Articles tagged with: #azure Clear filter
Vulnerability management across hybrid cloud

Vulnerability management across hybrid cloud

cybersecurity www.reddit.com

I'm running into a wall with our current vulnerability management setup. We've got workloads spread across on-prem, AWS, and Azure, and I'm drowning in CVE alerts that aren't actually exploitable in our environment. Half of the vulnerabilities flagged are on systems behind three layers of security groups with no internet access, but they still get the same priority as internet-facing boxes. What's a good approach to filter by actual risks? submitted by /u/jilelectra [link] [comments]

Threat Actors Attacking Azure Blob Storage to Compromise Organizational Repositories

Threat Actors Attacking Azure Blob Storage to Compromise Organizational Repositories

Cyber Security News cybersecuritynews.com

Cybersecurity researchers have identified a sophisticated campaign where threat actors are leveraging compromised credentials to infiltrate Azure Blob Storage containers, targeting organizations' critical code repositories and sensitive data. This emerging threat exploits misconfigured storage access controls to establish persistence and exfiltrate valuable intellectual property. The attack vector represents a significant shift in how threat actors

Azure Apps Vulnerability Lets Hackers Create Malicious Apps Mimicking Microsoft Teams

Azure Apps Vulnerability Lets Hackers Create Malicious Apps Mimicking Microsoft Teams

Cyber Security News cybersecuritynews.com

Security flaws in Microsoft's Azure ecosystem enable cybercriminals to create deceptive applications that imitate official services like the "Azure Portal. Varonis found that Azure's safeguards, designed to block reserved names for cross-tenant apps, could be bypassed using invisible Unicode characters. By inserting characters like the Combining Grapheme Joiner (U+034F) between letters such as "Az͏u͏r͏e͏ ͏P͏o͏r͏t͏a͏l",

Azure App Impersonation via Unicode

Azure App Impersonation via Unicode

cybersecurity www.reddit.com

We recently discovered a Unicode vulnerability that lets attackers impersonate Microsoft apps in Azure without stealing passwords or triggering alerts. We're calling it Azure App Mirage. I t abuses invisible Unicode characters (like zero-width spaces) to make malicious apps look like legit ones (e.g., "Azure​Portal"). This trick bypassed Microsoft's reserved name protections and would let attackers: Create apps that looked like trusted Microsoft services Gain initial access via OAuth consent...

New Phishing Attack Leverages Azure Blob Storage to Impersonate Microsoft

New Phishing Attack Leverages Azure Blob Storage to Impersonate Microsoft

Cyber Security News cybersecuritynews.com

Threat actors are leveraging Microsoft Azure Blob Storage to craft highly convincing phishing sites that mimic legitimate Office 365 login portals, putting Microsoft 365 users at severe risk of credential theft. This method exploits trusted Microsoft infrastructure, making the attacks harder to spot as the fraudulent pages appear secured by official SSL certificates issued by

Host SIEM or Managed SIEM

Host SIEM or Managed SIEM

cybersecurity www.reddit.com

Hi all, We're looking for a Managed SIEM/SOC. We're heavily Microsoft based and Sentinel makes a lot of sense. However, I'm a bit concerned about us hosting Sentinel ourselves in our Azure tenant in order to take advantage the E5 discounts. If our Global Admin accounts are compromised, an attacker could just delete the instance? Alternatively, we could look at the managed security provider hosting the SIEM themselves. It doesn't have to be Sentinel. Maybe it's just there's always pros and cons,...

Tessell Adds Exadata Integration for AI-Ready Multi-Cloud Oracle

Tessell Adds Exadata Integration for AI-Ready Multi-Cloud Oracle

Cyber Security - AI-Tech Park ai-techpark.com

Tessell, a next-generation multi-cloud database-as-a-service (DBaaS), today announced the launch of its Exadata Integration offering, enabling enterprises to maximize the value of Oracle Database and Exadata across Oracle Cloud Infrastructure (OCI) and approved multi-cloud platforms including Oracle Database@Azure and Oracle Database@Google Cloud, and Oracle Database@AWS. As an Oracle Partner, Tessell...

New to Cyber

New to Cyber

cybersecurity www.reddit.com

Hi guys Im new to the cyber security field, worked in support for around 3/4 years and now managed to secure an internal position. What certs/training/experience should I be focusing on? We are mainly a microsoft business using Azure, Defender, 365 suite etc submitted by /u/aneesm1 [link] [comments]

Where to start? - Planning roll-out of Microsoft Defender stack

Where to start? - Planning roll-out of Microsoft Defender stack

cybersecurity www.reddit.com

TL;DR: I'm planning a rollout of the Microsoft Defender stack (Defender for Endpoint, Defender for Office 365, Defender for Identity) for our environment of roughly 300 endpoints (including servers) . I'm looking for implementation plans, checklists, deployment scripts, tuning/playbooks, licensing guidance, and real-world gotchas. Background: A mid-sized environment with ~300 endpoints (mix of Win10/11 desktops, a few laptops, and Windows servers). We're standard AD/Azure AD hybrid, Exchange...

Wiz vs. Defender for Cloud

Wiz vs. Defender for Cloud

cybersecurity www.reddit.com

Does anyone have any experience with both of these platforms? We currently have Wiz and are looking at other options. I've been tasked to compare the two, but I can't get a good grasp of what DFC offers compared to Wiz. Right now we pay low six figures for Wiz based on our Azure footprint. Is the Defender price similar? What do you like/dislike about each of these? submitted by /u/0xSOL [link] [comments]

Axis Communications Vulnerability Exposes Azure Storage Account Credentials

Axis Communications Vulnerability Exposes Azure Storage Account Credentials

Cyber Security News cybersecuritynews.com

A critical vulnerability in Axis Communications' Autodesk Revit plugin has exposed Azure Storage Account credentials, creating significant security risks for customers and potentially enabling supply chain attacks targeting the architecture and engineering industry. The vulnerability stems from hardcoded credentials embedded within signed Dynamic Link Libraries (DLLs) distributed to customers through the plugin's Microsoft Installer (MSI)

New RMPocalypse Attack Let Hackers Break AMD SEV-SNP To Exfiltrate Confidential Data

New RMPocalypse Attack Let Hackers Break AMD SEV-SNP To Exfiltrate Confidential Data

Cyber Security News cybersecuritynews.com

A critical vulnerability in AMD's Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP), a cornerstone of confidential computing deployed by major cloud providers like AWS, Azure, and Google Cloud. Dubbed RMPocalypse, the attack exploits a flaw in the initialization of the Reverse Map Table (RMP), which enforces memory integrity to prevent hypervisors from tampering with

multi-cloud security visibility across AWS and Azure

multi-cloud security visibility across AWS and Azure

cybersecurity www.reddit.com

We're running workloads across both AWS and Azure and I'm losing my mind trying to get consistent security posture visibility. Each platform has its own native tools but nothing gives me a unified view of misconfigs, vulnerabilities, and compliance gaps across both environments. Currently juggling Security Hub, Defender, and a bunch of third-party point solutions. The alert fatigue is real and I'm spending more time correlating findings than actually fixing issues. How are you all handling...