#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News

Cloud Security | Breaking Cybersecurity News | The Hacker News

Category — Cloud Security
Why Security Leaders Are Layering Email Defense on Top of Secure Email Gateways

Why Security Leaders Are Layering Email Defense on Top of Secure Email Gateways

Apr 13, 2026
For security leaders, the inbox remains the front door for attackers. Here's why the smartest teams are adding adaptive, AI-driven protection to their cloud email security, not replacing them. Email is still the number-one attack vector for enterprises, and it is not even close. The FBI's Internet Crime Complaint Center reported that business email compromise alone generated $3 billion in losses in 2024 , with AI-enabled attacks accelerating the trend ( FBI IC3 Report ). The attacks that succeed today don't carry obvious malicious payloads. They rely on trust, tone, and timing; a spoofed vendor sending a "routine" invoice update, or a convincing impersonation of a CEO with an urgent request. No malware. No suspicious links. Just words, carefully chosen. Microsoft 365 is the backbone of productivity for most organizations, and Microsoft Defender and Exchange Online Protection do solid work catching known spam, malware, and co...
Session Cookie Theft: You Showed Your ID at the Door. But Someone Else Has Your Room Key

Session Cookie Theft: You Showed Your ID at the Door. But Someone Else Has Your Room Key

Apr 13, 2026
How session cookie theft bypasses MFA — and what you can do about it When you check into a hotel, you show your ID at the front desk. The clerk verifies who you are, maybe checks a secondary piece of information, and hands you a key card. From that point on, that key card is what gets you into your room. It doesn't matter that you proved your identity at check-in. What matters is who has the key. Your applications work the same way. When a user logs into a web application — entering their password, completing an MFA challenge — the application issues them a session token, typically stored as a cookie in their browser. That token is their key card. Every subsequent request the user makes, the application checks for the token, not the credentials. If the token is valid, access is granted. And if someone steals that token? They get in, too. No username required. No password required. No MFA prompt. They simply ...
Wazuh for Proactive Vulnerability Management

Wazuh for Proactive Vulnerability Management

Mar 31, 2026
Vulnerability management is the continuous process of identifying, assessing, prioritizing, and addressing security weaknesses across systems, applications, and infrastructure. It extends beyond periodic scanning; it includes validating findings, understanding exposure in real-world environments, and tracking remediation over time. Effective vulnerability management combines asset visibility, vulnerability intelligence, and operational context to determine which flaws present actual risk rather than theoretical exposure. Modern IT environments further complicate the process of vulnerability management. Hybrid IT infrastructure, third-party dependencies, and internet-facing services increase the attack surface while generating large volumes of vulnerability data. Security teams must balance operational constraints, such as out-of-support legacy systems and uptime requirements, with the need to quickly reduce exposure. As a result, vulnerability management is no longer limited to coun...
Why Institutions of Higher Education Face Unique Identity Security and Management Risk

Why Institutions of Higher Education Face Unique Identity Security and Management Risk

Mar 23, 2026
Higher education institutions operate some of the most complex identity environments of any industry. Universities often struggle to balance open access for learning and research with strong security controls to protect students, faculty, and sensitive institutional data. This contrast creates unique identity security and management challenges that require specialized strategies and tools. A Highly Complex Identity Ecosystem Unlike corporate businesses, the ecosystem that is common at universities requires them to manage a variable and highly diverse population of users. Churn is a constant challenge, with students, faculty, alumni, researchers, contractors, and affiliate colleges and labs, and other contributors enrolling, changing roles or status, tracks or departments, and leaving frequently.  This dynamic ecosystem results in an identity lifecycle that is far more fluid than most corporate environments. "Joiners", or new identities, are created continuously, while "movers a...
The Curated Catalog: The Biggest Defense Against Shai-Hulud 3.0

The Curated Catalog: The Biggest Defense Against Shai-Hulud 3.0

Mar 17, 2026
When Shai-Hulud 2.0 hit in late 2025, it was a brutal, expensive wake-up call for DevSecOps teams. It showed that the industry's direction of shifting left, where teams pass security onto developers, wasn't the silver bullet everyone hoped for. Pushing that responsibility was fine in theory, but it crumbled quickly because the foundation it was built on was inherently flimsy. As we move further into 2026, we need a more definitive fix to the structural weakness in the pipelines in light of a potential Shai-Hulud 3.0. A major lesson from 2.0 was that internal CI/CD runners were easily hijacked and turned into attack botnets. Teams need to take that finding and come back with a truly proactive defense. A curated catalog is a way for security teams to control exactly what code and components enter their environment, while still giving engineering teams a fast, secure way to build - it is the key to creating a sustainable solution. More on a curated catalog later. The Anatomy o...
The Firewall Isn't Blind — It Just Needs to See Inside the Session

The Firewall Isn't Blind — It Just Needs to See Inside the Session

Mar 16, 2026 Network Security / Enterprise Security
For decades, the firewall was the most trusted enforcement point in enterprise security. Every packet crossed it. Every policy lived on it. If you wanted to secure the network, you started there. Then work moved somewhere the firewall couldn't follow. Today, the average enterprise employee spends most of their day inside a browser — navigating SaaS applications, collaborating in cloud platforms, running queries through AI tools, and sharing files through web interfaces. All of it travels over HTTPS. All of it looks identical at the network layer: port 443, encrypted, and opaque. The firewall sees a connection. It doesn't see a ChatGPT prompt containing customer PII. It doesn't see a browser extension silently harvesting credentials. It doesn't see the SaaS file-sharing that just moved sensitive data outside the organization's control. This is the visibility gap that defines enterprise security in 2026. SSE Was the Right Answer — Deployed the Wrong Way Securi...
Why CVSS Scores Don't Tell the Real Story of Risk

Why CVSS Scores Don't Tell the Real Story of Risk

Mar 09, 2026
In most security operations centers, CVSS quietly dictates remediation priorities. Dashboards are sorted by severity. "Critical" vulnerabilities float to the top. Quarterly summaries celebrate how many 9.0+ findings were closed. On paper, it looks rational. In practice, it's often wrong. CVSS was designed to standardize how vulnerabilities are scored. Its origins and main purpose have been to measure technical severity, including exploit complexity, required privileges, impact on confidentiality, integrity, and availability. It provides a shared language. But where it has perpetually struggled is measuring context within, like whether the asset is internet-facing, how critical it is to the business, and whether attackers are actively exploiting the vulnerability. And context is where real risk lives. How Abstract Scores Turn Vulnerability Management Into "Severity Theater" A vulnerability scored 9.8 in a non-production environment with no external access may demand immediate atten...
AI SOC Investigation Has Moved Beyond Triage: Two Cases That Show Where It Actually Matters

AI SOC Investigation Has Moved Beyond Triage: Two Cases That Show Where It Actually Matters

Mar 02, 2026 Artificial Intelligence / Threat Detection
The conversation around AI in the SOC has mostly centered on efficiency: closing alerts faster, reducing queue backlog, and automating repetitive work that burns out L1 analysts. That framing is directionally right, and it matters because analyst fatigue is real. For teams dealing with high alert volume, analysts are often asked to make good decisions under a fragmented context and time pressure. But that framing is still incomplete. The bigger shift is not just workflow automation or orchestration of predefined playbooks. It is AI's ability to perform contextual, hypothesis-driven investigation across multiple telemetry sources, work that has traditionally depended on experienced L2 or L3 analysts and limited human time. When that capability can be applied consistently across every alert, it changes the operating model, not just the speed of the existing one. Two recent investigations at Prophet Security make that real. In both cases, the attacks were not obvious from signature-bas...
Demystifying Key Exchange: From Classical Elliptic Curve Cryptography to a Post-Quantum Future

Demystifying Key Exchange: From Classical Elliptic Curve Cryptography to a Post-Quantum Future

Mar 02, 2026
In the digital world, the secure exchange of cryptographic keys is the foundation upon which all private communication is built. It's the initial, critical handshake that allows two parties, like a user's browser and a web server, to establish a shared secret and communicate securely over the untrusted expanse of the internet. As the quantum computing era approaches, the very mathematics underpinning our traditional key exchange mechanisms are facing an existential threat. This spurred the development of new, quantum-resistant algorithms. This blog post provides a deep dive into how modern key exchange works, from the trusted classical methods to the emerging post-quantum standards, and explores how Zscaler leverages hybrid key exchange to bridge the gap. The Key Components of Modern Key Exchange At a high level, a secure key exchange protocol must achieve the following: Confidentiality: The established key must be a secret shared only between the two communicating parties. An ea...
Cybersecurity Resources