Cloud security experts from Palo Alto Networks have warned about three critical misconfigurations that are most common in most organizations and have contributed to the majority of cloud attacks.
More organizations are relying on third-party companies to help them move to the cloud, such as Microsoft's popular Office 365 (O365) email services. A new report highlights some of the risks when moving to the cloud and potential configuration vulnerabilities.
Security researchers from Imperva have found thousands of Docker hosts exposed to a new vulnerability and exposed remote Docker API. The new research describes the threat along with sample scripts and what can be done about it.
A massive data leak from an ElasticSearch server has exposed information on over 108 million bets, as well as personal information, deposits and withdrawals. The server was not configured with any password or authentication required to protect the data.
A massive data breach dubbed "Collection #1" exposed nearly 800 million email addresses and millions of passwords. Security expert Troy Hunt was alerted of the leaked data made available for free download from popular MEGA cloud storage service. The data consisted of over 12,000 separate files and more than 87GB of data.
Cybersecurity firm UpGuard has discovered an error in Amazon AWS bucket configuration that led to the exposure of internal GoDaddy infrastructure data.
A security researcher from TrustWave discovered multiple vulnerabilities in the Western Digital (WD) MyCloud network storage devices.
Three misconfigured AWS S3 buckets exposed US military archives of an astounding size.
Appthority has discovered a significant data exposure vulnerability called Eavesdropper that impacts nearly 700 enterprise apps associated with 85 Twilio developer accounts.
Nearly four million Time Warner Cable (TWC) customer records were left exposed online via a third party data leak.