#cloudcomputingsecuritychallenges search results

No results for "#cloudcomputingsecuritychallenges"

💻 ¿Tu servidor va lento? ¿Tienes caídas? Lo auditamos gratis. #consultoriainformatica #infosecurity #cloud

dcseguridad's tweet image. 💻 ¿Tu servidor va lento? ¿Tienes caídas? Lo auditamos gratis. #consultoriainformatica #infosecurity #cloud

⚠️🌩️ Microsoft SharePoint Online attacks on the rise! 🎣 Adversaries abuse: 🔸 Power Automate → stealthy exfiltration 🔸 OAuth & Graph → persistence 🔸 Guest links → lateral movement 🛡️ Defend by: 🚫 Disabling anonymous sharing 🔒 Reviewing Power Automate flows ✅ Auditing…

Cloud_Breach's tweet image. ⚠️🌩️ Microsoft SharePoint Online attacks on the rise!
🎣 Adversaries abuse:
🔸 Power Automate → stealthy exfiltration
🔸 OAuth & Graph → persistence
🔸 Guest links → lateral movement

🛡️ Defend by:
🚫 Disabling anonymous sharing
🔒 Reviewing Power Automate flows
✅ Auditing…

Hackers can get through three layers of verification but when @idOS_network kicks in, the scene changes sirens go off, and the system says ‘This is where it ends, buddy.’"

Web3Pikachu's tweet image. Hackers can get through three layers of verification

but when @idOS_network  kicks in, the scene changes  sirens go off, and the system says

 ‘This is where it ends, buddy.’"

You can use Pacu, to test Cloud attacks and see their effects/logs in LocalStack. If more context is needed, let me know!

DeleLearnsTech's tweet image. You can use Pacu, to test Cloud attacks and see their effects/logs in LocalStack.
If more context is needed, let me know!

good morning. unfortunately, i’ve been compromised. the cloud storing your data was hacked last night. decentralized compute would’ve stopped this, but you faded computefi. by the way, your bank account balance is now 0.

cysic_xyz's tweet image. good morning.

unfortunately, i’ve been compromised. the cloud storing your data was hacked last night.

decentralized compute would’ve stopped this, but you faded computefi.

by the way, your bank account balance is now 0.

Cyber Threat Intelligence (CTI): Finding C2 Servers, Malware and Botnets From Storm botnet's P2P networks to Twitter-based C2s hiding in plain sight - attackers constantly adapt. Learn to track them with modern CTI tools: hackers-arise.com/cyber-threat-i… @three_cube

_aircorridor's tweet image. Cyber Threat Intelligence (CTI): Finding C2 Servers, Malware and Botnets

From Storm botnet's P2P networks to Twitter-based C2s hiding in plain sight - attackers constantly adapt.

Learn to track them with modern CTI tools:
hackers-arise.com/cyber-threat-i…
@three_cube

Nothing to be scared about this Halloween season if you're with Net3. As a Private Cloud Provider, we prioritize your data's safety! Don't be afraid to reach out to talk to us - we don't bite! 🧛‍♂️🎃 hubs.ly/Q03Pj31g0 #IaaS #backup #cloudcomputing #disasterrecovery

N3TTech's tweet image. Nothing to be scared about this Halloween season if you're with Net3.  As a Private Cloud Provider, we prioritize your data's safety!  Don't be afraid to reach out to talk to us - we don't bite! 🧛‍♂️🎃
hubs.ly/Q03Pj31g0

#IaaS #backup #cloudcomputing #disasterrecovery

📍A Compilation of Cloud Security Resources 🔗github.com/senaykt/cloud-…

harshleenchawl2's tweet image. 📍A Compilation of Cloud Security Resources
🔗github.com/senaykt/cloud-…

Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras by @Watchful_IP watchfulip.github.io/28-12-24/tp-li… #embedded #cybersecurity

0xor0ne's tweet image. Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras by @Watchful_IP

watchfulip.github.io/28-12-24/tp-li…

#embedded #cybersecurity
0xor0ne's tweet image. Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras by @Watchful_IP

watchfulip.github.io/28-12-24/tp-li…

#embedded #cybersecurity

Case study - Exploiting ElizaOS To show the real-world consequences of these flaws, researchers examined ElizaOS, a decentralized AI-agent framework used for automated Web3 tasks. Their experiments empirically demonstrate that the system can be manipulated through contextual…

Shuarix's tweet image. Case study - Exploiting ElizaOS

To show the real-world consequences of these flaws, researchers examined ElizaOS, a decentralized AI-agent framework used for automated Web3 tasks.

Their experiments empirically demonstrate that the system can be manipulated through contextual…

AI agents are powerful, but power always comes with risk A new study breaks down how context - the mix of prompts, memory, knowledge, and data might actually be an AI agent’s weakest spot When those layers meet, the attack surface multiplies. Think: - Direct & indirect prompt…

Shuarix's tweet image. AI agents are powerful, but power always comes with risk

A new study breaks down how context - the mix of prompts, memory, knowledge, and data might actually be an AI agent’s weakest spot

When those layers meet, the attack surface multiplies. Think:
- Direct & indirect prompt…


GOOD NIGHT LEGENDS! Klout’s Cross Chain Exploit NFTs turn blockchain security into a shared and transparent game of defense and discovery. Each NFT represents a verified exploit signature, discovered, reported, and resolved across Klout’s interconnected ecosystems. There are…

timaxbt's tweet image. GOOD NIGHT LEGENDS!

Klout’s Cross Chain Exploit NFTs turn blockchain security into a shared and transparent game of defense and discovery.

Each NFT represents a verified exploit signature, discovered, reported, and resolved across Klout’s interconnected ecosystems.

There are…

仅今年的10个月,就有数百家企业的云存储被攻破。 Salesforce的OAuth令牌被盗,影响了Google、Allianz、Cloudflare等巨头。 SonicWall的云备份系统被入侵,Ascension医疗系统的第三方云平台泄露了敏感患者信息。 每一次攻破都是同样的故事:中心化的单点故障。 —————————————————————————…

metaio102's tweet image. 仅今年的10个月,就有数百家企业的云存储被攻破。

Salesforce的OAuth令牌被盗,影响了Google、Allianz、Cloudflare等巨头。

SonicWall的云备份系统被入侵,Ascension医疗系统的第三方云平台泄露了敏感患者信息。

每一次攻破都是同样的故事:中心化的单点故障。

—————————————————————————…

This scarecrow will drive away all possible risks of data leakage and keep them safe and secure forever.🔥🔥 Happy Halloween @irys_xyz 🎃🦇

LiquedFaster's tweet image. This scarecrow will drive away all possible risks of data 
leakage and keep them safe and secure forever.🔥🔥

Happy Halloween @irys_xyz 🎃🦇

Longer thread on how Cipher Protocol will protect you ⬇️ Recent campaigns use[d] malicious SVGs as the first step in an elaborate, multi-stage infection chain. SVGs act as HTML carriers to push victims into downloading a passworded ZIP that contains CHM/HTA/EXE payloads. The…

orithellama's tweet image. Longer thread on how Cipher Protocol will protect you ⬇️

Recent campaigns use[d] malicious SVGs as the first step in an elaborate, multi-stage infection chain. SVGs act as HTML carriers to push victims into downloading a passworded ZIP that contains CHM/HTA/EXE payloads.

The…
orithellama's tweet image. Longer thread on how Cipher Protocol will protect you ⬇️

Recent campaigns use[d] malicious SVGs as the first step in an elaborate, multi-stage infection chain. SVGs act as HTML carriers to push victims into downloading a passworded ZIP that contains CHM/HTA/EXE payloads.

The…

Google Dorks - Cloud Storage Find exposed files 🧵

TakSec's tweet image. Google Dorks - Cloud Storage

Find exposed files 🧵

Happy #Halloween!🎃While everyone's focused on costumes and candy, we're thinking about the real monsters hiding in #CloudEnvironments. Here are the 5 scariest mistakes you should NEVER make. Watch Webinar Replay👇 cqureacademy.com/webinars/repla… #AzureSecurity #CloudMisconfigurations

CQUREAcademy's tweet image. Happy #Halloween!🎃While everyone's focused on costumes and candy, we're thinking about the real monsters hiding in #CloudEnvironments.

Here are the 5 scariest mistakes you should NEVER make.

Watch Webinar Replay👇
cqureacademy.com/webinars/repla…

#AzureSecurity #CloudMisconfigurations
CQUREAcademy's tweet image. Happy #Halloween!🎃While everyone's focused on costumes and candy, we're thinking about the real monsters hiding in #CloudEnvironments.

Here are the 5 scariest mistakes you should NEVER make.

Watch Webinar Replay👇
cqureacademy.com/webinars/repla…

#AzureSecurity #CloudMisconfigurations
CQUREAcademy's tweet image. Happy #Halloween!🎃While everyone's focused on costumes and candy, we're thinking about the real monsters hiding in #CloudEnvironments.

Here are the 5 scariest mistakes you should NEVER make.

Watch Webinar Replay👇
cqureacademy.com/webinars/repla…

#AzureSecurity #CloudMisconfigurations
CQUREAcademy's tweet image. Happy #Halloween!🎃While everyone's focused on costumes and candy, we're thinking about the real monsters hiding in #CloudEnvironments.

Here are the 5 scariest mistakes you should NEVER make.

Watch Webinar Replay👇
cqureacademy.com/webinars/repla…

#AzureSecurity #CloudMisconfigurations

BYOD and #edge devices may be causing more #security headaches for your business - buff.ly/eFBrQIV #iot #iiot #cybersecurity #edgecomputing #tech #iotsecurity

vallumsoftware's tweet image. BYOD and #edge devices may be causing more #security headaches for your business - buff.ly/eFBrQIV #iot #iiot #cybersecurity #edgecomputing #tech #iotsecurity

Loading...

Something went wrong.


Something went wrong.


United States Trends