Stay updated with the latest developments in Cloud Computing!
News, updates, tips and tutorials that help you maximize your security.
Also on this page, click the links below:
Cloud Computing News Websites
Cloud Computing Guides
Check back for updates.
Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials
Cybersecurity researchers have demonstrated a novel technique that allows a malicious web browser extension to impersonate any ...
Desert Dexter Targets 900 Victims Using Facebook Ads and Telegram Malware Links
"The campaign, which leverages social media to distribute malware, is tied to ...
Why The Modern Google Workspace Needs Unified Security
This patchwork approach often creates blind spots, making it harder—not easier—to ...
⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact
This week's events reveal a sobering reality: state-sponsored groups are infiltrating ...
SilentCryptoMiner Infects 2,000 Russian Users via Fake VPN and DPI Bypass Tool
A new mass malware campaign is infecting users with a cryptocurrency miner named SilentCryptoMiner by masquerading it as ...
New Linux Kernel Code Written in Rust Aims to Eliminate Memory Safety Bugs
The integration of Rust into the Linux kernel is a significant step forward in enhancing memory safety, a critical aspect of kernel development.This...
North Korean IT Workers Linked to 2,400 Astrill VPN IP Addresses
New data has emerged linking over 2,400 IP addresses associated with Astrill VPN to individuals believed to be North Korean IT workers.These findings were ...
Laravel Framework Flaw Allows Attackers to Execute Malicious JavaScript
A significant vulnerability has been identified in the Laravel framework, specifically affecting versions between 11.9.0 and 11.35.1.The issue revolves around improper encoding of request...
Critical Vulnerabilities in Moxa Switches Enable Unauthorized Access
A critical vulnerability identified as CVE-2024-12297 has been discovered in Moxa's PT series of network switches, affecting multiple models across different product lines.This security...
Cobalt Strike Exploitation by Hackers Drops, Report Reveals
A collaborative initiative involving Microsoft’s Digital Crimes Unit (DCU), Fortra, and the Health Information Sharing and Analysis Center (Health-ISAC) has reported a major drop...
Developer Pleads Guilty to Injecting Malware and Crippling Company Systems
In a stunning case of corporate sabotage, a former software developer for Eaton Corp., Davis Lu, 55, of Houston, has been found guilty by...
WinDbg Vulnerability Allows Attackers to Execute Remote Code
Microsoft recently disclosed a critical vulnerability impacting its debugging tool, WinDbg, and associated .NET packages.Tracked CVE-2025-24043, this flaw allows remote code execution (RCE) due...
Trump Coins Used as Lure in Malware Campaign
Binance is being spoofed in an email campaign using free TRUMP Coins as a lure leading to the installation of the ConnectWise RAT.
Details Disclosed for SCADA Flaws That Could Facilitate Industrial Attacks
Palo Alto Networks has shared details on several high-severity Mitsubishi Electric and Iconics SCADA vulnerabilities.
Cobalt Strike Abuse Dropped 80% in Two Years
Fortra has shared an update on the effects of actions taken to reduce the abuse of Cobalt Strike by threat actors.
Developer Convicted for Hacking Former Employer’s Systems
Davis Lu was convicted of sabotaging his employer’s systems through malicious code, and deleting encrypted data.
Google Paid Out $12 Million via Bug Bounty Programs in 2024
In 2024, Google paid out nearly $12 million in bug bounties through its revamped vulnerability reward programs.
Mass Exploitation of Critical PHP Vulnerability Begins
GreyNoise warns of mass exploitation of a critical vulnerability in PHP leading to remote code execution on vulnerable servers.
560,000 People Impacted Across Four Healthcare Data Breaches
Several healthcare organizations in different US states have disclosed data breaches affecting 100,000-200,000 individuals.
Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail
Threat actors are targeting Amazon Web Services (AWS) environments to push out ...
Hackers Use ClickFix Trick to Deploy PowerShell-Based Havoc C2 via SharePoint Sites
Cybersecurity researchers are calling attention to a new phishing campaign that employs the ClickFix technique to deliver ...
Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks
Threat actors have been exploiting a security vulnerability in Paragon Partition Manager's BioNTdrv.sys driver in ransomware attacks to escalate ...
TikTok, Reddit, and Imgur Investigated Over Children's Data Protection Practices
There’s a new investigation into online platforms TikTok, Reddit, and Imgur to assess ...
⚡ THN Weekly Recap: Alerts on Zero-Day Exploits, AI Breaches, and Crypto Heists
We've sifted through a storm of cyber threats—from phishing scams to malware attacks—and broken down ...
Threat Actors Exploiting AES Encryption for Stealthy Payload Protection
Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES) encryption by threat actors to shield malicious payloads from detection....
33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge
Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in cyber threats targeting mobile devices.The security firm's products blocked...
Routers Under Attack as Scanning Attacks on IoT and Networks Surge to Record Highs
In a concerning trend, the frequency of scanning attacks targeting Internet of Things (IoT) devices and network routers has surged dramatically, reaching unprecedented levels....
Google Launches Shielded Email to Keep Your Address Hidden from Apps
Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps and services from accessing users’ primary email addresses during sign-ups.The...
Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware
Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage PowerShell and legitimate Microsoft applications to deploy malware without leaving...
JavaGhost: Exploiting Amazon IAM Permissions for Phishing Attacks
Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations in Amazon Web Services (AWS) environments to conduct sophisticated phishing...
New Poco RAT Via Weaponized PDF Attacking Users to Capture Sensitive Data
A new variant of malware, dubbed "Poco RAT," has emerged as a potent espionage tool in a campaign targeting Spanish-speaking users in Latin America....
TechCrunch Cloud Computing
TechCrunch reports on the business of cloud technology, startups, venture capital funding, Silicon Valley and cybersecurity.
The Radar
The Business technolgy Experts.
Security Week
SecurityWeek provides cloud security news and information to global enterprises, with expert insights & analysis for IT security professionals.
The Register
Enterprise technology news for IT decision-makers and professionals.
Amazon Web Services (AWS)
The industry leader in cloud computing, AWS offers scalable and reliable services ranging from storage and compute power to advanced AI and analytics, powering businesses of all sizes worldwide.
Microsoft Azure
A robust cloud platform blending innovative AI tools, enterprise-grade infrastructure, and seamless integration with Microsoft’s ecosystem to empower digital transformation across industries.
Salesforce
A cloud pioneer specializing in CRM and business solutions, Salesforce connects customer data, AI, and analytics to streamline sales, marketing, and customer engagement.
VMWare
Renowned for virtualization, VMware extends its expertise to hybrid and multi-cloud environments, enabling secure, efficient, and flexible IT solutions for enterprises.
Alibaba Cloud
Asia’s leading cloud provider, Alibaba Cloud delivers comprehensive services from AI to IoT, catering to global businesses with a strong foothold in e-commerce and innovation.
Oracle Cloud
Known for its robust database capabilities, Oracle Cloud offers next-gen cloud infrastructure and applications tailored for enterprises seeking performance and security.
Rackspace
A multi-cloud solutions provider, Rackspace combines managed services and cutting-edge technologies to simplify cloud operations and optimize business outcomes.
Digital Ocean
A developer-centric cloud platform, DigitalOcean makes deploying, managing, and scaling applications simple and cost-effective for startups and small businesses.
ServiceNow
ServiceNow revolutionizes workflows through its cloud-based platform, automating and optimizing IT and business processes for improved efficiency.
NetApp
Specializing in data management, NetApp provides hybrid and multi-cloud solutions that streamline storage, security, and analytics to unlock data-driven insights.
Google Cloud
A leader in data analytics and machine learning, Google Cloud combines cutting-edge technology with seamless collaboration tools to drive innovation and growth.
CloudSigma
A flexible and transparent cloud provider, CloudSigma empowers businesses with customizable resources, high-performance computing, and strong data privacy.
IBM Cloud
Merging advanced AI with hybrid cloud solutions, IBM Cloud delivers secure, scalable services that integrate seamlessly across on-premise and cloud environments.
Cisco Cloud Solutions
Cisco offers secure, integrated solutions for hybrid cloud environments, focusing on networking, security, and collaboration for enterprise agility.
Red Hat Hybrid Cloud
Leveraging open-source innovation, Red Hat provides scalable hybrid cloud solutions, enabling enterprises to seamlessly integrate cloud-native and traditional applications.
|