How to bridge the MFA gap

Source

If a credential is worth protecting, it's worth protecting well. Sponsored feature What do flossing and multi-factor authentication (MFA) have in common? Each is highly beneficial, yet far too few people do them consistently. MFA helps protect organizations from credential-based attacks, but according to the Cyber Readiness Institute, only …

Amazon CISO: Iranian hacking crews ‘on high alert’ since Israel attack

Source

Meanwhile, next-gen script kiddies are levelling up faster thanks to agentic AI Interview Iran's state-sponsored cyber operatives and hacktivists have all increased their activities since the military conflict with Israel erupted last week – but not necessarily in the way that Amazon chief information security officer CJ Moses expected.... [...]

Cybersecurity takes a big hit in new Trump executive order

Source

Cybersecurity practitioners are voicing concerns over a recent executive order issued by the White House that guts requirements for: securing software the government uses, punishing people who compromise sensitive networks, preparing new encryption schemes that will withstand attacks from quantum computers, and other existing controls. The executive order (EO …

Enhancing backup vaults with support for Persistent Disk, Hyperdisk, and multi-regions

Source

To help protect against evolving digital threats like ransomware and malicious deletions, last year, we introduced backup vault in the Google Cloud Backup and DR service, with support for Compute Engine VM backups. This provided immutable and indelible backup capabilities for mission-critical VMs, for both VM metadata and all …

Secure your Express application APIs in minutes with Amazon Verified Permissions

Source

Today, Amazon Verified Permissions announced the release of @verifiedpermissions/authorization-clients-js, an open source package that developers can use to implement external fine-grained authorization for Express.js web application APIs in minutes when using Verified Permissions. Express is a minimal and flexible Node.js web application framework that provides a …

Improve your security posture using Amazon threat intelligence on AWS Network Firewall

Source

Today, customers use AWS Network Firewall to safeguard their workloads against common security threats. However, they often have to rely on third-party threat feeds and scanners that have limited visibility in AWS workloads to protect against active threats. A self-managed approach to cloud security through traditional threat intelligence feeds …

How AWS is simplifying security at scale: Four keys to faster innovation from AWS re:Inforce 2025

Source

When I began my career in security, most people accepted as fact that protecting systems came at the expense of productivity. That didn’t have to be true then, and it’s definitely not true now. The cloud, and specifically the AWS Cloud, is a big reason why. But …

Beyond compute: Shifting vulnerability detection left with Amazon Inspector code security capabilities

Source

Since launch, Amazon Inspector has helped customers automate vulnerability management for their running workloads on Amazon Elastic Compute Cloud (Amazon EC2), container workloads, and AWS Lambda functions. Today, we’re taking a step forward into more proactive security with the latest addition to Amazon Inspector: code security capabilities. By …

Introducing the new console experience for AWS WAF

Source

Protecting publicly facing web applications can be challenging due to the constantly evolving threat landscape. You must defend against sophisticated threats, including zero-day vulnerabilities, automated events, and changing compliance requirements. Navigating through consoles and selecting the protections best suited to your use case can be complicated, requiring not only …

How AWS improves active defense to empower customers

Source

At AWS, security is the top priority, and today we’re excited to share work we’ve been doing towards our goal to make AWS the safest place to run any workload. In earlier posts on this blog, we shared details of our internal active defense systems, like MadPot …

Vandals cut fiber-optic lines, causing outage for Spectrum Internet subscribers

Source

Subscribers in Southern California of Spectrum’s Internet service experienced outages over the weekend following what company officials said was an attempted theft of copper lines located in Van Nuys, a suburb located 20 miles from downtown Los Angeles. The people behind the incident thought they were targeting copper …

Remorseless extortionists claim to have stolen thousands of files from Freedman HealthCare

Source

The group has previously threatened to SWAT cancer patients and leaked pre-op plastic surgery photos An extortion gang claims to have breached Freedman HealthCare, a data and analytics firm whose customers include state agencies, health providers, and insurance companies, and is threatening to dump tens of thousands of sensitive …

How Google Cloud is securing open-source credentials at scale

Source

Credentials are an essential part of modern software development and deployment, granting bearers privileged access to systems, applications, and data. However, credential-related vulnerabilities remain the predominant entry point exploited by threat actors in the cloud. Stolen credentials “are now the second-highest initial infection vector, making up 16% of our …

Armored cash transport trucks allegedly hauled money for $190 million crypto-laundering scheme

Source

PLUS: APNIC completes re-org; India cuts costs for chipmakers; Infosys tax probe ends; and more Asia In Brief Australia’s Federal Police (AFP) last week announced charges against four suspects for alleged participation in a money-laundering scheme that involved a security company’s armored cash transport unit.... [...]

UK ‘woefully’ unprepared for Chinese and Russian undersea cable sabotage, says report

Source

CSRI finds China and Russia may be coordinating ‘grey zone’ tactics against vulnerable western infrastructure China and Russia are stepping up sabotage operations targeting undersea cables and the UK is unprepared to meet the mounting threat, according to new analysis. A report by the China Strategic Risks Institute (CSRI …

« newer articles | page 82 | older articles »