โŒ

Normal view

There are new articles available, click to refresh the page.
Yesterday โ€” 5 December 2025Main stream

Project View: A New Era of Prioritized and Actionable Cloud Security

3 December 2025 at 19:00
In today's cloud-first world, security teams face an overwhelming flood of alerts, fragmented visibility, and reactive workflows. The complexity of modern cloud environmentsโ€”spanning multi-cloud deployments, ephemeral assets, and decentralized ownershipโ€”demands a new approach to risk management.

Before yesterdayMain stream

A Cascade of Insecure Architectures: Axis Plugin Design Flaw Expose Select Autodesk Revit Users to Supply Chain Risk

7 October 2025 at 20:00
We discovered Azure Storage Account credentials exposed in Axis Communicationsโ€™ Autodesk Revit plugin, allowing unauthorized modification of cloud-hosted files. This exposure, combined with vulnerabilities in Autodesk Revit, could enable supply-chain attacks targeting end users.

CISA's NIMBUS 2000 Initiative: Understanding Key Findings and Strengthening Cloud Identity Security

This blog explores key findings from CISAโ€™s NIMBUS 2000 Cloud Identity Security Technical Exchange and how Trend Vision Oneโ„ข Cloud Security aligns with these priorities. It highlights critical challenges in token validation, secrets management, and logging visibilityโ€”offering insights into how integrated security solutions can help organizations strengthen their cloud identity defenses and meet evolving federal standards.

Why Trend Micro Continues to be Named a CNAPP Leader

26 June 2025 at 20:00
Trend Micro is recognized for our Cloud CNAPP capabilities and product strategyโ€”affirming our vision to deliver a cloud security solution that predicts, protects, and responds to threats across hybrid and multi-cloud environments.

An Investigation of AWS Credential Exposure via Overprivileged Containers

18 June 2025 at 20:00
Overprivileged or misconfigured containers in Amazon EKS can expose sensitive AWS credentials to threats like packet sniffing and API spoofing, highlighting the need for least privilege and proactive security to detect and reduce these risks.

โŒ
โŒ