Tag: cloud
-
Microsoft ‘digital escorts’ reveal crucial US counterintelligence blind spot
Tags: access, china, cio, cloud, compliance, country, cyber, cybersecurity, data, defense, firewall, framework, google, government, injection, intelligence, law, microsoft, military, oracle, risk, service, threat, update, vulnerabilityWhat the program was, and how it worked: The digital escort model, according to ProPublica, was designed to comply with federal contracting rules that prohibit foreign nationals from directly accessing sensitive government systems. Under this framework:China-based engineers would file support tickets for tasks such as firewall updates or bug fixes.US-based escorts, often former military personnel…
-
Souveräne EUDebakel: Microsoft kann US-Zugriff nicht verhindern
Da hat Microsoft einen riesigen Luftballon in Bezug auf europäische Cloud-Angebote aufgeblasen. Rechenzentren in Europa, eine “europäische Microsoft-Cloud” für digitale Souveränität. Und dann musste ein Microsoft Manager unter Eid eingestehen, dass dies nich vor dem Zugriff der US-Behörden schützt. Seit … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/07/22/souveraene-eu-cloud-debakel-microsoft-kann-us-zugriff-nicht-verhindern/
-
NIS2-Umsetzungsgesetz: Geschäftsleitung haftet mit Privatvermögen
Tags: bsi, cloud, computing, cyersecurity, dns, dora, germany, governance, kritis, monitoring, nis-2, risk, risk-management, vulnerabilityNIS2-Versäumnisse können teuer werden nicht nur furs Unternehmen, sondern auch für die Geschäftsleitung persönlich.Angesichts der sich stets verschärfenden Cyberbedrohungslage (nicht nur in Deutschland) hat sich der europäische Gesetzgeber in den letzten Jahren intensiv mit dem Thema IT-Sicherheit befasst. Im Januar 2023 traten gleich drei Gesetze in diesem Zusammenhang in Kraft:die NIS2-Richtlinie,die CER-Richtlinie, sowieDORA.Während DORA als Verordnung…
-
China-Based Threat Actor Involved In Microsoft SharePoint Attacks: Mandiant CTO
Among the attackers now actively exploiting vulnerable on-premises Microsoft SharePoint servers, at least one has shown indications of originating from China, according to the assessment of researchers at Google Cloud-owned Mandiant. First seen on crn.com Jump to article: www.crn.com/news/security/2025/china-based-threat-actor-involved-in-microsoft-sharepoint-attacks-mandiant-cto
-
Darktrace Buys Network Traffic Visibility Firm Mira Security
Startup Mira Security Will Offer Insights on Encrypted Network Traffic, Decryption. Darktrace purchased a network traffic visibility startup to get insights from encrypted network traffic and decryption for customers in regulated industries. Mira Security will provide organizations with deeper, more comprehensive visibility across on-premises, cloud and hybrid environments. First seen on govinfosecurity.com Jump to article:…
-
UK blames Russia’s infamous ‘Fancy Bear’ group for Microsoft cloud hacks
Authentic Antics malware tool to target Microsoft cloud accounts were the handiwork of the notorious Russian Fancy Bear hacking group, the UK’s National Cyber Security Centre (NCSC) has said.Authentic Antics was discovered after a cyberattack in 2023 which prompted an NCSC technical teardown of the malware that it published in May this year. The agency…
-
AI Needs a Firewall and Cloud Needs a Rethink
Tom Leighton of Akamai Wants to End Cloud Bloat and Secure AI From Inside Out. The cloud was meant to be cheaper, but it’s not. A bold new vision is emerging: one that slashes costs, decentralizes AI and secures APIs at the edge. From inference to firewalls, a reimagined internet is challenging hyperscaler dominance. First…
-
Gefährliche Schwachstelle in lokaler Sharepoint-Installation
Hacker greifen Behörden und Unternehmen über eine Schwachstelle in lokalen Sharepoint-Installationen an. Ein Kommentar von Michael Sikorski, CTO und Head of Threat Intelligence für Unit 42 bei Palo Alto Networks: ‘Unit 42 beobachtet eine wirkungsvolle, andauernde Bedrohungskampagne, die auf lokale Microsoft-Sharepoint-Server abzielt. Während Cloud-Umgebungen nicht betroffen sind, sind lokale Sharepoint-Implementierungen einem unmittelbaren Risiko ausgesetzt […]…
-
Securing Revenue Data in the Cloud: Compliance and Trust in a Digital Age
With cyberthreats intensifying and regulatory bodies tightening oversight, securing revenue data in the cloud is essential. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/07/securing-revenue-data-in-the-cloud-compliance-and-trust-in-a-digital-age/
-
Is AI here to take or redefine your cybersecurity role?
Tags: ai, attack, automation, business, ceo, cloud, compliance, conference, control, crowdstrike, cyber, cybersecurity, data, governance, intelligence, jobs, monitoring, phishing, risk, skills, soc, software, strategy, technology, threat, training, vulnerability“AI is coming, and will take some jobs, but no need to worry.”That headline ran atop a CSO story published in 2016. Nine years later, the prediction feels closer to coming true, with questions around jobs being replaced or redefined and whether cybersecurity pros should be worried taking on greater nuance, and still hanging in…
-
Trend Micro integriert die Nvidia Enterprise AI Factory – KI-Sicherheitsplattform für Cloud- und On-Premises-Daten
First seen on security-insider.de Jump to article: www.security-insider.de/ki-sicherheitsplattform-fuer-cloud-und-on-premises-daten-a-59c50ff4658cd0733d88b16a08a996ea/
-
Calico: Open-source solution for Kubernetes networking, security, and observability
Calico is an open-source unified platform that brings together networking, security, and observability for Kubernetes, whether you’re running in the cloud, on-premises, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/07/21/open-source-kubernetes-networking-security-observability/
-
TechTalk: Non-Human Identities erkennen und schützen
Die diesjährige European Identity Cloud Conference brachte uns mit Heiko Klarl zusammen, dem CEO des Sicherheitsanbieters Nexis. Was dieses Unternehmen mit dem Thema Non-Human Identities zu tun hat und wie Nexis in diesem Kontext seinen Kunden helfen kann, verrät er uns in diesem Video. First seen on ap-verlag.de Jump to article: ap-verlag.de/techtalk-non-human-identities-erkennen-und-schuetzen/97488/
-
Microsoft says it will no longer use engineers in China for Department of Defense work
Following a Pro Publica report that Microsoft was using engineers in China to help maintain cloud computing systems for the U.S. Department of Defense, the company said it’s made changes to ensure this will no longer happen. First seen on techcrunch.com Jump to article: techcrunch.com/2025/07/19/microsoft-says-it-will-no-longer-use-engineers-in-china-for-department-of-defense-work/
-
Microsoft beendet die Cloud-Wartung des US-Verteidigungsministeriums durch chinesische Software-Ingenieure
Das ging irgendwie schnell, nachdem Microsoft quasi “mit dem Finger im Honigtopf” erwischt wurde. Eine Woche nach der Meldung von ProPublica sagt Microsoft dass man keinen Ingenieure mehr in China einsetzt, um die Cloud-Systeme des US-Verteidigungsministeriums (DoD) zu warten. Rückblick: … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/07/19/microsoft-beendet-die-cloud-wartung-des-us-verteidigungsministeriums-durch-chinesische-software-ingenieure/
-
Russia Linked to New Malware Targeting Email Accounts for Espionage
Russian military intelligence-linked hackers are using a new malware called “Authentic Antics” to secretly access Microsoft cloud email accounts, the UK’s NCSC reports First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/new-malware-targeting-email/
-
Building scalable secrets management in hybrid cloud environments: Lessons from enterprise adoption
Tags: access, backup, cloud, credentials, data, gitlab, group, iam, identity, infrastructure, jobs, kubernetes, leak, radius, service, supply-chain, toolLessons from integration: Identity, Kubernetes and CI/CD : Choosing a secrets management tool is the easy part. Integrating it across an enterprise is where the work begins. We started with identity. Manual user provisioning was not an option. We integrated Vault with our SSO platform using OIDC and mapped groups to Vault policies based on least privilege.…
-
Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services
Cybersecurity researchers have disclosed a critical container escape vulnerability in the NVIDIA Container Toolkit that could pose a severe threat to managed AI cloud services.The vulnerability, tracked as CVE-2025-23266, carries a CVSS score of 9.0 out of 10.0. It has been codenamed NVIDIAScape by Google-owned cloud security company Wiz.”NVIDIA Container Toolkit for all platforms contains…
-
10 Best XDR (Extended Detection And Response) Solutions 2025
In 2025, the cybersecurity landscape is more fragmented and perilous than ever before. Organizations face an explosion of data sources, an increasing attack surface spanning endpoints, networks, cloud environments, and identities, and a relentless onslaught of sophisticated, multi-stage attacks. Traditional siloed security tools, while still important, often fail to provide the holistic visibility and coordinated…
-
8 trends transforming the MDR market today
Tags: access, ai, at&t, attack, automation, breach, cloud, compliance, control, cyber, cybersecurity, data, detection, edr, endpoint, framework, GDPR, google, identity, infrastructure, intelligence, iot, least-privilege, monitoring, mssp, network, nis-2, ransomware, risk, service, siem, soc, sophos, strategy, technology, threat, tool, zero-trustDigital transformation complexifies the attack surface: As businesses modernize their IT environments, the complexity of securing hybrid and cloud-native infrastructures increases, making MDR an attractive option for scalable, expert-led protection, experts say.The shift to hybrid work, IoT adoption, and an increase in cloud migrations have dramatically expanded attack surfaces, while ransomware and AI-powered attacks constantly…
-
TechTalk: Deshalb sind traditionelle PAM-Lösungen nicht mehr zeitgemäß
»Traditionelle Privileged-Access-Management-Lösungen sind nicht mehr wirklich zeitgemäß!«. Mit dieser durchaus streitbaren These stieg der Sicherheitsanbieter Silverfort auf der Cloud Identity Cloud Conference 2025 in Berlin in den TechTalk-Ring. Warum das so sei und welche passenden Antworten das Unternehmen hierauf habe, wollten wir vom Sicherheitsexperten Drew Schuil wissen. Seine Antworten lieferten die entsprechen Belege für die…
-
Microsoft Entra ID Flaw Enables Privilege Escalation to Global Admin
Security researchers have uncovered a critical vulnerability in Microsoft Entra ID that allows attackers to escalate privileges and gain Global Administrator access, potentially compromising entire organizational environments. This flaw represents a significant security risk for enterprises relying on Microsoft’s cloud identity and access management platform. Security Vulnerability Details The discovered vulnerability in Microsoft Entra ID…
-
Wiz Deal Highlights Google’s Multi-Cloud Security Strategy
COO Francis deSouza Explains Google Cloud’s Push for Unified Multi-Cloud Security. COO Francis deSouza shares insights into Google Cloud’s security priorities as it pursues the $32 billion acquisition of Wiz. He explains the need for seamless multi-cloud protection, the value of Mandiant’s threat intelligence, and how AI is changing threat detection and response at scale.…
-
Neue Prioritäten in der Cloud Warum Unternehmen jetzt in CNAPP investieren sollten
Tags: cloudFirst seen on security-insider.de Jump to article: www.security-insider.de/cloud-sicherheit-strategien-gegen-ransomware-shadow-ai-a-d1092d843546f823991d5ec7e271f836/
-
Oracle-Lücke birgt Gefahr für RCE-Attacken
Tags: access, bug, cloud, cve, cyberattack, data, exploit, infrastructure, linux, oracle, rce, remote-code-execution, tool, vulnerabilityOracle hat das Sicherheitsproblem im Code Editor bereits gefixt.Forscher von Tenable Research haben eine Sicherheitslücke im Code-Editor von Oracle Cloud Infrastructure (OCI) entdeckt, die Unternehmen für Remote-Code-Execution-Angriffe (RCE) anfällig macht. Die webbasierte integrierte Entwicklungsumgebung (IDI) dient zur Verwaltung von Ressourcen wie Functions, Resource Manager und Data Science und sorgt für nahtlose Entwickler-Workflows.Die enge Integration mit…
-
DORA-Oversight-Guide Was Finanzunternehmen jetzt über Verschlüsselung und Schlüsselhoheit wissen müssen
Am 15. Juli 2025 veröffentlichten die europäischen Aufsichtsbehörden (ESA) den ersten , ein entscheidendes Dokument, das die künftige Überwachung kritischer IKT-Drittdienstleister konkretisiert. Im Zentrum steht der Aufbau sogenannter Joint-Examination-Teams (JETs) zur europaweiten Kontrolle von Cloud-Anbietern, Softwarelieferanten und anderen wichtigen Drittparteien. Doch der Guide enthält weit mehr als nur organisatorische Hinweise. Insbesondere Artikel 5.4.1 […] First…
-
1-Click Oracle Cloud Code Editor RCE Flaw Allows Malicious File Upload to Shell
Tags: cloud, cyber, flaw, infrastructure, malicious, oracle, rce, remote-code-execution, service, threat, vulnerabilityTenable Research has disclosed a critical Remote Code Execution (RCE) vulnerability in Oracle Cloud Infrastructure’s Code Editor that enabled attackers to silently hijack victim Cloud Shell environments through a single malicious link. The vulnerability, which has since been remediated by Oracle, could have allowed threat actors to pivot across multiple OCI services and compromise integrated…
-
Microsoft Exposes Scattered Spider’s Latest Tactics
Microsoft has reported Scattered Spider continues to evolve tactics to compromise both on-premises infrastructure and cloud environments First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/microsoft-exposes-scattered/
-
Tenable warnt vor Sicherheitsschwächen – Fehlkonfigurationen in der Cloud gefährden Unternehmensdaten
Tags: cloudFirst seen on security-insider.de Jump to article: www.security-insider.de/fehlkonfigurationen-in-der-cloud-gefaehrden-unternehmensdaten-a-7576882a0ddf5e4eadec0570f94aa5a6/

