Resources

Keep up with InsiderSecurity news and updates here.

Recent Posts

AllInsider LabInsightsNewsProduct Information

CapitalOne data breach: How SSRF vulnerability exposed 100 million customer records

Learn how the CapitalOne breach exposed 100M records via an S3 bucket...

Read More >>

Imperva Hack: AWS RDS Breach, Data Exposure & Cybersecurity Detection Strategies

Discover the Imperva hack that compromised cloud security. Learn about the data...

Read More >>

Advanced cloud security solution developed in ASEAN for cloud misconfigurations and cloud breaches

InsiderSecurity launches CSX, a cloud security solution that detects misconfigurations and data...

Read More >>

Cisco WebEx sabotage: How a disgruntled ex-employee caused $2.4 million in damages

Discover how a disgruntled ex-employee sabotaged Cisco WebEx, causing $2.4 million in...

Read More >>

Exposure of airport employee records – A story of accident misconfiguration

Discover how a misconfigured AWS S3 bucket led to the exposure of...

Read More >>

What you need to know about MFA-bypass email phishing threats

Discover the rising threat of MFA bypassing phishing attacks and learn how...

Read More >>

Uber Hack – A Deeper Dive

Explore the intricacies of the Uber hack by LAPSUS$ in this detailed...

Read More >>

APT29 in the cloud: A deeper dive

Dive into our detailed exploration of APT29's cloud-based attacks. Discover how this...

Read More >>

LastPass hack: A deeper dive

Dive into the comprehensive analysis of the LastPass Hack, exploring the implications...

Read More >>

A comprehensive guide to Singapore cybersecurity compliance

Discover the essentials of Singapore cybersecurity compliance, covering government, financial, healthcare, and...

Read More >>

CircleCI’s breach analysis and lessons

Dive into our comprehensive analysis of CircleCI's cybersecurity breach and learn how...

Read More >>

Hybrid cloud security – Top challenges and best practices

Uncover hybrid cloud security challenges and best practices, addressing visibility, misconfigurations, network...

Read More >>

Uber Hack – A Deeper Dive

Explore the intricacies of the Uber hack by LAPSUS$ in this detailed analysis. Understand the methods used by threat actors and learn effective detection strategies to safeguard your cloud infrastructure.

Read More »

APT29 in the cloud: A deeper dive

Dive into our detailed exploration of APT29’s cloud-based attacks. Discover how this sophisticated cyber threat operates and learn practical detection strategies to protect your organization’s cloud infrastructure.

Read More »