#cloud — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #cloud, aggregated by home.social.
-
Yes! It’s time to party!! It was an honor to participate at the OWASP Virtual Conference commemorating the 25th anniversary. Here is the video: youtu.be/KmjUM0EF_24?... #OWASP25thAnniversary #OWASP #AppSec #security #threatmodeling #games #agile #lean #llm #agentic #devops #cloud #fromtend
OWASP Cornucopia - Stop Lectur... -
-
I attended the AITP Chicago Security SIG tonight at RSM and left with one clear takeaway: a $200 device called Flipper Zero can clone your building access badge and bypass the physical security your organization worked so hard to set up. FBI Chicago Intelligence Analysts and an InfraGard board member explained how these devices work and where organizations are vulnerable. The room was full of security professionals, many of whom had that familiar look, realizing a threat they thought was unlikely is actually much closer to home.
Here are a few key points from tonight:
・ You can buy Flipper Zero on Amazon, and teenagers are posting demo videos on YouTube. If your physical security plan assumes attackers need special equipment, that assumption is no longer true.
・ Most enterprise security programs barely address RF-based attacks on access control systems. We invest heavily in endpoint protection and network monitoring, but the badge reader by the server room often gets overlooked.
・ Mitigation is practical. Encrypted credentials and multi-factor physical access are real solutions. Most organizations just haven’t made them a priority because the threat seemed remote.If you’re a CISO or CIO and haven’t reviewed your physical access controls for RF-based attacks, now is a good time to add it to your to-do list.
Thank you to AITP Chicago, the FBI, InfraGard, and RSM for a great discussion.https://aitpchicago.com/event-6680905
#Cybersecurity #PhysicalSecurity #InfraGard #security #privacy #cloud #infosec #flipper0 -
https://www.europesays.com/ie/485147/ A European central bank has signed a mega deal with a cloud service provider. The problem for Google, Microsoft and Amazon? It’s not with them #Amazon #Business #Cloud #Éire #EuropeanParliament #Google #IE #Ireland #LetterFromLondon #londonarticles #Microsoft
-
Imagens do Microsoft Xbox Elite 3 revelam botões inéditos e modo para cloud gaming
🔗 https://tugatech.com.pt/t83578-imagens-do-microsoft-xbox-elite-3-revelam-botoes-ineditos-e-modo-para-cloud-gaming -
🔐 Le chiffrement ne suffit pas à protéger des lois extraterritoriales comme le Cloud Act.
Devant les députés, Vincent Strubel, directeur de l’ANSSI, a aussi rappelé les risques de dépendance technologique et de coupure de services liés aux géants américains du numérique.
#SouverainetéNumérique #CloudAct #Cybersécurité #ANSSI #Cloud #GAFAM
-
The big security conferences have their place. You get the keynotes, the vendor expo, and the sponsored happy hours. What you don't always get is a straight conversation with someone who actually broke something recently and wants to talk about it.
That's why I'm going to BSides312 this weekend.
Saturday, May 16th, at the Irish American Heritage Center in Chicago. Two talk tracks, 15 speakers, a CTF, a lockpicking village, and an after-party. Community-run, non-profit, built for practitioners by practitioners.
If you're in Chicago and work in security, this is where you should be this weekend. Come find me.
#BSides312 #Cybersecurity #InfoSec #Chicago #security #privacy #cloud #312 @bsides312 @[email protected]
-
Disclosing new PebbleDash-based tools
Kaspersky researchers conducted an in-depth analysis of Kimsuky APT activity, revealing tactical shifts and new malware variants based on the PebbleDash platform. The group introduced HelloDoor, a Rust-based backdoor, httpMalice leveraging HTTP and Dropbox communications, and updated MemLoad and httpTroy variants. Kimsuky maintains persistence through legitimate tools including VSCode Tunneling with GitHub authentication and DWAgent remote management software. Initial access occurs via spear-phishing with malicious attachments disguised as documents. The group primarily targets South Korean entities across government and defense sectors, with additional PebbleDash attacks observed in Brazil and Germany. Infrastructure relies on free South Korean hosting services and tunneling services like Cloudflare Quick Tunnels and Ngrok. Both PebbleDash and AppleSeed malware clusters demonstrate ongoing development with shared distribution methods, stolen certificates, and overlapping targets, indicating single-actor c...
Pulse ID: 6a05af0979e3cc1214a50d4e
Pulse Link: https://otx.alienvault.com/pulse/6a05af0979e3cc1214a50d4e
Pulse Author: AlienVault
Created: 2026-05-14 11:16:25Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#AppleSeed #BackDoor #Brazil #Cloud #CyberSecurity #Dropbox #Germany #GitHub #Government #HTTP #InfoSec #Kaspersky #Kimsuky #Korea #Malware #OTX #OpenThreatExchange #Phishing #RAT #Rust #SouthKorea #SpearPhishing #UK #bot #AlienVault
-
Disclosing new PebbleDash-based tools
Kaspersky researchers conducted an in-depth analysis of Kimsuky APT activity, revealing tactical shifts and new malware variants based on the PebbleDash platform. The group introduced HelloDoor, a Rust-based backdoor, httpMalice leveraging HTTP and Dropbox communications, and updated MemLoad and httpTroy variants. Kimsuky maintains persistence through legitimate tools including VSCode Tunneling with GitHub authentication and DWAgent remote management software. Initial access occurs via spear-phishing with malicious attachments disguised as documents. The group primarily targets South Korean entities across government and defense sectors, with additional PebbleDash attacks observed in Brazil and Germany. Infrastructure relies on free South Korean hosting services and tunneling services like Cloudflare Quick Tunnels and Ngrok. Both PebbleDash and AppleSeed malware clusters demonstrate ongoing development with shared distribution methods, stolen certificates, and overlapping targets, indicating single-actor c...
Pulse ID: 6a05af0979e3cc1214a50d4e
Pulse Link: https://otx.alienvault.com/pulse/6a05af0979e3cc1214a50d4e
Pulse Author: AlienVault
Created: 2026-05-14 11:16:25Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#AppleSeed #BackDoor #Brazil #Cloud #CyberSecurity #Dropbox #Germany #GitHub #Government #HTTP #InfoSec #Kaspersky #Kimsuky #Korea #Malware #OTX #OpenThreatExchange #Phishing #RAT #Rust #SouthKorea #SpearPhishing #UK #bot #AlienVault
-
Disclosing new PebbleDash-based tools
Kaspersky researchers conducted an in-depth analysis of Kimsuky APT activity, revealing tactical shifts and new malware variants based on the PebbleDash platform. The group introduced HelloDoor, a Rust-based backdoor, httpMalice leveraging HTTP and Dropbox communications, and updated MemLoad and httpTroy variants. Kimsuky maintains persistence through legitimate tools including VSCode Tunneling with GitHub authentication and DWAgent remote management software. Initial access occurs via spear-phishing with malicious attachments disguised as documents. The group primarily targets South Korean entities across government and defense sectors, with additional PebbleDash attacks observed in Brazil and Germany. Infrastructure relies on free South Korean hosting services and tunneling services like Cloudflare Quick Tunnels and Ngrok. Both PebbleDash and AppleSeed malware clusters demonstrate ongoing development with shared distribution methods, stolen certificates, and overlapping targets, indicating single-actor c...
Pulse ID: 6a05af0979e3cc1214a50d4e
Pulse Link: https://otx.alienvault.com/pulse/6a05af0979e3cc1214a50d4e
Pulse Author: AlienVault
Created: 2026-05-14 11:16:25Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#AppleSeed #BackDoor #Brazil #Cloud #CyberSecurity #Dropbox #Germany #GitHub #Government #HTTP #InfoSec #Kaspersky #Kimsuky #Korea #Malware #OTX #OpenThreatExchange #Phishing #RAT #Rust #SouthKorea #SpearPhishing #UK #bot #AlienVault
-
Disclosing new PebbleDash-based tools
Kaspersky researchers conducted an in-depth analysis of Kimsuky APT activity, revealing tactical shifts and new malware variants based on the PebbleDash platform. The group introduced HelloDoor, a Rust-based backdoor, httpMalice leveraging HTTP and Dropbox communications, and updated MemLoad and httpTroy variants. Kimsuky maintains persistence through legitimate tools including VSCode Tunneling with GitHub authentication and DWAgent remote management software. Initial access occurs via spear-phishing with malicious attachments disguised as documents. The group primarily targets South Korean entities across government and defense sectors, with additional PebbleDash attacks observed in Brazil and Germany. Infrastructure relies on free South Korean hosting services and tunneling services like Cloudflare Quick Tunnels and Ngrok. Both PebbleDash and AppleSeed malware clusters demonstrate ongoing development with shared distribution methods, stolen certificates, and overlapping targets, indicating single-actor c...
Pulse ID: 6a05af0979e3cc1214a50d4e
Pulse Link: https://otx.alienvault.com/pulse/6a05af0979e3cc1214a50d4e
Pulse Author: AlienVault
Created: 2026-05-14 11:16:25Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#AppleSeed #BackDoor #Brazil #Cloud #CyberSecurity #Dropbox #Germany #GitHub #Government #HTTP #InfoSec #Kaspersky #Kimsuky #Korea #Malware #OTX #OpenThreatExchange #Phishing #RAT #Rust #SouthKorea #SpearPhishing #UK #bot #AlienVault
-
Disclosing new PebbleDash-based tools
Kaspersky researchers conducted an in-depth analysis of Kimsuky APT activity, revealing tactical shifts and new malware variants based on the PebbleDash platform. The group introduced HelloDoor, a Rust-based backdoor, httpMalice leveraging HTTP and Dropbox communications, and updated MemLoad and httpTroy variants. Kimsuky maintains persistence through legitimate tools including VSCode Tunneling with GitHub authentication and DWAgent remote management software. Initial access occurs via spear-phishing with malicious attachments disguised as documents. The group primarily targets South Korean entities across government and defense sectors, with additional PebbleDash attacks observed in Brazil and Germany. Infrastructure relies on free South Korean hosting services and tunneling services like Cloudflare Quick Tunnels and Ngrok. Both PebbleDash and AppleSeed malware clusters demonstrate ongoing development with shared distribution methods, stolen certificates, and overlapping targets, indicating single-actor c...
Pulse ID: 6a05af0979e3cc1214a50d4e
Pulse Link: https://otx.alienvault.com/pulse/6a05af0979e3cc1214a50d4e
Pulse Author: AlienVault
Created: 2026-05-14 11:16:25Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#AppleSeed #BackDoor #Brazil #Cloud #CyberSecurity #Dropbox #Germany #GitHub #Government #HTTP #InfoSec #Kaspersky #Kimsuky #Korea #Malware #OTX #OpenThreatExchange #Phishing #RAT #Rust #SouthKorea #SpearPhishing #UK #bot #AlienVault
-
The Packet Punisher: The Hacker
Can you neutralize the Hacker, or will he claim your network?
#CyberSecurity #PowerShell #CFML #AI #Networking #SQL #Cloud #GRC #Gaming #Technology #Python #ZeroTrust #DevSecOps #FinOps #Programming
Game Link: https://blackcatwhitehatsecurity.com/theGame5.cfm -
The Packet Punisher: The Hacker
Can you neutralize the Hacker, or will he claim your network?
#CyberSecurity #PowerShell #CFML #AI #Networking #SQL #Cloud #GRC #Gaming #Technology #Python #ZeroTrust #DevSecOps #FinOps #Programming
Game Link: https://blackcatwhitehatsecurity.com/theGame5.cfm -
The Packet Punisher: The Hacker
Can you neutralize the Hacker, or will he claim your network?
#CyberSecurity #PowerShell #CFML #AI #Networking #SQL #Cloud #GRC #Gaming #Technology #Python #ZeroTrust #DevSecOps #FinOps #Programming
Game Link: https://blackcatwhitehatsecurity.com/theGame5.cfm -
The Packet Punisher: The Hacker
Can you neutralize the Hacker, or will he claim your network?
#CyberSecurity #PowerShell #CFML #AI #Networking #SQL #Cloud #GRC #Gaming #Technology #Python #ZeroTrust #DevSecOps #FinOps #Programming
Game Link: https://blackcatwhitehatsecurity.com/theGame5.cfm -
The Packet Punisher: The Hacker
Can you neutralize the Hacker, or will he claim your network?
#CyberSecurity #PowerShell #CFML #AI #Networking #SQL #Cloud #GRC #Gaming #Technology #Python #ZeroTrust #DevSecOps #FinOps #Programming
Game Link: https://blackcatwhitehatsecurity.com/theGame5.cfm -
Updated Post: How to Install Grafana on Debian VPS and Connect to Node Exporter #Cloud #Guides #VPS
How to Install Grafana on Debi... -
-
-
-
Though Google Cloud Next in Las Vegas was a couple weeks ago, I'm still working through it and trying to process everything I learned there. Three days, 32,000 attendees, 260 product announcements. One cool stand out...
Google shipped an entire agent accountability infrastructure at this conference. Every AI agent now gets a cryptographic ID and an auditable action trail tied to a defined authorization policy. They built anomaly detection that flags unusual agent reasoning in real time and maps it back to the source.
You build that when you're expecting things to go wrong at scale.
GE Appliances is deploying 800 AI agents across manufacturing and supply chain right now. That's operational continuity with autonomous software making decisions without a human in the loop.
Every enterprise leader needs to answer one question the technology doesn't answer for you: when an agent makes a decision that costs money or creates legal exposure, who owns it?
I'm looking forward to diving deeper into Gemini Enterprise and Chrome Enterprise. The Chrome Enterprise shadow AI reporting shows you every unsanctioned AI tool your employees are already using. You can't govern what you can't see.https://cloud.google.com/blog/topics/google-cloud-next/google-cloud-next-2026-wrap-up
#AIGovernance #AgenticAI #GoogleNext #CIO #EnterpriseSecurity #security #privacy #cloud #infosec #cybersecurity #AI @google @googlecloud @googlecloudsec
-
Though Google Cloud Next in Las Vegas was a couple weeks ago, I'm still working through it and trying to process everything I learned there. Three days, 32,000 attendees, 260 product announcements. One cool stand out...
Google shipped an entire agent accountability infrastructure at this conference. Every AI agent now gets a cryptographic ID and an auditable action trail tied to a defined authorization policy. They built anomaly detection that flags unusual agent reasoning in real time and maps it back to the source.
You build that when you're expecting things to go wrong at scale.
GE Appliances is deploying 800 AI agents across manufacturing and supply chain right now. That's operational continuity with autonomous software making decisions without a human in the loop.
Every enterprise leader needs to answer one question the technology doesn't answer for you: when an agent makes a decision that costs money or creates legal exposure, who owns it?
I'm looking forward to diving deeper into Gemini Enterprise and Chrome Enterprise. The Chrome Enterprise shadow AI reporting shows you every unsanctioned AI tool your employees are already using. You can't govern what you can't see.https://cloud.google.com/blog/topics/google-cloud-next/google-cloud-next-2026-wrap-up
#AIGovernance #AgenticAI #GoogleNext #CIO #EnterpriseSecurity #security #privacy #cloud #infosec #cybersecurity #AI @google @googlecloud @googlecloudsec
-
Though Google Cloud Next in Las Vegas was a couple weeks ago, I'm still working through it and trying to process everything I learned there. Three days, 32,000 attendees, 260 product announcements. One cool stand out...
Google shipped an entire agent accountability infrastructure at this conference. Every AI agent now gets a cryptographic ID and an auditable action trail tied to a defined authorization policy. They built anomaly detection that flags unusual agent reasoning in real time and maps it back to the source.
You build that when you're expecting things to go wrong at scale.
GE Appliances is deploying 800 AI agents across manufacturing and supply chain right now. That's operational continuity with autonomous software making decisions without a human in the loop.
Every enterprise leader needs to answer one question the technology doesn't answer for you: when an agent makes a decision that costs money or creates legal exposure, who owns it?
I'm looking forward to diving deeper into Gemini Enterprise and Chrome Enterprise. The Chrome Enterprise shadow AI reporting shows you every unsanctioned AI tool your employees are already using. You can't govern what you can't see.https://cloud.google.com/blog/topics/google-cloud-next/google-cloud-next-2026-wrap-up
#AIGovernance #AgenticAI #GoogleNext #CIO #EnterpriseSecurity #security #privacy #cloud #infosec #cybersecurity #AI @google @googlecloud @googlecloudsec
-
Though Google Cloud Next in Las Vegas was a couple weeks ago, I'm still working through it and trying to process everything I learned there. Three days, 32,000 attendees, 260 product announcements. One cool stand out...
Google shipped an entire agent accountability infrastructure at this conference. Every AI agent now gets a cryptographic ID and an auditable action trail tied to a defined authorization policy. They built anomaly detection that flags unusual agent reasoning in real time and maps it back to the source.
You build that when you're expecting things to go wrong at scale.
GE Appliances is deploying 800 AI agents across manufacturing and supply chain right now. That's operational continuity with autonomous software making decisions without a human in the loop.
Every enterprise leader needs to answer one question the technology doesn't answer for you: when an agent makes a decision that costs money or creates legal exposure, who owns it?
I'm looking forward to diving deeper into Gemini Enterprise and Chrome Enterprise. The Chrome Enterprise shadow AI reporting shows you every unsanctioned AI tool your employees are already using. You can't govern what you can't see.https://cloud.google.com/blog/topics/google-cloud-next/google-cloud-next-2026-wrap-up
#AIGovernance #AgenticAI #GoogleNext #CIO #EnterpriseSecurity #security #privacy #cloud #infosec #cybersecurity #AI @google @googlecloud @googlecloudsec
-
Though Google Cloud Next in Las Vegas was a couple weeks ago, I'm still working through it and trying to process everything I learned there. Three days, 32,000 attendees, 260 product announcements. One cool stand out...
Google shipped an entire agent accountability infrastructure at this conference. Every AI agent now gets a cryptographic ID and an auditable action trail tied to a defined authorization policy. They built anomaly detection that flags unusual agent reasoning in real time and maps it back to the source.
You build that when you're expecting things to go wrong at scale.
GE Appliances is deploying 800 AI agents across manufacturing and supply chain right now. That's operational continuity with autonomous software making decisions without a human in the loop.
Every enterprise leader needs to answer one question the technology doesn't answer for you: when an agent makes a decision that costs money or creates legal exposure, who owns it?
I'm looking forward to diving deeper into Gemini Enterprise and Chrome Enterprise. The Chrome Enterprise shadow AI reporting shows you every unsanctioned AI tool your employees are already using. You can't govern what you can't see.https://cloud.google.com/blog/topics/google-cloud-next/google-cloud-next-2026-wrap-up
#AIGovernance #AgenticAI #GoogleNext #CIO #EnterpriseSecurity #security #privacy #cloud #infosec #cybersecurity #AI @google @googlecloud @googlecloudsec
-
Updated Post: 🚀 Deploy Claude Code on Ubuntu VPS #Cloud #Guides #VPS
🚀 Deploy Claude Code on Ubuntu... -
Today, we're proud to unveil Amazon Federation Quilt for ActivityPub
Amazon Federation Quilt stitches together ActivityPub instances using proprietary "FediThreads" that cost $0.0003 per toot. Includes AI-powered "Boost Optimization" and requires 47 IAM policies. Free tier: 1,000 federated likes/month.
#aws #AmazonWebServices #CloudComputing #cloud #satire #humor
-
A European central bank has signed a mega deal with a cloud service provider. The problem for Google, Microsoft and Amazon? It’s not with them
By design, central banks are cautious. Protecting a nation’s currency and financial stability are serious matters, ill-suited to risk-taking…
#Europe #EU #EuropeanCentralBank #amazon #Cloud #EuropeanParliament #Google #LetterfromLondon #londonarticles #Microsoft
https://www.europesays.com/europe/41936/ -
Updated Post: How to Deploy a Dedicated Outline VPN Server on Ubuntu VPS (Step-by-Step) #Cloud #Guides #VPS
How to Deploy a Dedicated Outl... -
AI in finance already changed how banks operate.
Workflows have evolved, and the next step is coming: agentic commerce.
A new Sigma Zero analysis is coming this Saturday.
Stay tuned.
-
AI in finance already changed how banks operate.
Workflows have evolved, and the next step is coming: agentic commerce.
A new Sigma Zero analysis is coming this Saturday.
Stay tuned.
-
AI in finance already changed how banks operate.
Workflows have evolved, and the next step is coming: agentic commerce.
A new Sigma Zero analysis is coming this Saturday.
Stay tuned.
-
AI in finance already changed how banks operate.
Workflows have evolved, and the next step is coming: agentic commerce.
A new Sigma Zero analysis is coming this Saturday.
Stay tuned.
-
AI in finance already changed how banks operate.
Workflows have evolved, and the next step is coming: agentic commerce.
A new Sigma Zero analysis is coming this Saturday.
Stay tuned.
-
Dew Drop – May 14, 2026 (#4668)
https://www.alvinashcraft.com/2026/05/14/dew-drop-may-14-2026-4668/
#dotnet #windowsdev #ai #webdev #csharp #cloud #visualstudio #vscode #appdev #sqlserver #dewdrop
-
Neoclouds market themselves in terms of sustainability, sovereignty, energy innovation and efficiency.
The reality is rather different.
#green #technews #datacenter #renewables #neocloud #cloud #greenwashing
-
Neoclouds market themselves in terms of sustainability, sovereignty, energy innovation and efficiency.
The reality is rather different.
#green #technews #datacenter #renewables #neocloud #cloud #greenwashing
-
Neoclouds market themselves in terms of sustainability, sovereignty, energy innovation and efficiency.
The reality is rather different.
#green #technews #datacenter #renewables #neocloud #cloud #greenwashing
-
Neoclouds market themselves in terms of sustainability, sovereignty, energy innovation and efficiency.
The reality is rather different.
#green #technews #datacenter #renewables #neocloud #cloud #greenwashing
-
Neoclouds market themselves in terms of sustainability, sovereignty, energy innovation and efficiency.
The reality is rather different.
#green #technews #datacenter #renewables #neocloud #cloud #greenwashing
-
New Post: 🚀 How to Install AlternC on Debian VPS #alternc #controlpanel #debian #vps #Cloud #Guides #VPS
🚀 How To Install AlternC On De... -
Best 5 streaming ETL tools for cloud data teams https://www.cloudcomputing-news.net/news/best-5-streaming-etl-tools-for-cloud-data-teams/?utm_source=dlvr.it&utm_medium=mastodon #Cloud #Automation #Data #BusinessStrategy #RAG #AIArchitecture #GenerativeAI #technology
-
Best 5 streaming ETL tools for cloud data teams https://www.cloudcomputing-news.net/news/best-5-streaming-etl-tools-for-cloud-data-teams/?utm_source=dlvr.it&utm_medium=mastodon #Cloud #Automation #Data #BusinessStrategy #RAG #AIArchitecture #GenerativeAI #technology
-
Best 5 streaming ETL tools for cloud data teams https://www.cloudcomputing-news.net/news/best-5-streaming-etl-tools-for-cloud-data-teams/?utm_source=dlvr.it&utm_medium=mastodon #Cloud #Automation #Data #BusinessStrategy #RAG #AIArchitecture #GenerativeAI #technology
-
Best 5 streaming ETL tools for cloud data teams https://www.cloudcomputing-news.net/news/best-5-streaming-etl-tools-for-cloud-data-teams/?utm_source=dlvr.it&utm_medium=mastodon #Cloud #Automation #Data #BusinessStrategy #RAG #AIArchitecture #GenerativeAI #technology