Defending sovereign workloads: Google Distributed Cloud's air-gapped approach to Zero Trust

Source

Public sector and government organizations require cloud solutions that can drive innovation and also adhere to strict sovereignty and security requirements. For years, security experts have warned of the risks of government overreliance on singular security controls. To help address public sector and government requirements, we offer Google Distributed …

Rite Aid says breach exposes sensitive details of 2.2 million customers

Source

Enlarge / Rite Aid logo displayed at one of its stores. (credit: Getty Images) Rite Aid, the third biggest US drug store chain, said that more than 2.2 million of its customers have been swept into a data breach that stole personal information, including driver's license numbers, addresses, and …

Here’s how carefully concealed backdoor in fake AWS files escaped mainstream notice

Source

Enlarge (credit: BeeBright / Getty Images / iStockphoto ) Researchers have determined that two fake AWS packages downloaded hundreds of times from the open source NPM JavaScript repository contained carefully concealed code that backdoored developers' computers when executed. The packages— img-aws-s3-object-multipart-copy and legacyaws-s3-object-multipart-copy —were attempts to appear as aws-s3-object-multipart-copy, a legitimate JavaScript …

Hacking Scientific Citations

Source

Some scholars are inflating their reference counts by sneaking them into metadata: Citations of scientific work abide by a standardized referencing system: Each reference explicitly mentions at least the title, authors’ names, publication year, journal or conference name, and page numbers of the cited publication. These details are stored …

Patterns for consuming custom log sources in Amazon Security Lake

Source

As security best practices have evolved over the years, so has the range of security telemetry options. Customers face the challenge of navigating through security-relevant telemetry and log data produced by multiple tools, technologies, and vendors while trying to monitor, detect, respond to, and mitigate new and existing security …

Researchers: Weak Security Defaults Enabled Squarespace Domains Hijacks

Source

At least a dozen organizations with domain names at domain registrar Squarespace saw their websites hijacked last week. Squarespace bought all assets of Google Domains a year ago, but many customers still haven’t set up their new accounts. Experts say malicious hackers learned they could commandeer any migrated …

AWS renews TISAX certification (Information with Very High Protection Needs (AL3)) across 19 regions

Source

We’re excited to announce the successful completion of the Trusted Information Security Assessment Exchange (TISAX) assessment on June 11, 2024 for 19 AWS Regions. These Regions renewed the Information with Very High Protection Needs (AL3) label for the control domains Information Handling and Data Protection. This alignment with …

Google makes it easier for users to switch on advanced account protection

Source

Enlarge (credit: Getty Images) Google is making it easier for people to lock down their accounts with strong multifactor authentication by adding the option to store secure cryptographic keys in the form of passkeys rather than on physical token devices. Google’s Advanced Protection Program, introduced in 2017, requires …

Crooks Steal Phone, SMS Records for Nearly All AT&T Customers

Source

AT&T Corp. disclosed today that a new data breach has exposed phone call and text message records for roughly 110 million people — nearly all of its customers. AT&T said it delayed disclosing the incident in response to “national security and public safety concerns,” noting that some of …

« newer articles | page 28 | older articles »