#1 Trusted Cybersecurity News Platform
Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News

Cloud Security | Breaking Cybersecurity News | The Hacker News

Category — Cloud Security
The New Frontier of Security Risk: AI-Generated Credentials

The New Frontier of Security Risk: AI-Generated Credentials

Apr 07, 2025
AI-Powered Development is Creating a Non-Human Identity Crisis: Here's What CISOs Need to Know in 2025 While coding assistants like GitHub Copilot have revolutionized developer productivity, they've simultaneously created an explosion of machine identities that are overwhelming traditional security approaches. Between 2023 and 2024 alone, the number of repositories using Copilot increased by 27%, confirming that developers are increasingly relying on AI tools to enhance their productivity. This acceleration shows no signs of slowing in 2025, as GitHub now offers Copilot as part of its free offering, further lowering barriers to adoption. However, this AI revolution comes with significant security implications. According to GitGuardian's State of Secrets Sprawl 2025 , repositories where Copilot is active exhibit a 40% higher incidence of secret leaks compared to the average public repository. This alarming statistic reveals that as AI accelerates development, it's s...
Supercharging Security & Compliance with AI Copilots

Supercharging Security & Compliance with AI Copilots

Apr 07, 2025
Security and compliance professionals are no strangers to complexity. From staying ahead of ever-evolving threat landscapes to navigating an expanding web of regulatory requirements, the day-to-day demands often feel like a game of whack-a-mole. Enter AI copilots—powerful tools that, when used thoughtfully, can dramatically streamline operations and supercharge your security and compliance programs. While much of the hype around AI focuses on futuristic capabilities, the real magic today lies in using these tools to augment existing workflows. Think of copilots not as replacements for security teams, but as force multipliers—always-on assistants that help reduce toil, improve consistency, and enable teams to focus on higher-value initiatives. AI Copilots in Action: Security & Compliance Use Cases AI copilots are no longer just experimental toys. Here are a few ways forward-thinking security teams are using generative AI tools—like OpenAI's custom GPTs and Google's Gemini Gems...
Why Now is the Time to Adopt a Threat-Led Approach to Vulnerability Management

Why Now is the Time to Adopt a Threat-Led Approach to Vulnerability Management

Mar 03, 2025
What is Threat-Led Vulnerability Management? Threat-Led Vulnerability Management (TLVM) is a security approach that focuses on prioritizing and managing vulnerabilities based on the current threat landscape and the specific risks posed to an organization. Rather than treating all vulnerabilities equally, TLVM emphasizes understanding which vulnerabilities are most likely to be exploited by malicious actors, correlated with the configuration state and security posture of the organization's unique infrastructure and business processes. Why Now? The notion of adopting a Threat-Led Vulnerability Management (TLVM) approach has grown in popularity, particularly in the face of the escalating volume and sophistication of cyber threats, which are increasingly frequent and offer a lower cost attack alternative when supported by AI tools. The dynamic nature of the threat landscape requires organizations to stay agile in their vulnerability management processes, prioritizing efforts based on ...
How Hackers Exploit Your Attack Surface (And How to Protect Yourself)

How Hackers Exploit Your Attack Surface (And How to Protect Yourself)

Feb 17, 2025
Hackers are constantly scanning your network, often spotting vulnerabilities before you do. They're looking for misconfigurations, exposed assets, and weak points that could lead to a breach—are you seeing what they see? Every activity or interaction that your organization does online – website, social media accounts, cloud services, third-party integrations, and more – contributes to its digital footprint. This digital footprint is information attackers use to find your weaknesses and attempt to exploit them.  What if you could anticipate how hackers plan to exploit your vulnerabilities before they strike? Imagine identifying the weaknesses most enticing to an attacker—before they become exploited. Attack Surface Management (ASM) solutions help organizations continuously identify, monitor and manage aspects of public-facing IT assets, including those that may be forgotten. ASM is the tool in the battle of visibility – either you see your weaknesses first, or attackers will show ...
Solving Identity Challenges with an Extensible CIAM Solution

Solving Identity Challenges with an Extensible CIAM Solution

Feb 10, 2025
Across industries, businesses are focused on achieving key objectives such as: Driving sustainable revenue growth Reducing costs and improving efficiency Strengthening security and ensuring compliance Customer Identity and Access Management (CIAM) is central to these goals. A robust CIAM solution doesn't just enable seamless user authentication and access—it unifies identity across an organization's digital ecosystem. This ensures that customers can engage consistently across all channels while enabling sales, marketing, and support teams to leverage a single, authoritative view of each user. Moreover, outsourcing Customer Identity to an extensible CIAM platform enhances agility, freeing developers to focus on core applications. This results in faster development cycles, improved user experiences, and quicker time-to-market. From a security perspective, CIAM is critical for protecting user data, preventing identity-based threats, and meeting regulatory requirements. However, t...
Zero Trust Security, Why It's Essential In Today's Threat Landscape

Zero Trust Security, Why It's Essential In Today's Threat Landscape

Jan 16, 2025
Coined in 2010 by Forrester Research , the term "zero trust" has long been hijacked by security vendors eager to take advantage of the hype that surrounds the concept. Today, it's so overused and misused that many see it as a meaningless buzzword—but that's far from the truth. In fact, its widespread misappropriation demonstrates the power of zero trust security. Why else would countless vendors try to capitalize on it? As they say, imitation is the sincerest form of flattery. Zero trust is not a mere label. Rather, zero trust is an architecture—though you'll also hear of a zero trust methodology, framework, paradigm, and infrastructure—and it's based on the idea of zero implicit trust, meaning no one should be trusted by default. The key zero trust principle of least-privileged access says a user should be given access only to a specific IT resource the user is authorized to access, at the moment that user needs it, and nothing more. Hence the zero trust maxim,...
5 Strategies to Combat Ransomware and Ensure Data Security in Microsoft 365

5 Strategies to Combat Ransomware and Ensure Data Security in Microsoft 365

Dec 02, 2024
As data breaches and cyber threats become the norm rather than the exception, the imperative to fortify cybersecurity measures has become critical. Microsoft 365, the leading enterprise productivity platform, is at the heart of many organizations' daily operations — and therefore is a prime target for cyber-attackers. Ransomware remains one of the most aggressive cyber threats to organizations. A reported 76% of businesses have experienced at least one attack within the last year , the results of which yielded disrupted operations, substantial financial losses, and reputational damage. For SaaS platforms like Microsoft 365, the threat is even more pronounced due to the vast amounts of sensitive data processed and stored daily.  Below, we will investigate the cybersecurity landscape surrounding Microsoft 365. As we do so, we will examine the prevalence of ransomware threats and identify many commonly implemented and robust strategies that are proven to enhance cyber resilience an...
Breathing New Life into a Stagnant AppSec

Breathing New Life into a Stagnant AppSec

Nov 14, 2024
If you're like most people, your inbox overflows daily with a mix of important messages, random ads, and updates you didn't ask for. It's easy to miss what really matters. This inbox-overload mirrors what's happening in AppSec: security teams are overwhelmed with endless alerts and notifications, with only a handful pointing to actual risks. And while infrastructure and development environments have evolved radically in the past decade, AppSec tools haven't kept pace. The result? Outdated tools that can't sift out the noise, leaving teams struggling to focus on real threats amid a flood of alerts. As CEO of Backslash Security , I frequently hear from AppSec professionals who feel like they're stuck in reactive mode, juggling outdated tools that weren't designed for today's complex, cloud-native environments. These tools flood them with alerts, stretching their focus between routine notifications and the critical issues that could genuinely impact their applications. A few years ...
How Does Threat Intelligence Apply to SaaS Security? And Why You Should Care

How Does Threat Intelligence Apply to SaaS Security? And Why You Should Care

Sept 16, 2024
In just a few clicks, any SaaS app can turn into a company's go-to system for collaboration, record keeping, CRM, workflow organization, marketing, human resource management, and more. These apps can also act as footholds from which threat actors can pivot into corporate environments and steal critical data.  The rapid adoption of SaaS apps is outpacing the implementation of necessary security measures. The rise in attacks—such as account takeovers and credential leaks—highlights this gap. On the users' end, the responsibilities include taking a security-first approach to account configuration i.e., continuously monitoring for access risks and emerging threats to their data. But with so many users, so many apps and so much data, it's easier said than done.  What leaves companies exposed to data breaches and leaks is the lack of clarity, context, and prompt action. Security teams must make a massive effort to research threats, filter the relevant ones, assess the impact of p...
Cybersecurity Resources