Cloud Security

Microsoft: Attackers are increasingly using token theft in cyberattacks to bypass MFA

The Microsoft Detection and Response Team (DART) has spotted an increase in attackers using token theft in the cloud to compromise corporate systems while bypassing multi-factor authentication (MFA) and other authentication controls.

Microsoft: Attackers are increasingly using token theft in cyberattacks to bypass MFA Read More »

Report: Linux malware and cloud misconfigurations top cybersecurity threats

A new report published by Trend Micro revealed that Linux malware and cloud misconfigurations make up some of the top cybersecurity threats facing organizations over the first half of 2022.

Report: Linux malware and cloud misconfigurations top cybersecurity threats Read More »

cyber security, internet, hacking-3400555.jpg

DevSecOps best practices to secure cloud-native and microservices-based applications

The National Institute of Standards and Technology (NIST) has issued the NIST SP 800-204C “Implementation of DevSecOps for a Microservices-based Application with Service Mesh.” The guidelines include many best practices on how organizations and secure their CI/CD pipeline and enhance the software delivery processes.

DevSecOps best practices to secure cloud-native and microservices-based applications Read More »

NIST SP 800-204C: Implementation of DevSecOps for a Microservices-based Application with Service Mesh

he National Institute of Standards and Technology (NIST) has issued the NIST SP 800-204C “Implementation of DevSecOps for a Microservices-based Application with Service Mesh.”

NIST SP 800-204C: Implementation of DevSecOps for a Microservices-based Application with Service Mesh Read More »

CISA: Take these urgent steps to protect your organization against potential critical cybersecurity threats

The Cybersecurity and Infrastructure Security Agency (CISA) has published a new CISA Insights guideline document with steps organizations can take against potential critical cybersecurity threats.

CISA: Take these urgent steps to protect your organization against potential critical cybersecurity threats Read More »

Microsoft issues new guidance on OMI vulnerabilities within Azure VM Management extensions

Microsoft has published new guidance on Open Management Infrastructure (OMI) vulnerabilities within Azure virtual management (VM) Management extensions.

Microsoft issues new guidance on OMI vulnerabilities within Azure VM Management extensions Read More »