Resources
Keep up with InsiderSecurity news and updates here.
Recent Posts
CapitalOne data breach: How SSRF vulnerability exposed 100 million customer records
Learn how the CapitalOne breach exposed 100M records via an S3 bucket...
Read More >>Imperva Hack: AWS RDS Breach, Data Exposure & Cybersecurity Detection Strategies
Discover the Imperva hack that compromised cloud security. Learn about the data...
Read More >>Advanced cloud security solution developed in ASEAN for cloud misconfigurations and cloud breaches
InsiderSecurity launches CSX, a cloud security solution that detects misconfigurations and data...
Read More >>Cisco WebEx sabotage: How a disgruntled ex-employee caused $2.4 million in damages
Discover how a disgruntled ex-employee sabotaged Cisco WebEx, causing $2.4 million in...
Read More >>Exposure of airport employee records – A story of accident misconfiguration
Discover how a misconfigured AWS S3 bucket led to the exposure of...
Read More >>What you need to know about MFA-bypass email phishing threats
Discover the rising threat of MFA bypassing phishing attacks and learn how...
Read More >>Uber Hack – A Deeper Dive
Explore the intricacies of the Uber hack by LAPSUS$ in this detailed...
Read More >>APT29 in the cloud: A deeper dive
Dive into our detailed exploration of APT29's cloud-based attacks. Discover how this...
Read More >>LastPass hack: A deeper dive
Dive into the comprehensive analysis of the LastPass Hack, exploring the implications...
Read More >>A comprehensive guide to Singapore cybersecurity compliance
Discover the essentials of Singapore cybersecurity compliance, covering government, financial, healthcare, and...
Read More >>CircleCI’s breach analysis and lessons
Dive into our comprehensive analysis of CircleCI's cybersecurity breach and learn how...
Read More >>Hybrid cloud security – Top challenges and best practices
Uncover hybrid cloud security challenges and best practices, addressing visibility, misconfigurations, network...
Read More >>CapitalOne data breach: How SSRF vulnerability exposed 100 million customer records
Learn how the CapitalOne breach exposed 100M records via an S3 bucket vulnerability. Discover AWS security insights, detection strategies, and ways to prevent attacks
Imperva Hack: AWS RDS Breach, Data Exposure & Cybersecurity Detection Strategies
Discover the Imperva hack that compromised cloud security. Learn about the data breach, detection strategies, and future-proofing your business from such attacks.
Advanced cloud security solution developed in ASEAN for cloud misconfigurations and cloud breaches
InsiderSecurity launches CSX, a cloud security solution that detects misconfigurations and data exposures, enhancing visibility and protection across clouds
Cisco WebEx sabotage: How a disgruntled ex-employee caused $2.4 million in damages
Discover how a disgruntled ex-employee sabotaged Cisco WebEx, causing $2.4 million in damages. Learn key cybersecurity lessons and detection strategies to prevent similar attacks
Exposure of airport employee records – A story of accident misconfiguration
Discover how a misconfigured AWS S3 bucket led to the exposure of over 3TB of sensitive data at Securitas. Learn key strategies to detect and prevent cloud misconfigurations and protect your organization’s data.
What you need to know about MFA-bypass email phishing threats
Discover the rising threat of MFA bypassing phishing attacks and learn how to detect and prevent them. Stay ahead of cyber threats with advanced detection strategies.
Uber Hack – A Deeper Dive
Explore the intricacies of the Uber hack by LAPSUS$ in this detailed analysis. Understand the methods used by threat actors and learn effective detection strategies to safeguard your cloud infrastructure.
APT29 in the cloud: A deeper dive
Dive into our detailed exploration of APT29’s cloud-based attacks. Discover how this sophisticated cyber threat operates and learn practical detection strategies to protect your organization’s cloud infrastructure.
LastPass hack: A deeper dive
Dive into the comprehensive analysis of the LastPass Hack, exploring the implications for cloud security and how businesses can fortify their defenses against such vulnerabilities
A comprehensive guide to Singapore cybersecurity compliance
Discover the essentials of Singapore cybersecurity compliance, covering government, financial, healthcare, and telecommunication sectors, and learn how to enhance your organization’s cybersecurity measures.
CircleCI’s breach analysis and lessons
Dive into our comprehensive analysis of CircleCI’s cybersecurity breach and learn how to tackle the expanding software attack surface for all organizations
Hybrid cloud security – Top challenges and best practices
Uncover hybrid cloud security challenges and best practices, addressing visibility, misconfigurations, network protection, skills gap, and compliance. Discover key insights for a secure hybrid cloud strategy