Skip to content
Threat Digest
Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware
Nation-State Threats Security Tools Compliance & Policy Cloud Security Threat Intelligence

#cloud-security

Diagram showing interconnected IT zones with an arrow indicating faster threat movement
Threat Intelligence

Beyond the Endpoint: Are We Safe?

Threat actors are now exfiltrating data at speeds that should make CISOs sweat. The old way of looking at just endpoints is dead.

4 min read 3 weeks ago
A stylized graphic depicting a broken lock with the Linux penguin character looking concerned, surrounded by code snippets.
Vulnerabilities & CVEs

Linux Root Exploit: Millions of Cloud Servers at Risk [CVE-2026-31431]

A nasty bug in the Linux kernel's crypto subsystem is letting unprivileged users become root. Millions of cloud servers are exposed.

5 min read 3 weeks ago
A digital padlock superimposed over a code repository interface, symbolizing security vulnerabilities.
Vulnerabilities & CVEs

GitHub Exploit: Your Code's New Security Nightmare?

Forget complex hacks; a single 'git push' might now be all it takes to compromise your GitHub repositories. This vulnerability is a stark reminder that even the most foundational tools can harbor hidden dangers.

5 min read 3 weeks, 3 days ago
Stylized illustration of an overflowing inbox with digital debris, representing overwhelming email volume.
Threat Intelligence

Snow Job: How UNC6692 uses Email Floods and Fake IT Support to Plant Its 'Snow' Malware

Remember when we thought email phishing was the peak of sophisticated social engineering? Think again. UNC6692 just rewrote the playbook, proving the old tricks, when combined with a relentless barrage, can still make for a nasty surprise.

6 min read 3 weeks, 4 days ago
☁️
Cloud Security

23% of Orgs Lack Cloud Visibility: VM Sprawl a Major Risk

Organizations are drowning in virtual machines, and most don't even know it. This unchecked growth, dubbed 'VM sprawl,' is creating massive security blind spots, leaving companies exposed to sophisticated attacks.

7 min read 1 month, 1 week ago
A stylized padlock with data flowing out of it into a cloud icon, representing data exfiltration.
Ransomware & Malware

Ransomware's New Trick: Stealing Data with Your Own Tools

Forget the shadowy FTP servers. The latest wave of ransomware is quietly using your company's own cloud tools to siphon off sensitive data. This isn't just sloppy; it's strategically terrifying.

6 min read 1 month, 1 week ago
Stylized image of a cracked Salesforce logo with data streams flowing out.
Cloud Security

Salesforce AuraInspector Attacks: Data Theft Shocker

Forget zero-days. The latest Salesforce data theft wave isn't about a crack in the code, but a gaping hole in configuration. Attackers are using a familiar tool, twisted for malicious purposes, to pilfer your precious customer lists.

5 min read 1 month, 1 week ago
Rapid7 BSI C5 Type 2 attestation certificate for Command Platform
Cloud Security

Rapid7's BSI C5 Badge: Proof or Just German Red Tape?

Compliance badges litter vendor sites like cheap trophies. Rapid7's fresh BSI C5 Type 2 for DACH cloud ops sounds legit—until you ask if it stops real hackers.

4 min read 1 month, 1 week ago
Chaos malware infiltrating a misconfigured cloud server with SOCKS proxy chains
Ransomware & Malware

Chaos Botnet Goes After Cloud Goofs, Slaps on a SOCKS Proxy for Extra Sneakiness

Everyone figured Chaos stuck to routers and edges. Wrong. This variant's prowling misconfigured clouds, proxying traffic to hide the real crooks. Buckle up.

5 min read 1 month, 1 week ago
☁️
Cloud Security

Microsoft's Government Cloud: Approved Despite 'Pile of Shit' Security Docs

Federal reviewers called Microsoft's cloud security docs a 'pile of shit' — yet it got the green light anyway. What's really protecting our nation's data?

5 min read 1 month, 1 week ago
Diagram of TeamPCP supply chain attack infiltrating CI/CD pipelines via PyPI and GitHub
Nation-State Threats

TeamPCP's Ruthless Hijack of Security Scanners: 500K Machines, 300GB Stolen

Attackers slipped infostealers into GitHub Actions and PyPI, turning vulnerability scanners against their users. Over 500,000 machines lost cloud tokens, SSH keys, and Kubernetes secrets in this escalating nightmare.

5 min read 1 month, 2 weeks ago
Cloud Security Best Practices for AWS, Azure, and Google Cloud
Cloud Security

Cloud Security Best Practices for AWS, Azure, and Google Cloud

Cloud security requires a different mindset than traditional infrastructure. This guide covers the essential practices for securing workloads across AWS, Azure, and Google Cloud.

6 min read 2 months, 1 week ago
← Newer Page 2 of 2

Categories

Explainers Data Breaches Vulnerabilities & CVEs Ransomware & Malware Nation-State Threats Security Tools Compliance & Policy Cloud Security
Threat Digest

Threat intelligence. Zero noise.

More

  • RSS Feed
  • Sitemap
  • About
  • Editorial Process
  • Advertise

Legal

  • Privacy
  • Terms
  • Work With Us

Our Network

The AI Catchup AI & Machine Learning Threat Digest Cybersecurity Legal AI Beat Legal Tech Fintech Rundown Finance & Banking DevTools Feed Developer Tools Open Source Beat Open Source Fintech Dose Crypto & DeFi Chip Beat Semiconductors AdTech Beat Ad Technology Supply Chain Beat Logistics

© 2026 Threat Digest. All rights reserved.

🏠Home 🔍Search 🔖Saved 📂Categories
Privacy & cookies

We use a privacy-respecting analytics tool to count page views — no personal profiles, no ad tracking, no third-party cookies. Accept to help us understand which stories matter to readers.

Details