Computer scientists at ETH Zurich have uncovered critical vulnerabilities in the security mechanisms of AMD and Intel chips, potentially exposing sensitive data processed in public cloud environments ...
CyCognito today released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are ...
Flaws in Fluent Bit could let attackers inject fake logs, reroute telemetry, and execute arbitrary code across cloud platforms.
SEATTLE & LAS VEGAS--(BUSINESS WIRE)--Black Hat Conference -- Traditional cloud security issues often associated with cloud service providers (CSPs) are continuing to decrease in importance, according ...
Some data is so sensitive that it is processed only in specially protected cloud areas. These are designed to ensure that not even a cloud provider can access the data. ETH Zurich researchers have now ...
They give security teams a single, unified way to protect applications, workloads, and infrastructure across every cloud ...
Researchers from ETH Zurich have uncovered significant security vulnerabilities in several widely used end-to-end encrypted (E2EE) cloud storage services. The cryptographic flaws could allow attackers ...
Users of cloud computing infrastructures should be aware that their sensitive data could be potentially leaked, a group of university researchers say. In a new research paper (PDF), several computer ...
Companies continue to create new software and apps or migrate existing ones to cloud-based services. However, a company that adopts cloud computing services without understanding the risks involved ...
Mondoo, Augmentt and Eon are among the coolest cloud computing startups CRN found in 2025.
A new report from the Cloud Security Alliance (CSA) has thrown up more difficulties organisations are facing in security remediation – and achieving visibility from code to cloud. The report, produced ...
Black Hat Conference—Traditional cloud security issues often associated with cloud service providers (CSPs) are continuing to decrease in importance, according to the Top Threats to Cloud Computing ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results