Latest from todayFeatureAWS leans on prior ingenuity to face future AI and quantum threatsAmazon Web Services has launched numerous security innovations in its first two decades. Three in particular will play key roles in how the hyperscaler responds to some of the most challenging cyber issues yet.By Maria KorolovApr 29, 20269 minsCloud SecuritySecurity News Azure SRE Agent flaw lets outsiders silently eavesdrop on enterprise cloud operationsBy Gyana SwainApr 21, 20265 minsCloud SecuritySecurityVulnerabilitiesNews China-linked cloud credential heist runs on typos and SMTPBy Shweta SharmaApr 14, 20264 minsCloud SecurityIdentity and Access ManagementSecurity NewsCERT-EU blames Trivy supply chain attack for Europa.eu data breachBy John E. Dunn Apr 3, 20264 minsCloud SecurityCode SecuritySecurity OpinionWhy Kubernetes controllers are the perfect backdoorBy Niranjan Kumar Sharma Mar 30, 20266 minsCloud SecuritySecurity NewsEuropean Commission data stolen in a cyberattack on the infrastructure hosting its web sites By Howard Solomon Mar 27, 20265 minsCloud SecurityCyberattacksCybercrime OpinionThe multi-billion dollar mistake: Why cloud misconfigurations are your biggest security threatBy Ashish Mishra Mar 19, 202610 minsCloud SecurityCybercrimeHacking NewsAWS Bedrock’s ‘isolated’ sandbox comes with a DNS escape hatchBy Shweta Sharma Mar 17, 20264 minsCloud SecuritySecurityVulnerabilities OpinionHybrid resilience: Designing incident response across on-prem, cloud and SaaS without losing your mindBy Shalini Sudarsan Mar 13, 20268 minsCloud SecurityIncident ResponseSecurity Practices ArticlesnewsAWS expands Security Hub for multicloud security operationsThe update introduces a unified operations layer designed to aggregate risk signals across cloud environments and help CISOs manage threats through a single security solution.By Nidhi Singal Mar 11, 2026 6 minsCloud SecuritySecurityfeature12 ways attackers abuse cloud services to hack your enterpriseAs enterprises increasing depend on cloud services, living off the land has evolved into living off the cloud.By John Leyden Mar 11, 2026 8 minsCloud SecurityCyberattacksSecuritynewsBattling bots face off in cybersecurity arena Wiz creates an environment to test AI agents’ ability to identify cybersecurity problems. By Maxwell Cooter Feb 13, 2026 2 minsAPIsCloud SecurityZero-Day VulnerabilitiesnewsEU clears Google’s $32B Wiz acquisition, intensifying cloud security competitionThis allows Google to fold one of the fastest-growing cloud security platforms into its stack, strengthening its position in the AI-driven hyperscaler race.By Prasanth Aby Thomas Feb 11, 2026 4 minsCloud SecuritySecuritySecurity SoftwarebrandpostSponsored by CyberNewsWireSpyCloud Data Shows Corporate Users 3x More Likely to Be Targeted by Phishing Than by MalwareBy Cyber NewsWire – Paid Press Release Dec 5, 2025 5 minsCloud SecurityCyberattacksCybercrimenewsFrom credentials to cloud admin in 8 minutes: AI supercharges AWS attack chainAI-assisted attackers weaponized exposed credentials and permissive roles to move from initial access to full AWS admin control in minutes. By Shweta Sharma Feb 3, 2026 5 minsArtificial IntelligenceCloud SecuritySecuritynewsMisconfigured demo environments are turning into cloud backdoors to the enterpriseExposed lab and demo environments are leaking cloud credentials, IAM privileges, and sensitive data. By Taryn Plumb Jan 21, 2026 6 minsCloud SecuritySecurityVulnerabilitiesnews analysisSophisticated VoidLink malware framework targets Linux cloud serversCheck Point researchers have discovered a modular malware framework likely designed by Chinese developers to harvest credentials for cloud environments.By Lucian Constantin Jan 14, 2026 5 minsCloud SecurityMalwarefeature8 things CISOs can’t afford to get wrong in 2026AI, cloud, and the increasingly interconnected nature of business and technology present CISOs with a range of risks and threats that will be particularly challenging this year.By Bob Violino Jan 7, 2026 11 minsCSO and CISOCloud SecurityThreat and Vulnerability Managementhow-toCASB buyer’s guide: What to know about cloud access security brokers before you buyA cloud access security broker manages access between enterprise endpoints and cloud resources from a security perspective. Here’s what to consider when selecting the right CASB for your enterprise. By Neal Weinberg and David Strom Dec 17, 2025 18 minsCloud SecurityEnterprise Buyer’s GuidesSecuritynewsGitHub Action Secrets aren’t secret anymore: exposed PATs now a direct path into cloud environmentsWiz has found threat actors exploiting GitHub tokens, giving them access to GitHub Action Secrets and, ultimately, cloud environments. By Taryn Plumb Dec 9, 2025 6 minsCloud SecurityGitHubSecurityopinionRacks, sprawl and the myth of redundancy: Why your failover isn’t as safe as you thinkToday’s outages hit harder, so smart redundancy — backed by good policies, automation and testing — is the only way to keep traffic flowing when things inevitably break.By Olatunde Olasehan Dec 9, 2025 8 minsBusiness ContinuityCloud SecuritySecurityfeatureSpotlight: Making the most of multicloudFor IT leaders navigating multicloud environments, success depends on strategic alignment across business units, robust governance frameworks, and proactive security postures. While multicloud offers agility and vendor flexibility, it also introduces challenges in visibility, compliance, and developer productivity. In this special report, you’ll learn how to take advantage of the benefits of using multiple clouds, avoid common pitfalls, and ensure that multicloud is worth the investment. By CSO Staff Dec 9, 2025 1 minCloud SecurityEnterprise Buyer’s Guides Show more Show less View all Resources whitepaper Security Priorities 2025: Was Security-Entscheider wirklich bewegt Unsere neue Studie zeigt klar: Budgets wachsen, AI treibt Entscheidungen voran, Boards mischen sich stärker ein und Security-Leader stehen unter hohem Druck, die richtigen Prioritäten zu setzen. The post Security Priorities 2025: Was Security-Entscheider wirklich bewegt appeared first on Whitepaper Repository –. By Dell Technologies 02 Feb 2026Artificial IntelligenceCloud SecurityMobile Security whitepaper The State of Cloud Security Report 2025 By Palo Alto Networks 22 Jan 2026CloudCloud SecurityIT Management View all Video on demand video Honeypots and the evolution of botnets | Salted Hash Ep 23 Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm’s recent honeypot research, which gathered information showing how the bot landscape is evolving. Apr 20, 2018 12 minsAdvanced Persistent ThreatsApplication SecurityFirewalls DJI’s bounty problems and video surveillance programs | Salted Hash Ep 13 Jan 8, 2018 21 mins Application SecurityData BreachHacking Zero Trust networks and enterprise security strategy | Salted Hash Ep 12 Dec 18, 2017 26 mins Cloud ComputingCloud SecuritySecurity The latest on Azure Stack, cyberattacks, the next iPhone and … keyboards Jul 20, 2017 41 mins AppleCloud SecuritySmartphones See all videos Explore a topicApplication SecurityBusiness ContinuityBusiness OperationsCareersComplianceCritical InfrastructureCybercrimeIdentity and Access ManagementIndustryIT LeadershipNetwork SecurityPhysical SecurityPrivacyRisk ManagementView all topics Show me morePopular news Anthropic Mythos spurs White House to weigh pre-release reviews for high-risk AI models By Cynthia BrumfieldMay 4, 20264 mins GovernmentLaws and RegulationsRisk Management news Security agencies draw red lines around agentic AI deployments By Shweta SharmaMay 4, 20264 mins Artificial IntelligenceLaws and RegulationsSecurity feature The fake IT worker problem CISOs can’t ignore By Rosalyn PageMay 4, 202611 mins CyberattacksCybercrimeHiring