Next generation of phishing attacks uses unexpected delivery methods to steal data

A man fishing at a lake.

Netskope, a specialist in secure access service edge (SASE), has unveiled new research that shows how the prevalence of cloud applications is changing the way threat actors are using phishing attack delivery methods to steal data. 

The Netskope Cloud and Threat Report: Phishing details trends in phishing delivery methods such as fake login pages and fake third-party cloud applications designed to mimic legitimate apps, the targets of phishing attacks, where the fraudulent content...

Benten Technologies: A secure, passwordless future

A padlock and bank cards on a keyboard.

A Benten Technologies spokesperson explains how the company's patented technology is solving critical user identity verification problems.

For anyone who doesn't know about Benten Technologies, what type of product and service do you offer?

We offer a patented smartphone-based authentication and authorisation service. Integration with our system is through well-defined APIs. 

Using our service, through the click of a button, our clients can have passwordless...

BankID expands Digital Identity Protection with OneSpan

Who are you? written in Scrabble tiles.

OneSpan, a digital agreements security company, has expanded its OneSpan Cloud Authentication service with BankID.

BankID first launched with OneSpan in September 2021 and has already reached a multi-million user milestone that is expected to continue growing as BankID’s technology adoption increases. This expanded partnership further solidifies the crucial role BankID has entrusted to OneSpan to provide high-assurance security and meet compliance standards within the Norwegian...

EU body to investigate public sector usage of cloud services

Europe

The EU’s privacy watchdog, the European Data Protection Board (EDPB), has launched joint investigations with 22 national regulators into public sector usage of cloud services.

More than 80 public bodies from across the European Economic Area (EEA) will be investigated, covering sectors from health and education to tax and finance, to ensure compliance with privacy safeguards.

Plans to target public sector cloud services were announced last October, but 15 February...

Alibaba’s cloud arm facing US national security probe

Chinese Flag

Alibaba’s cloud wing is being reviewed by the Biden administration to determine if it poses a risk to US national security, according to Reuters.

The probe is investigating how the company stores US client data, including personal information and intellectual property, and whether the Chinese government could gain access to it.

Concerns also centre around whether Beijing could disrupt access to information stored on Alibaba’s cloud.

Alibaba’s operations...

Kronos Cloud hit by ransomware attack and warns of data breach

Security Breach

Kronos Private Cloud, a HR management platform, has suffered a ransomware attack which puts many of its high-profile customers’ data at risk.

Ultimate Kronos Group (UKG), Kronos’ parent company, said the attack will bring down the service for “several weeks” and advised customers to “evaluate and implement alternative business continuity protocols related to the affected UKG solutions”.

UKG became aware of the attack late on Saturday, December 11, due to...

Amazon shuts down cloud infrastructure linked to NSO Group

CCTV Surveillance Camera

Amazon Web Services (AWS) has shut down infrastructure and accounts connected to Israeli surveillance vendor NSO Group.

The decision follows an investigation held by a consortium of media organisations into the firm’s ‘Pegasus’ spyware.

The investigation found that NSO’s military-grade spyware was involved in at least 37 successful hacks of smartphones belonging to journalists, government officials, and human rights activists around the world.

NSO Group...

Cloud account compromises costs organisations £4.5m annually

An open padlock.

The average cost of cloud account compromises reached $6.2 million (£4.5m) over a 12-month period according to more than 600 IT and IT security professionals in the US.

This finding is the most revealing of many from a new report on ‘The Cost of Cloud Compromise and Shadow IT’ released by Proofpoint, a cybersecurity and compliance company, and the Ponemon Institute, an IT security research organisation.

Of the respondents, 68% believe cloud account takeovers present...

Human rights activists urge Google to halt cloud computing work in Saudi Arabia

View over Mecca, Saudi Arabia.

Human rights groups and activists have called on Google to halt plans to establish a Cloud Region in Saudi Arabia until the company can publicly demonstrate how it will mitigate risks to human rights.

In December 2020, Google announced an agreement with Saudi Aramco to set up a Google Cloud region in Saudi Arabia and offer Enterprise Cloud services there “with a particular focus on businesses in the Kingdom”. The Google Cloud Platform is one of the largest data storage and...

Why you should look at a global footprint for your cloud: A 10-point guide

With the increased awareness around cloud solutions, most organisations immediately think about reducing cost and shortening time-to-market. As more ideas around cloud are discussed, other criteria like performance, security, compliance, workload segmentation, and how to integrate the cloud become more relevant to an existing environment. The profile of a global cloud footprint; however, is an equally important consideration. 

It may be time to think about why having a...