Tag: cloud
-
Critical Azure Entra ID Flaw Highlights Microsoft IAM Issues
While the cloud vulnerability was fixed prior to disclosure, the researcher who discovered it says it could have led to catastrophic attacks, alarming some in the security community. First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/critical-azure-entra-id-flaw-microsoft-iam-issues
-
Entra ID vulnerability exposes gaps in cloud identity trust models, experts warn
Tags: advisory, api, cloud, cve, exploit, flaw, identity, microsoft, mitigation, risk, service, technology, update, vulnerabilityPatching is done, yet the risk lingers: While CVE-2025-55241 initially carried a maximum base severity score of 10.0 out of 10, Microsoft later revised its advisory on September 4 to rate the flaw at 8.7, reflecting its own exploitability assessment.Microsoft rolled out a fix globally within days of the initial report, adding that its internal…
-
Enterprise Cybersecurity Strategy: How to Secure Large Scale Businesses
Enterprise cybersecurity involves a wide-ranging method aimed at protecting company networks, data, apps, and cloud platforms from a rising number of cyber threats. It focuses on lowering weaknesses, strengthening security measures, and keeping operations steady even when attacks happen. This approach relies on modern technology, security platforms, and clear policies supported by employee training to……
-
Enterprise Cybersecurity Strategy: How to Secure Large Scale Businesses
Enterprise cybersecurity involves a wide-ranging method aimed at protecting company networks, data, apps, and cloud platforms from a rising number of cyber threats. It focuses on lowering weaknesses, strengthening security measures, and keeping operations steady even when attacks happen. This approach relies on modern technology, security platforms, and clear policies supported by employee training to……
-
Enterprise Cybersecurity Strategy: How to Secure Large Scale Businesses
Enterprise cybersecurity involves a wide-ranging method aimed at protecting company networks, data, apps, and cloud platforms from a rising number of cyber threats. It focuses on lowering weaknesses, strengthening security measures, and keeping operations steady even when attacks happen. This approach relies on modern technology, security platforms, and clear policies supported by employee training to……
-
Entra ID Bug Could Have Exposed Every Microsoft Tenant
A flaw in Entra ID let attackers seize Microsoft tenants; learn how the patch and best practices protect cloud identity. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/news/entra-id-bug-microsoft-tenant/
-
WatchGuard patches ‘critical’ VPN flaw in firewalls that could lead to compromise
Who is affected?: A list of the nearly three dozen firewall models affected by CVE-2025-9242 is available from WatchGuard’s website. The vulnerable versions of the Fireware OS are 2025.1, 12.x, 12.5.x (T15 & T35 models), 12.3.1 (FIPS-certified release), and 11.x (end of life). These are addressed (in the same order) by updating to versions 2025.1.1,…
-
What’s New in Tenable Cloud Security: A More Personalized, Global and Comprehensive Experience
Tags: best-practice, cloud, compliance, container, control, data, fintech, framework, infrastructure, kubernetes, least-privilege, microsoft, oracle, risk, service, threat, tool, update, vulnerabilityCheck out the latest enhancements to our CNAPP product, including a more intuitive user experience with customizable dashboards, and stronger workload protection and data security. These improvements are designed to help you personalize workflows and gain deeper visibility across workloads, compliance frameworks and cloud databases. Key takeaways Tenable Cloud Security is now more personalized and…
-
New attack on ChatGPT research agent pilfers secrets from Gmail inboxes
Unlike most prompt injections, ShadowLeak executes on OpenAI’s cloud-based infrastructure. First seen on arstechnica.com Jump to article: arstechnica.com/information-technology/2025/09/new-attack-on-chatgpt-research-agent-pilfers-secrets-from-gmail-inboxes/
-
Crims bust through SonicWall to grab sensitive config data
Vendor pulls plug on cloud backup feature, urges admins to reset passwords and re-secure devices First seen on theregister.com Jump to article: www.theregister.com/2025/09/18/sonicwall_breach/
-
Top 10 Best NGFW (Next”‘Generation Firewall) Providers in 2025
Protecting digital infrastructure is critical in 2025, as cyber threats escalate in complexity and diversity. Next”‘Generation Firewalls (NGFWs) have become the cornerstone for enterprise security, offering not just robust traffic filtering, but also deep packet inspection, advanced threat intelligence, and seamless cloud integration for defense against today’s persistent and evolving threats. Why Top 10 Best…
-
SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers
SonicWall is urging customers to reset credentials after their firewall configuration backup files were exposed in a security breach impacting MySonicWall accounts.The company said it recently detected suspicious activity targeting the cloud backup service for firewalls, and that unknown threat actors accessed backup firewall preference files stored in the cloud for less than 5% of…
-
Salesforce Partners with Google Cloud to Integrate Gemini AI in Multi-Billion Dollar Deal
Discover the transformative partnership between Salesforce and Google Cloud, focusing on AI integration and enhanced CRM capabilities. Learn how this collaborat First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/salesforce-partners-with-google-cloud-to-integrate-gemini-ai-in-multi-billion-dollar-deal/
-
The Cloud Edge Is The New Attack Surface
The cloud now acts as the connecting infrastructure for many companies’ assets, from IoT devices to workstations to applications and workloads, exposing the edge to threats. First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/cloud-edge-new-attack-surface
-
SonicWall Discloses Compromise of Cloud Backup Service
SonicWall said that threat actors accessed firewall preference files stored in the cloud for around 5% of its firewall install base First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/sonicwall-compromise-cloud-backup/
-
Brute force attacks hitting SonicWall firewall configuration backups
Tags: attack, authentication, backup, breach, cloud, computer, computing, credentials, data, defense, encryption, firewall, Hardware, login, mfa, password, phishing, software, technology, threatWhat are brute force attacks?: Brute force attacks use trial and error to crack passwords, login credentials, and encryption keys. They’ve been around since the beginning of the computer age, yet are still effective. Why? In part because people still use easily guessable passwords like ‘1234’, or their company’s name, or default passwords left on…
-
Who Owns Threat and Exposure Management in Your Organization?
A study conducted by Enterprise Strategy Group, now part of Omdia, in partnership with Tenable shows responsibility for exposure management scattered across multiple teams with conflicting priorities. It’s time to build the team of the future, discover what ‘good’ looks like and how to get there. Key takeaways Teams are fragmented, with most organizations lacking…
-
Who Owns Threat and Exposure Management in Your Organization?
A study conducted by Enterprise Strategy Group, now part of Omdia, in partnership with Tenable shows responsibility for exposure management scattered across multiple teams with conflicting priorities. It’s time to build the team of the future, discover what ‘good’ looks like and how to get there. Key takeaways Teams are fragmented, with most organizations lacking…
-
Who Owns Threat and Exposure Management in Your Organization?
A study conducted by Enterprise Strategy Group, now part of Omdia, in partnership with Tenable shows responsibility for exposure management scattered across multiple teams with conflicting priorities. It’s time to build the team of the future, discover what ‘good’ looks like and how to get there. Key takeaways Teams are fragmented, with most organizations lacking…
-
Where CISOs need to see Splunk go next
Tags: ai, api, automation, cisco, ciso, cloud, communications, compliance, conference, crowdstrike, cybersecurity, data, data-breach, detection, finance, framework, google, incident response, intelligence, jobs, metric, microsoft, open-source, RedTeam, resilience, risk, router, siem, soar, strategy, tactics, threat, tool, vulnerabilityResilience resides at the confluence of security and observability: There was also a clear message around resilience, the ability to maintain availability and recover quickly from any IT or security event.From a Cisco/Splunk perspective, this means a more tightly coupled relationship between security and observability.I’m reminded of a chat I had with the chief risk…
-
Behind the scenes of cURL with its founder: Releases, updates, and security
In this Help Net Security interview, Daniel Stenberg, lead developer od cURL, discusses how the widely used tool remains secure across billions of devices, from cloud services … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/18/daniel-stenberg-running-curl-project/
-
Getting Better Results from NHI Security
How Can We Achieve Better NHI Security? Cloud environment security is an integral part of cybersecurity strategies for businesses operating across financial services, healthcare, travel, and more. How can organizations unlock improved results and ensure robust Non-Human Identities (NHIs) security? A strategic approach to NHI management can bridge the gap between security and research &……
-
Step-by-Step Migration Guide from Akamai Identity Cloud to MojoAuth
Step-by-step guide to migrate from Akamai Identity Cloud to MojoAuth before shutdown. Ensure secure, seamless CIAM migration today. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/step-by-step-migration-guide-from-akamai-identity-cloud-to-mojoauth/
-
Top 10 Alternatives to Akamai Identity Cloud and SSOJet is Best
Discover the top 10 Akamai Identity Cloud alternatives. Learn why SSOJet is the best CIAM solution for B2B SaaS scalability and security. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/top-10-alternatives-to-akamai-identity-cloud-and-ssojet-is-best/
-
Malicious PyPI Packages Deliver SilentSync RAT
IntroductionZscaler ThreatLabz regularly monitors for threats in the popular Python Package Index (PyPI), which contains open source libraries that are frequently used by many Python developers. In July 2025, a malicious Python package named termncolor was identified by ThreatLabz. Just a few weeks later, on August 4, 2025, ThreatLabz uncovered two more malicious Python packages…
-
Warning: Brute force attacks hitting SonicWall firewall configuration backups
Tags: attack, authentication, backup, breach, cloud, computer, computing, credentials, data, defense, encryption, firewall, Hardware, login, mfa, password, phishing, software, technology, threatWhat are brute force attacks?: Brute force attacks use trial and error to crack passwords, login credentials, and encryption keys. They’ve been around since the beginning of the computer age, yet are still effective. Why? In part because people still use easily guessable passwords like ‘1234’, or their company’s name, or default passwords left on…
-
Firms urged to adopt risk-based data sovereignty strategy
Geopolitical uncertainty is forcing organisations to rethink where their data is located, but a full retreat from the public cloud is not the answer First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366631258/Firms-urged-to-adopt-risk-based-data-sovereignty-strategy
-
Attack on SonicWall’s cloud portal exposes customers’ firewall configurations
The company confirmed to CyberScoop that an unidentified cybercriminal accessed SonicWall’s customer portal through a series of brute-force attacks. First seen on cyberscoop.com Jump to article: cyberscoop.com/sonicwall-cyberattack-customer-firewall-configurations/
-
How Tenable Found a Way To Bypass a Patch for BentoML’s Server-Side Request Forgery Vulnerability CVE-2025-54381
Tenable Research recently discovered that the original patch for a critical vulnerability affecting BentoML could be bypassed. In this blog, we explain in detail how we discovered this patch bypass in this widely used open source tool. The vulnerability is now fully patched. Key takeaways Tenable Research discovered that the initial patch for a high-severity…

