Articles tagged with: #cloud Clear filter
Crowdstrike to Splunk on-prem

Crowdstrike to Splunk on-prem

CrowdStrike www.reddit.com

Hello colleagues, for a customer I needed to build a method to export telemetry data from Cloud to Splunk on premises. The use case here is to use 30 days retention on CS and perform long term retention on already purchased on premises Splunk. I know that we can use Falcon Data Replicator but customer does not want to use Amazon S3 or any intermediately 3rd party for storing this data. We directly want to ingest telemetry from cloud to on-prem Splunk. I see that we have Event Streams API and a...

ObCLIP: Oblivious CLoud-Device Hybrid Image Generation with Privacy Preservation

ObCLIP: Oblivious CLoud-Device Hybrid Image Generation with Privacy Preservation

cs.CR updates on arXiv.org arxiv.org

arXiv:2510.04153v1 Announce Type: new Abstract: Diffusion Models have gained significant popularity due to their remarkable capabilities in image generation, albeit at the cost of intensive computation requirement. Meanwhile, despite their widespread deployment in inference services such as Midjourney, concerns about the potential leakage of sensitive information in uploaded user prompts have arisen. Existing solutions either lack rigorous privacy guarantees or fail to strike an effective...

FHEON: A Configurable Framework for Developing Privacy-Preserving Neural Networks Using Homomorphic Encryption

FHEON: A Configurable Framework for Developing Privacy-Preserving Neural Networks Using Homomorphic Encryption

cs.CR updates on arXiv.org arxiv.org

arXiv:2510.03996v1 Announce Type: new Abstract: The widespread adoption of Machine Learning as a Service raises critical privacy and security concerns, particularly about data confidentiality and trust in both cloud providers and the machine learning models. Homomorphic Encryption (HE) has emerged as a promising solution to this problems, allowing computations on encrypted data without decryption. Despite its potential, existing approaches to integrate HE into neural networks are often limited...

Zeroday Cloud hacking contest offers $4.5 million in bounties

Zeroday Cloud hacking contest offers $4.5 million in bounties

BleepingComputer www.bleepingcomputer.com

A new hacking competition called Zeroday Cloud, focused on open-source cloud and AI tools, announced a total prize pool of $4.5 million in bug bounties for researchers that submit exploits for various targets.

5 Critical Questions For Adopting an AI Security Solution

5 Critical Questions For Adopting an AI Security Solution

The Hacker News thehackernews.com

In the era of rapidly advancing artificial intelligence (AI) and cloud technologies, organizations are increasingly implementing security measures to protect sensitive data and ensure regulatory compliance. Among these measures, AI-SPM (AI Security Posture Management) solutions have gained traction to secure AI pipelines, sensitive data assets, and the overall AI ecosystem. These solutions help

Hackers Weaponize AWS X-Ray Service to Work as Covert Command & Control Server

Hackers Weaponize AWS X-Ray Service to Work as Covert Command & Control Server

Cyber Security News cybersecuritynews.com

A sophisticated technique uncovered where threat actors abuse Amazon Web Services' X-Ray distributed tracing service to establish covert command and control (C2) communications, demonstrating how legitimate cloud infrastructure can be weaponized for malicious purposes. AWS X-Ray, designed to help developers analyze application performance through distributed tracing, has been repurposed by red team researchers into a

New Google Cybersecurity & AI upgrades coming

New Google Cybersecurity & AI upgrades coming

cybersecurity www.reddit.com

Google is rolling out a wave of significant AI and security enhancements. Here's a quick breakdown of what's new: PROACTIVE RANSOMWARE & PASSWORD SECURITY: Google is taking security automation to the next level: For Google Drive: New AI-powered ransomware protection for Workspace users will now detect suspicious activity and automatically pause file syncing. This isolates the threat and prevents infected files from spreading to the cloud, allowing for a clean restore. For Google Password...

Sponsored: Corelight on where will NDRs go next

Sponsored: Corelight on where will NDRs go next

Risky Business Media risky.biz

In this Risky Business News sponsor interview, Catalin Cimpanu talks with Ashish Malpani, Head of Product Marketing at Corelight. The discussion looks at how NDRs might evolve, such as expanding to protect inter-cloud networks and complementing EDRs.

Leaking URLs

Leaking URLs

cybersecurity www.reddit.com

Strange situation I'm looking for some advice on. We have an internal web app, that whilst hosted publicly in the cloud, has strong access controls (SSO to our IdP) and shows no signs of having been breached. However, we're seeing sporadic requests from various countries to suspiciously specific paths that shouldn't be public knowledge. These requests aren't authenticated, so they are redirected to the login screen. This means they're essentially harmless, but it's perplexing how people know...

How are we feeling about Cloud Detection and Response Tools(CDR)?

How are we feeling about Cloud Detection and Response Tools(CDR)?

cybersecurity www.reddit.com

It's hard to find any content on this emerging technology. Some of the big players include Wiz Defend, Crowdstrike, Palo Alto, Orca, etc. For those who have tried them out or even deployed these products in your environment, how has it worked out? How has your SOC benefited from it? submitted by /u/bankster24 [link] [comments]

Cyberwarfare Likely A Decisive Element In Potential Taiwan Conflict

Cyberwarfare Likely A Decisive Element In Potential Taiwan Conflict

cybersecurity www.reddit.com

In a potential hot conflict over Taiwan sovereignty, cyber operations would be at the forefront, and aimed at slowing the U.S. military response, targeting military logistics systems, cloud-based sustainment platforms, naval communications, and intelligence, surveillance, and reconnaissance systems. Story written from Dimitri Alperovitch's keynote at HOU.SEC.CON this week. submitted by /u/CybrSecHTX [link] [comments]

Top 10 Best Supply Chain Intelligence Security Companies in 2025

Top 10 Best Supply Chain Intelligence Security Companies in 2025

Cyber Security News cybersecuritynews.com

The digital world continues to face growing threats around software vulnerabilities, data breaches, and cyber supply chain attacks. As companies rely more heavily on open-source software, third-party code, and cloud-native applications, the need for supply chain intelligence security solutions has never been greater. In 2025, organizations must adopt highly reliable platforms that provide visibility, compliance,

CrowdStrike Cloud Security trigger test detection

CrowdStrike Cloud Security trigger test detection

CrowdStrike www.reddit.com

We've recently ingested AWS data into our Cloud Security Module. I want to ask if anyone know of any way to trigger a test detection in Cloud Security? I haven't found a method yet - aside from simulating an actual attack. Also, if you have any suggestions for cool queries - especially the ones you run daily - that would be great. submitted by /u/CyberHaki [link] [comments]