Two recent Microsoft breaches underscore the growing problem of cloud identity attacks and why it’s critical to stop them. While Microsoft Active Directory (AD) remains a prime target for attackers, cloud identity stores such as Microsoft Entra ID are also a target of opportunity. The reason is simple: Threat actors increasingly seek to mimic legitimate users in the target … [Read more...] about CrowdStrike Extends Identity Security Capabilities to Stop Attacks in the Cloud
cloud
Elastic Cloud is now available on Amazon Web Services (Zurich)
Elastic Cloud gives you the flexibility to run where and how you want. Deploy in the cloud on Google Cloud, Microsoft Azure, Amazon Web Services, or all the above. You can choose to use our managed service offering or manage the service yourself with built-in automation and orchestration tools.When you log in to the Elastic Cloud console, simply select your region and preferred … [Read more...] about Elastic Cloud is now available on Amazon Web Services (Zurich)
Secure More GCP Workloads with GKE Autopilot Supported by Falcon Cloud Security
In the ever-evolving landscape of cloud security, staying ahead of the curve is paramount. Today, we are announcing an exciting enhancement: CrowdStrike Falcon® Cloud Security now supports Google Kubernetes Engine (GKE) Autopilot. This integration marks an important milestone in our commitment to providing cutting-edge DevSecOps-focused security and solutions for modern cloud … [Read more...] about Secure More GCP Workloads with GKE Autopilot Supported by Falcon Cloud Security
Migrating from self-managed Elastic Stack to Elastic Cloud using Google Cloud
A great way to try out Elastic® for free is to create a self-managed deployment on your own local computer. Then when you're ready to take your usage of Elastic to the next level of scalability and global availability, you can migrate your self-managed Elastic deployment to Elastic Cloud. This blog post presents a step-by-step guide to help you do that using a snapshot and … [Read more...] about Migrating from self-managed Elastic Stack to Elastic Cloud using Google Cloud
Migrate self-managed Elastic stack to Elastic Cloud using Azure Blob Storage
The process of migration involves taking a snapshot of the data in the self-managed Elastic stack, saving that snapshot to an Azure Blob Storage Container, and then restoring the snapshot to your Elastic Cloud deployment. Here’s a guided tour of all the steps to accomplish this right within your browser.While the migration process covered in this blog post migrates an Elastic … [Read more...] about Migrate self-managed Elastic stack to Elastic Cloud using Azure Blob Storage
Google Cloud Resolves Privilege Escalation Flaw Impacting Kubernetes Service
Dec 28, 2023NewsroomCloud Security / Data Protection Google Cloud has addressed a medium-severity security flaw in its platform that could be abused by an attacker who already has access to a Kubernetes cluster to escalate their privileges. "An attacker who has compromised the Fluent Bit logging container could combine that access with high privileges required by Anthos … [Read more...] about Google Cloud Resolves Privilege Escalation Flaw Impacting Kubernetes Service
Cloud Atlas’ Spear-Phishing Attacks Target Russian Agro and Research Companies
Dec 25, 2023NewsroomCyber Espionage / Malware The threat actor referred to as Cloud Atlas has been linked to a set of spear-phishing attacks on Russian enterprises. Targets included a Russian agro-industrial enterprise and a state-owned research company, according to a report from F.A.C.C.T., a standalone cybersecurity company formed after Group-IB's formal exit from Russia … [Read more...] about Cloud Atlas’ Spear-Phishing Attacks Target Russian Agro and Research Companies
Threat Actors Can Leverage AWS STS to Infiltrate Cloud Accounts
Dec 06, 2023NewsroomAccess Management / Cloud Security Threat actors can take advantage of Amazon Web Services Security Token Service (AWS STS) as a way to infiltrate cloud accounts and conduct follow-on attacks. The service enables threat actors to impersonate user identities and roles in cloud environments, Red Canary researchers Thomas Gardner and Cody Betsworth said in a … [Read more...] about Threat Actors Can Leverage AWS STS to Infiltrate Cloud Accounts
5 best practices for Elastic Cloud production deployment
Proper planning of a deployment architecture is one of the critical factors in unlocking the Elastic Stack potential, leading to better operational efficiency and optimum performance.Highlighted below are parameters that influence the architecture. Based on the organization's needs, customers are encouraged to dive deeper into these aspects using the mentioned resources.Node … [Read more...] about 5 best practices for Elastic Cloud production deployment
CrowdStrike Demonstrates Cloud Security Leadership at AWS re:Invent
CrowdStrike is honored to be named Partner of the Year for several 2023 Geo and Global AWS Partner Awards at Amazon Web Services re:Invent 2023, where we are participating this year as a Diamond Sponsor. We are also proud to be a launch partner for AWS Built-in and achieve two AWS competencies. These accomplishments demonstrate our forward-thinking approach to cloud security … [Read more...] about CrowdStrike Demonstrates Cloud Security Leadership at AWS re:Invent