New York Tech Media
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital
No Result
View All Result
New York Tech Media
No Result
View All Result
Home Cybersecurity

Cloud security is an ongoing struggle to keep sensitive data safe. Is it getting any easier?

New York Tech Editorial Team by New York Tech Editorial Team
October 17, 2021
in Cybersecurity
0
Cloud security is an ongoing struggle to keep sensitive data safe. Is it getting any easier?
Share on FacebookShare on Twitter

The latest cloud security breaches show that we have miles to go as we keep fighting to keep our sensitive data safe. 

2020 marked a record number of cyberattacks. Cloud-based services have been the most common target of such attacks.

According to the State of Cloud Security 2021 report [PDF], 36% of the companies surveyed confirmed they experienced cloud data leaks in 2020. An overwhelming 83% confirmed they believed their organization was likely to be the victim of a cybercrime. 

What has changed since? Have businesses found new solutions to tackle the complex issue of ensuring cloud security? 

Ever since the start of 2021, there have been various attacks on services that rely on a cloud. These breaches harmed both companies and users. 

Let’s examine some of the latest cloud-based breaches, scratch the surface of cloud security and uncover the reasons as to why these attacks keep happening. 

VIP Games cloud misconfiguration 

Free gaming platform by the name of VIP Games was the victim of a cloud misconfiguration back in January 2021.

Because of the data breach, over 66,000 mobile and desktop users lost 23 million records that included sensitive data—passwords, Google IDs, email addresses, and more. 

What can we learn from this attack? 

Cloud misconfigurations are particularly sensitive because they have to be constantly monitored. This is the reason cloud attacks of this type are difficult to prevent and manage—and one of the main reasons why hackers target these glitches in the system.

SEE: Warning as hackers breach MFA to target cloud services

Another reason cloud-based services are difficult to avoid is that cybercriminals are constantly getting better at detecting vulnerabilities in security systems. 

From the aforementioned State of Cloud Security Report for 2021,

“The traditional approach involves picking an organization to target and then searching for vulnerabilities to exploit. With the cloud, malicious actors now use automation tools to scan the entire internet searching for cloud misconfigurations.”

Cybercriminals continually evolve and improve, which means that both cloud security services and hackers are in a constant race to find vulnerabilities before the other side does.  

iCloud phishing scam  

We recently covered the iCloud phishing scam that targeted young girls. The aftermath of this has resulted in 620,000 leaked photos of women. 

A cybercriminal broke into 200 iCloud accounts after obtaining women’s ID and passwords posing as an Apple representative. He then shared sexually explicit content with others online. 

What can we take away from this? 

  • Cybercriminals often use cloud attacks to target individuals and not the company itself. 
  • We are still learning how to recognize potential phishing emails and if someone is misrepresenting themselves. This is especially difficult with emails and phone calls that imitate authorities. 
  • People haven’t been deterred from using Apple products even though their iCloud has been vulnerable to cyberattacks in the past.
  •  What’s more, similar cybercrime that involved the leaking of sexually explicit celebrity images in the past also relied on vulnerabilities in their iCloud services.   

Mimecast data breach 

Mimecast is a company that provides cloud-based email software. In January 2021, the company reported that a threat actor got their clients’ digital certificates. Obtained data were used to breach clients’ Microsoft 365 accounts through Mimecast’s products. 

Considering Microsoft caught the suspicious activity early, this cloud attack was mitigated, affected individuals were promptly contacted by Mimecast and given new certificates. 

What can we learn from this cyberattack? 

If this attack hadn’t been caught by Microsoft early, it would have been significantly more damaging. However, it’s concerning that hackers could access Microsoft accounts using Mimecast certificates at all. 

The attack is a reminder that we should all be warier in which ways companies of the services we use can connect and impose on our infrastructures. This can be done by being aware of what they’re doing exactly and reflecting upon how much access they really need.  

After signing up for a particular system or service, clients and customers shouldn’t have to risk the data available on other services. 

Final word 

In these examples cybercriminals intentionally target users of cloud-based services rather than damaging the company – but they do both in the process. Cloud security breaches are harmful to companies and individuals alike. 

They can strip you of your identity, damage your finances and reputation and make you feel completely unsafe sharing any information online. 

Additionally, they can damage the reputation of their targeted businesses as well as cause significant financial damage. 

These attacks are happening daily, regardless of the best efforts of security companies who work tirelessly to prevent them from happening. 

The reality is, it’s not likely we’ll weed out cybercrime once and for all. 

Cybercriminals find new ways of getting into your online accounts and getting sensitive information they can use to harm you. 

As businesses, what we can do is invest in better cyber security. As individuals, we can choose those companies that prioritize transparency and keeping their user’s data safe. 

Did you enjoy reading this article? Like our page on Facebook and follow us on Twitter.


Credit: Source link

Previous Post

Inside Amazon’s biggest warehouse where robots outnumber human workers 10 to 1

Next Post

University of Bristol team undertakes research at Chernobyl NPP

New York Tech Editorial Team

New York Tech Editorial Team

New York Tech Media is a leading news publication that aims to provide the latest tech news, fintech, AI & robotics, cybersecurity, startups & leaders, venture capital, and much more!

Next Post
University of Bristol team undertakes research at Chernobyl NPP

University of Bristol team undertakes research at Chernobyl NPP

  • Trending
  • Comments
  • Latest
Meet the Top 10 K-Pop Artists Taking Over 2024

Meet the Top 10 K-Pop Artists Taking Over 2024

March 17, 2024
Panther for AWS allows security teams to monitor their AWS infrastructure in real-time

Many businesses lack a formal ransomware plan

March 29, 2022
Zach Mulcahey, 25 | Cover Story | Style Weekly

Zach Mulcahey, 25 | Cover Story | Style Weekly

March 29, 2022
How To Pitch The Investor: Ronen Menipaz, Founder of M51

How To Pitch The Investor: Ronen Menipaz, Founder of M51

March 29, 2022
Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

Japanese Space Industry Startup “Synspective” Raises US $100 Million in Funding

March 29, 2022
UK VC fund performance up on last year

VC-backed Aerium develops antibody treatment for Covid-19

March 29, 2022
Startups On Demand: renovai is the Netflix of Online Shopping

Startups On Demand: renovai is the Netflix of Online Shopping

2
Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

Robot Company Offers $200K for Right to Use One Applicant’s Face and Voice ‘Forever’

1
Menashe Shani Accessibility High Tech on the low

Revolutionizing Accessibility: The Story of Purple Lens

1

Netgear announces a $1,500 Wi-Fi 6E mesh router

0
These apps let you customize Windows 11 to bring the taskbar back to life

These apps let you customize Windows 11 to bring the taskbar back to life

0
This bipedal robot uses propeller arms to slackline and skateboard

This bipedal robot uses propeller arms to slackline and skateboard

0
The Future of “I Do”: How Technology is Revolutionizing Weddings in 2025

The Future of “I Do”: How Technology is Revolutionizing Weddings in 2025

March 19, 2025
Eldad Tamir

AI vs. Traditional Investing: How FINQ’s SEC RIA License Signals a New Era in Wealth Management

March 17, 2025
Overcoming Payment Challenges: How Waves Audio Streamlined Transactions with BridgerPay

Overcoming Payment Challenges: How Waves Audio Streamlined Transactions with BridgerPay

March 16, 2025
Arvatz and Iyer

PointFive and Emertel Forge Strategic Partnership to Elevate Enterprise FinOps in ANZ

March 13, 2025
Global Funeral Traditions Meet Technology

Global Funeral Traditions Meet Technology

March 9, 2025
Canditech website

Canditech is Revolutionizing Hiring With Their New Product

March 9, 2025

Recommended

The Future of “I Do”: How Technology is Revolutionizing Weddings in 2025

The Future of “I Do”: How Technology is Revolutionizing Weddings in 2025

March 19, 2025
Eldad Tamir

AI vs. Traditional Investing: How FINQ’s SEC RIA License Signals a New Era in Wealth Management

March 17, 2025
Overcoming Payment Challenges: How Waves Audio Streamlined Transactions with BridgerPay

Overcoming Payment Challenges: How Waves Audio Streamlined Transactions with BridgerPay

March 16, 2025
Arvatz and Iyer

PointFive and Emertel Forge Strategic Partnership to Elevate Enterprise FinOps in ANZ

March 13, 2025

Categories

  • AI & Robotics
  • Benzinga
  • Cybersecurity
  • FinTech
  • New York Tech
  • News
  • Startups & Leaders
  • Venture Capital

Tags

3D bio-printing acoustic AI Allseated B2B marketing Business carbon footprint climate change coding Collaborations Companies To Watch consumer tech cryptocurrency deforestation drones earphones Entrepreneur Fetcherr Finance Fintech food security Investing Investors investorsummit israelitech Leaders LinkedIn Leaders Metaverse news OurCrowd PR Real Estate reforestation software start- up startupnation Startups Startups On Demand startuptech Tech Tech leaders technology UAVs Unlimited Robotics VC
  • Contact Us
  • Privacy Policy
  • Terms and conditions

© 2024 All Rights Reserved - New York Tech Media

No Result
View All Result
  • News
  • FinTech
  • AI & Robotics
  • Cybersecurity
  • Startups & Leaders
  • Venture Capital

© 2024 All Rights Reserved - New York Tech Media