication, cloud, container, cyber, open-source, remote-code-execution, risk, vulnerabilityFive newly discovered critical vulnerabilities in Fluent Bit, the open-source log processor embedded in billions of containers, are sending shockwaves through the cloud security community. Oligo Security’s research uncovers attack chains that enable adversaries to bypass authentication, perform path traversal, hijack tags, and even achieve remote code execution all of which risk the very foundation…
-
Datensouveränität als Standard für Versicherungen – Kontrolle über verschlüsselte Daten in der Cloud
Tags: cloudFirst seen on security-insider.de Jump to article: www.security-insider.de/fadata-deutsche-telekom-datenschutz-versicherer-eu-a-68e255a9e05c44ccfb0a97555d9f0828/
-
News alert: Veteran-led Blast Security launches, pushing proactive cloud defense over response
TEL AVIV, Israel, Nov. 24, 2025, CyberNewswire, Blast Security, a cybersecurity startup founded by industry veterans from Solebit (acquired by Mimecast) and elite IDF units, today announced its launch from stealth and a $10 million seed round co-led by… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/news-alert-veteran-led-blast-security-launches-pushing-proactive-cloud-defense-over-response/
-
FAQ About Sha1-Hulud 2.0: The >>Second Coming<< of the npm Supply-Chain Campaign
Sha1-Hulud malware is an aggressive npm supply-chain attack compromising CI/CD and developer environments. This blog addresses frequently asked questions and advises cloud security teams to immediately audit for at least 800 compromised packages. A massive resurgence of the Sha1-Hulud malware family, self-titled by the attackers as “The Second Coming,” was observed around Nov. 24 targeting…
-
FAQ About Sha1-Hulud 2.0: The >>Second Coming<< of the npm Supply-Chain Campaign
Sha1-Hulud malware is an aggressive npm supply-chain attack compromising CI/CD and developer environments. This blog addresses frequently asked questions and advises cloud security teams to immediately audit for at least 800 compromised packages. A massive resurgence of the Sha1-Hulud malware family, self-titled by the attackers as “The Second Coming,” was observed around Nov. 24 targeting…
-
Building a Strong Cloud Data Loss Prevention Strategy: A Step-by-Step Guide
In an era where data fuels every business decision, protecting that data has become a defining element of organisational resilience. Companies today depend on vast volumes of digital information, from customer records and financial details to proprietary research, making an effective Data Loss Prevention (DLP) strategy indispensable. Securing this information isn’t just about preventing cyberattacks;……
-
7 signs your cybersecurity framework needs rebuilding
Tags: ai, awareness, best-practice, breach, business, ceo, ciso, cloud, compliance, cyberattack, cybersecurity, data, detection, endpoint, finance, firmware, framework, Hardware, healthcare, incident response, mobile, network, nist, privacy, risk, risk-management, service, software, strategy, supply-chain, threat, tool, training2. Experiencing a successful cyberattack, of any size: Nothing highlights a weak cybersecurity framework better than a breach, says Steven Bucher, CSO at Mastercard. “I’ve seen firsthand how even a minor incident can reveal outdated protocols or gaps in employee training,” he states. “If your framework hasn’t kept pace with evolving threats or business needs,…
-
Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
Tel Aviv, Israel, November 24th, 2025, CyberNewsWire Blast is introducing a new operating model for cloud security with a first-of-its-kind Preemptive Cloud Defense Platform, replacing reactive response with continuous prevention. Blast Security, a cybersecurity startup founded by industry veterans from Solebit (acquired by Mimecast) and elite IDF units, today announced its launch from stealth and…
-
How can Agentic AI be adaptable to regulatory changes?
Why Is Managing Non-Human Identities Essential in Cloud Security? Non-Human Identities (NHIs) play an instrumental role in modern cybersecurity frameworks. But what exactly constitutes an NHI, and why is its management vital in safeguarding our digital? Machine identities, known as NHIs, are the digital equivalents of human identities and are instrumental in ensuring secure interactions……
-
How can Agentic AI be adaptable to regulatory changes?
Why Is Managing Non-Human Identities Essential in Cloud Security? Non-Human Identities (NHIs) play an instrumental role in modern cybersecurity frameworks. But what exactly constitutes an NHI, and why is its management vital in safeguarding our digital? Machine identities, known as NHIs, are the digital equivalents of human identities and are instrumental in ensuring secure interactions……
-
Sweet Security Raises $75M for Unified AI and Cloud Defense
Israeli Startup Plans to Integrate AI Agent Guardrails Into Cloud Platform. Sweet Security secured $75 million in Series B funding to integrate AI security into its CNAPP platform. With runtime protection as its differentiator, the startup plans to address growing CISO concerns over shadow AI and attack vectors involving intelligent agents. First seen on govinfosecurity.com…
-
Sweet Security Raises $75M for Unified AI and Cloud Defense
Israeli Startup Plans to Integrate AI Agent Guardrails Into Cloud Platform. Sweet Security secured $75 million in Series B funding to integrate AI security into its CNAPP platform. With runtime protection as its differentiator, the startup plans to address growing CISO concerns over shadow AI and attack vectors involving intelligent agents. First seen on govinfosecurity.com…
-
Critical Flaw in Oracle Identity Manager Under Exploitation
The exploitation of CVE-2025-61757 follows a breach of Oracle Cloud earlier this year as well as a recent extortion campaign targeting Oracle E-Business Suite customers. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/critical-flaw-oracle-identity-manager-under-exploitation
-
New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions
Cybersecurity researchers have discovered five vulnerabilities in Fluent Bit, an open-source and lightweight telemetry agent, that could be chained to compromise and take over cloud infrastructures.The security defects “allow attackers to bypass authentication, perform path traversal, achieve remote code execution, cause denial-of-service conditions, and manipulate tags,” Oligo Security said in First seen on thehackernews.com Jump…
-
Years-old bugs in open source tool left every major cloud open to disruption
Fluent Bit has 15B+ deployments “¦ and 5 newly assigned CVEs First seen on theregister.com Jump to article: www.theregister.com/2025/11/24/fluent_bit_cves/
-
APT31: Hackergruppe nutzt Cloud zur Verschleierung
Russland und China sind im Krieg Partner. Doch in der IT spioniert man sich gegenseitig aus. Die Hackergruppe APT31 spielt dabei eine Rolle. First seen on tarnkappe.info Jump to article: tarnkappe.info/artikel/cyberangriffe/apt31-hackergruppe-nutzt-cloud-zur-verschleierung-323408.html
-
SCCM and WSUS in a Hybrid World: Why It’s Time for Cloud-native Patching
Hybrid work exposes the limits of SCCM and WSUS, with remote devices often missing updates and WSUS now deprecated. Action1’s cloud-native patching keeps devices updated from any location, strengthening compliance and security. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/sccm-and-wsus-in-a-hybrid-world-why-its-time-for-cloud-native-patching/
-
APT31: Hackergruppe nutzt Cloud zur Verschleierung
Russland und China sind im Krieg Partner. Doch in der IT spioniert man sich gegenseitig aus. Die Hackergruppe APT31 spielt dabei eine Rolle. First seen on tarnkappe.info Jump to article: tarnkappe.info/artikel/cyberangriffe/apt31-hackergruppe-nutzt-cloud-zur-verschleierung-323408.html
-
Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
Tel Aviv, Israel, 24th November 2025, CyberNewsWire First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/11/elite-cyber-veterans-launch-blast-security-with-10m-to-turn-cloud-detection-into-prevention/
-
AWS S3-Buckets im Visier von Ransomware-Banden
Tags: access, backup, breach, cloud, cybersecurity, encryption, iam, infrastructure, malware, ransomware, strategyRansomware-Banden haben ihren Fokus von traditionellen lokalen Zielen auf Cloud-Speicherdienste und insbesondere Amazon S3 verlagert.Ein aktueller Bericht von Trend Micro beschreibt eine neue Welle von Angriffen, bei denen Angreifer Cloud-native Verschlüsselungs- und Schlüsselverwaltungsdienste integrieren, anstatt lediglich Daten zu stehlen oder zu löschen.’Böswillige Aktivitäten, die auf S3 Buckets abzielen, sind nichts Neues, obwohl Unternehmen ihre Cloud-Umgebungen…
-
AWS S3-Buckets im Visier von Ransomware-Banden
Tags: access, backup, breach, cloud, cybersecurity, encryption, iam, infrastructure, malware, ransomware, strategyRansomware-Banden haben ihren Fokus von traditionellen lokalen Zielen auf Cloud-Speicherdienste und insbesondere Amazon S3 verlagert.Ein aktueller Bericht von Trend Micro beschreibt eine neue Welle von Angriffen, bei denen Angreifer Cloud-native Verschlüsselungs- und Schlüsselverwaltungsdienste integrieren, anstatt lediglich Daten zu stehlen oder zu löschen.’Böswillige Aktivitäten, die auf S3 Buckets abzielen, sind nichts Neues, obwohl Unternehmen ihre Cloud-Umgebungen…
-
Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
Tel Aviv, Israel, 24th November 2025, CyberNewsWire First seen on hackread.com Jump to article: hackread.com/elite-cyber-veterans-launch-blast-security-with-10m-to-turn-cloud-detection-into-prevention/
-
Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
Tel Aviv, Israel, 24th November 2025, CyberNewsWire First seen on hackread.com Jump to article: hackread.com/elite-cyber-veterans-launch-blast-security-with-10m-to-turn-cloud-detection-into-prevention/
-
RBAC und Least Privilege als Basis für sicheres IAM – IAM in der Cloud braucht Zero Trust und temporäre Zugriffstokens
First seen on security-insider.de Jump to article: www.security-insider.de/cloud-iam-zero-trust-kurzlebige-tokens-a-6bc1b973071f40324a887a3a0692d4d5/

