A broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing.

Posts

Cloudflare Launches Publicly DNS-Over-HTTPS Service

Clouldflare launches DNS-over-HTTPS service called 1.1.1.1 that it says will be a “privacy-first”…

GoScanSSH Malware Targets SSH Servers, But Avoids Military and .GOV Systems

Researchers identify a new malware family called GoScanSSH that avoids servers linked to…

Orbitz Warns 880,000 Payment Cards Suspected Stolen

Orbitz said Tuesday a breach of both its consumer and partner platform…

Cryptomining Gold Rush: One Gang Rakes In $7M Over 6 Months

Report outlines lucrative rise of nefarious cyrptoming groups and their complex new business…

In Wake of ‘Biggest-Ever’ DDoS Attack, Experts Say Brace For More

This week’s DDoS attack against GitHub is a harbinger of attacks to come…

Bug in HP Remote Management Tool Leaves Servers Open to Attack

Firmware versions of HPE’s remote management hardware iLO3 have an unauthenticated remote denial…

Cryptojacking Attack Found on Los Angeles Times Website

A security researcher found Coinhive code hidden on a Los Angeles Times’ webpage…