Hackers are quickly learning how to breach cloud systems

United States News News

Hackers are quickly learning how to breach cloud systems
United States Latest News,United States Headlines
  • 📰 axios
  • ⏱ Reading Time:
  • 67 sec. here
  • 3 min. at publisher
  • 📊 Quality Score:
  • News: 30%
  • Publisher: 63%

Hackers are quickly finding flaws in organizations' cloud infrastructure despite perceptions that the technology is ironclad against cyberattacks.

last month that the recent exposure of roughly a terabyte of Pentagon emails was likely due to a cloud configuration error.: "As more organizations are moving into the cloud, it becomes a much more attractive target for these threat actors, and they're spending more time and resources trying to get into that environment," Adam Meyers, senior vice president of intelligence at CrowdStrike, told Axios.

Subsequently, most organizations also fail to update their legacy cybersecurity tools to spot those cloud configuration errors, Meyers added.Many hackers are quickly building skills to target cloud storage because of how rewarding it can be. During traditional attacks targeting onsite servers, malicious hackers typically need their own port-scanning tools to detect what systems are in an enterprise and where the weak, exploitable spots are.

But during cloud attacks, those port scanners aren't needed, Meyers said. Malicious hackers who can navigate a cloud environment can use native tools inside the environment to more stealthily search and determine what data is available.of security: crunchy on the outside, soft and chewy on the inside," Meyers said.Attacks targeting the cloud still start in many of the same ways as on-premise attacks: using stolen employee login credentials.

For instance, cloud security firm Mitiga warned last week that when hackers use legitimate login credentials to break in, the Google Cloud Platform fails to record a proper activity log of the malicious actor's actions,As IT spending on the cloud continues to grow, organizations need to make sure they're also reviewing their security sets to ensure they can handle new, cloud-related obstacles.

We have summarized this news so that you can read it quickly. If you are interested in the news, you can read the full text here. Read more:

axios /  🏆 302. in US

United States Latest News, United States Headlines

Similar News:You can also read news stories similar to this one that we have collected from other news sources.

CrowdStrike stock rallies as earnings, outlook beat Street viewCrowdStrike stock rallies as earnings, outlook beat Street viewCrowdStrike Holdings Inc. shares surged in the extended session Tuesday after the cybersecurity company's earnings beat.
Read more »

Stocks making the biggest moves after hours: CrowdStrike, Stitch Fix and moreStocks making the biggest moves after hours: CrowdStrike, Stitch Fix and moreThese are the stocks posting the largest moves in extended trading.
Read more »

2022 Porsche 911 Targa 4 GTS Quick Drive: The Stunning Driver’s Convertible Sports Car2022 Porsche 911 Targa 4 GTS Quick Drive: The Stunning Driver’s Convertible Sports CarThere’s no shortage of versions of the Porsche 911, but no convertible sports car puts a bigger smile on your face than this one does.
Read more »

Inside BNPL Sezzle's planned comeback after a brutal 2022BNPL Sezzle had a brutal 2022. The fintech's CEO lays out its comeback plan amid a competitive field in payments.
Read more »

These were the most visited national parks and memorials in 2022These were the most visited national parks and memorials in 2022Visits to U.S. national parks and memorials are bouncing back to pre-pandemic levels. The National Park Service reported a 5% increase in attendance in 2022, with 312 million visitors.
Read more »



Render Time: 2025-03-10 18:47:08