6 links tagged with all of: cloud-security + vulnerability
Click any tag below to further narrow down your results
Links
Upwind offers a cloud security platform that enhances visibility and threat detection for cloud deployments and applications. It focuses on real-time monitoring and inside-out security, allowing organizations to prioritize vulnerabilities and streamline compliance efficiently.
This article dives into Attack Surface Management (ASM), explaining how organizations often overlook numerous potential entry points that attackers could exploit. It emphasizes the importance of continuous monitoring and discovery of assets, including forgotten domains, cloud infrastructures, and third-party services. The author shares personal experiences from the bug bounty scene to highlight common vulnerabilities and the need for better ASM practices.
This article details the GatewayToHeaven vulnerability in Google Cloud's Apigee, allowing attackers to access cross-tenant logs and data. It explains how to exploit Apigee's architecture to escalate privileges and potentially impersonate users by retrieving sensitive data.
This article outlines Tenable's cloud security platform, which offers tools for managing risks across multi-cloud and hybrid environments. It covers features like cloud workload protection, identity management, and data security, aimed at helping organizations identify and mitigate vulnerabilities effectively.
Google has addressed a privilege escalation vulnerability in Cloud Composer 2, which could have allowed attackers with edit permissions to exploit the default Cloud Build service account. The fix, implemented in December 2024, ensures that environments use their service accounts for package installations, thereby enhancing security. No evidence of exploitation has been reported.
Effective vulnerability remediation involves identifying, prioritizing, and addressing security weaknesses in systems and applications, particularly within cloud environments. A strategic approach, including continuous monitoring and a combination of automated and manual methods, is essential in managing the overwhelming volume of vulnerabilities while mitigating risks and ensuring compliance.