by Rodman Ramezanian · November 17, 2022
Today, threat actors leverage free cloud tools, such as hosting providers, file transfer services, collaboration platforms, calendar organizers, or a combination of each, to bypass security measures and disseminate malicious payloads around the world.
Skyhigh Security Threat Predictions for 2023
by Rodman Ramezanian · November 16, 2022
Over the past 12 months, the style and severity of threats have continuously evolved. Despite fluctuations in their nature, there is much to be learnt from recent trends to help predict what might lie ahead in 2023.
You Can’t Protect Data After a Breach
by Rodman Ramezanian · November 8, 2022
Organizations hold a wealth of personal data that spans the critical –health and welfare records, financial data, national security secrets - to the trivial -online shopping habits, ride-sharing trends, and holiday photos posted on social media. And this data is highly prized.
BlueBleed Leak Proves It Again: You Cannot Assume Cloud Service Providers Are Secure
by Thyaga Vasudevan · October 28, 2022
Dubbed “BlueBleed,” a recent Microsoft breach discovered by threat intelligence provider SOCRadar sheds light on the risks of misconfigured cloud storage buckets and demonstrates that companies cannot totally rely on Cloud Service Providers (CSPs) to provide and assume responsibility for security assurance.