Articles tagged with: #cloud Clear filter
12 Cybersecurity News Worth Your Attention this Week Summarised

12 Cybersecurity News Worth Your Attention this Week Summarised

cybersecurity www.reddit.com

This week's scariest news for me was the discovery of a malicious chrome extension that sends screenshots of every page you visit to somehwere in the cloud constantly. Yes, I know that happens all the time but how often does it happen with a extension that has been featured in the Chrome store and has more than 100 000 installs? Like, how do we even know if to trust an extension anymore? I guess the answer is you can't trust any extensions? submitted by /u/texmex5 [link] [comments]

MCP vs MCP - Cloud disaster 2.0?

MCP vs MCP - Cloud disaster 2.0?

cybersecurity www.reddit.com

The acronym wars have already started. If you've been following Anthropic and other vendors, you've probably heard of MCP: Model Context Protocol. It's being pitched as the "HTTP of AI" - the universal way for models to connect with tools and data. And don't get me wrong, that matters. But protocols are plumbing. Plumbing makes things flow, but plumbing doesn't save you when the pipes burst. That's where the other MCP comes in: the Model Control Plane. Where the protocol decides how things...

Building a Vulnerability Management Program From Scratch

Building a Vulnerability Management Program From Scratch

cybersecurity www.reddit.com

Hey everyone, I've recently been tasked with building a vulnerability management program from zero at my company, and I'd love to hear how others here have structured theirs. For context, we have a mid to large scale IT operations system including Cloud, Endpoint, Compliance, SOC, IAM, etc. and the current plan is to build the process top-down. My focus will be to create a baseline + questionnaire (5 - 10 questions for each stakeholder team) to capture expectations, develop an Incident...

Happy Birthday Linux! Powering Numerous Devices Across the Globe for 34 Years

Happy Birthday Linux! Powering Numerous Devices Across the Globe for 34 Years

Cyber Security News cybersecuritynews.com

On August 25, 2025, the world celebrates the 34th anniversary of Linux, marking one of the most significant milestones in computing history. What began as a humble hobby project by a 21-year-old Finnish student has evolved into the backbone of modern digital infrastructure, powering everything from smartphones and supercomputers to embedded systems and cloud platforms

Hackers Leverage SendGrid in Recent Attack to Harvest Login Credentials

Hackers Leverage SendGrid in Recent Attack to Harvest Login Credentials

Cyber Security News cybersecuritynews.com

A sophisticated credential harvesting campaign has emerged, exploiting the trusted reputation of SendGrid to deliver phishing emails that successfully bypass traditional email security gateways. The attack leverages SendGrid's legitimate cloud-based email service platform to create authentic-looking communications that target unsuspecting users across multiple organizations. The campaign employs a multi-faceted approach, utilizing three distinct email themes

Radware, EPIC Cloud Sign Managed Security Service Deal

Radware, EPIC Cloud Sign Managed Security Service Deal

Cyber Security - AI-Tech Park ai-techpark.com

Enables fully managed, AI-powered cloud application protection. Radware(R) (NASDAQ: RDWR), a global leader in application security and delivery solutions for multi-cloud environments, and EPIC Cloud Company, a Taiwanese cloud service company, today announced they signed a managed security service provider (MSSP) agreement. Based on the agreement, EPIC Cloud is adding...

FortiSIEM 7.4

FortiSIEM 7.4

cybersecurity www.reddit.com

Anyone tried FortiSIEM specifically 7.4 release? The reason why am asking about this specific version is ... it brought another level for the SaaS flavour of the product, making it pretty much the same as on-prem version, and bringing in embedded SOAR-like capabilities. However, because it is (respectively) new release, can't yet determine its pros and cons I have hybrid infrastructure mixing between cloud and on-prem and from multiple vendors, and trying to determine which SIEM would make the...

Wide World of Cyber: Microsoft's China Entanglement

Wide World of Cyber: Microsoft's China Entanglement

Risky Business Media risky.biz

The Wide World of Cyber podcast is back! In this episode host Patrick Gray chats with Alex Stamos and Chris Krebs about Microsoft's entanglement in China. Redmond has been using Chinese engineers to do everything from remotely support US DoD private cloud systems to maintain the on premise version of the SharePoint code base. It's all blown up in the press over the last month, but how did we get here? Did Microsoft make these decisions to save money? Or was it more about getting access to the...

Plinius: Secure and Persistent Machine Learning Model Training

Plinius: Secure and Persistent Machine Learning Model Training

cs.CR updates on arXiv.org arxiv.org

arXiv:2104.02987v3 Announce Type: replace Abstract: With the increasing popularity of cloud based machine learning (ML) techniques there comes a need for privacy and integrity guarantees for ML data. In addition, the significant scalability challenges faced by DRAM coupled with the high access-times of secondary storage represent a huge performance bottleneck for ML systems. While solutions exist to tackle the security aspect, performance remains an issue. Persistent memory (PM) is resilient to...

Chinese MURKY PANDA Attacking Government and Professional Services Entities

Chinese MURKY PANDA Attacking Government and Professional Services Entities

Cyber Security News cybersecuritynews.com

A sophisticated China-nexus threat actor designated MURKY PANDA has emerged as a significant cybersecurity concern, conducting extensive cyberespionage operations against government, technology, academic, legal, and professional services entities across North America since late 2024. This advanced persistent threat group demonstrates exceptional capabilities in cloud environment exploitation and trusted-relationship compromises, marking a concerning evolution in state-sponsored

Looking forward in my current career

Looking forward in my current career

cybersecurity www.reddit.com

I am security analyst with 4 years experience and planning to proceed further in my role Just stuck on what to do No idea on anything now I want to grab some new skills but everytime its happening like i am studying DFIR today then tomorrow Cloud Other day any other concept Feels like stuck in a loop I am planning to create a road map for getting a job outside India and based on that i want to learn the skills submitted by /u/White3devil [link] [comments]

Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage

Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage

The Hacker News thehackernews.com

Cybersecurity researchers are calling attention to malicious activity orchestrated by a China-nexus cyber espionage group known as Murky Panda that involves abusing trusted relationships in the cloud to breach enterprise networks. "The adversary has also shown considerable ability to quickly weaponize N-day and zero-day vulnerabilities and frequently achieves initial access to their targets by