Get a Pentest and security assessment of your IT network.

News

As Businesses Move to the Cloud, Cybercriminals Follow Close Behind

IBM X-Force IRIS analyzed the most common types of cloud compromises we’ve seen over the past year. The most common initial infection vector was remote exploitation of cloud applications. Data theft is by far the top tactic we see attackers taking once they’ve breached cloud systems. Cloud systems often hold an unprecedented amount of valuable and sensitive data that can put both organizations and their customers in danger if breached. Threat actors are always evolving and augmenting their tactics, techniques, and procedures with new capabilities specifically to target cloud environments.”]

Source: https://www.darkreading.com/cloud/as-businesses-move-to-the-cloud-cybercriminals-follow-close-behind

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

SEA has stolen invoices that shows Microsoft charges FBI for user data

News

Greek police arrested a man running the BTC-e Bitcoin exchange to launder more than US$4bn worth of the Bitcoin