Get a Pentest and security assessment of your IT network.

News

How Threat Actors Are Adapting to the Cloud

IBM: 45 percent of cloud incidents studied by IBM X-Force IRIS were caused by an initial compromise of a vulnerable cloud-hosted application. Cloud applications require a cloud-specific design and can present vulnerabilities not found in traditional server-based applications. Threat actors are three times more likely to deploy ransomware into the cloud environment compared to any other type of malware. Threat actors realize that cloud environments are critical to business operations and shutting down an organizations environments can cause rapid harm on a large scale.”]

Source: https://securityintelligence.com/posts/how-threat-actors-are-adapting-to-the-cloud/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

SEA has stolen invoices that shows Microsoft charges FBI for user data

News

Greek police arrested a man running the BTC-e Bitcoin exchange to launder more than US$4bn worth of the Bitcoin