Industry Insights
Read the latest cloud security news, trends, and thought leadership from subject matter experts.

The Real Cost of Cryptomining: Adversarial Analysis of TeamTNT
Originally published by Sysdig on November 16, 2022. Written by Nicholas Lang, Sysdig. TeamTNT is a notorious cloud-targeting threat actor, who generates the majority of their criminal profits through cryptojacking. Sysdig TRT attributed more than $8,100 worth of cryptocurrency to TeamTNT, which ...
How Global Conflicts Influenced Cyber Attack Behaviors
Originally published by Sysdig. Written by Michael Clark, Sysdig. The conflict between Russia and Ukraine includes a cyberwarfare component with government-supported threat actors and civilian hacktivists taking sides.The goals of disrupting IT infrastructure and utilities have led to a 4-fold in...
The Discovery of a Massive Cryptomining Operation Leveraging GitHub Actions
Originally published by Sysdig on October 25, 2022. Written by Crystal Morin, Sysdig. The Sysdig Threat Research Team (Sysdig TRT) recently uncovered an extensive and sophisticated active cryptomining operation in which a threat actor is using some of the largest cloud and continuous integration ...
Web 3.0 Security Issues: What Your Company Needs to Know for 2023
Originally published by TokenEx. Written by Anni Burchfiel, TokenEx. The world wide web had its first major shift when blogging and forum capabilities were added to web alongside the established collection of static company websites. The ability for anyone to add their own content to the web, tho...
2022 Threat Report: Cloud-Native Threats are Increasing and Maturing
Originally published by Sysdig. Written by Michael Clark. Sysdig. The first annual cloud-native threat report from Sysdig explores some of the year’s most important security topics in the cloud. As the use of containers and cloud services keeps growing, threat actors are increasingly turning thei...
What Is a Feistel Cipher?
Originally published by TokenEx here. Written by Valerie Hare, Content Marketing Specialist, TokenEx. Quick Hits: Feistel cipher is a design model designed to create different block ciphers, such as DES. The model uses substitution and permutation alternately. This cipher structure is based on th...
From the Front Lines | 8220 Gang Massively Expands Cloud Botnet to 30,000 Infected Hosts
Originally published by SentinelOne here. Written by Tom Hegel, SentinelOne. Over the last month a crimeware group best known as 8220 Gang has expanded their botnet to roughly 30,000 hosts globally through the use of Linux and common cloud application vulnerabilities and poorly secured conf...
The Future of Cloud Security | 2022 and Beyond
This blog was originally published by Check Point here.Written by Pete Nicoletti, Field CISO - Americas, Check Point Software.What will the future of cloud security look like? The crystal ball is cloudy when looking beyond a few years from now, but we can anticipate near-term trends! There are th...
How to Protect Your Crypto from Hackers
This blog was originally published by TokenEx here.Written by Valerie Hare, Content Marketing Specialist, TokenEx.A McAfee report, "The Hidden Costs of Cybercrime," states that over $4 billion in cryptocurrency was stolen and nearly $1.4 billion was stolen in the first five months of 2020. While ...
Crypto Caper: How Cybercriminals Steal Crypto from Blockchain Networks
This blog was originally published by TokenEx here. Written by Valerie Hare, TokenEx. In 2009, the first established cryptocurrency was born – Bitcoin. If you aren't familiar with cryptocurrency, it's an online currency with ledgers secured by encryption. Since those early years, digital currency...
What is a Security Token Offering (STO)?
This blog was originally published by TokenEx here. Written by Anni Burchfiel, TokenEx. An STO, also known as a Security Token Offering, is a digital token supported by blockchain technology that represents a stake in an asset. STOs enable digital funding, while still complying with government re...
NFT vs. Tokenization
This blog was originally published by TokenEx here. Written by Valerie Hare, TokenEx. When it comes to tokens, there are a wide range of types and use cases. For instance, people researching NFTs often get search results for other types of tokens and related processes, such as tokenization. Even ...
The Future of Cryptocurrency
This blog was originally published by VGS here. Written by Kenneth Geers, PhD, Information Security Analyst at VGS. In 2010, Laszlo Hanyecz paid 10,000 bitcoins for two pizzas. Today, with the price of bitcoin over over $40k, those same coins are worth nearly half a billion dollars. How could a s...
Blockchain Security and Legaltech
Written by Sebastian Soriano, TRATO Since its inception, the blockchain technology has shown promising application prospects. With the rise of technology many industry players are now digitizing and integrating new technologies to ensure cybersecurity in transactions. Among all solutions, t...
Secure Distributed Ledger Technology Framework for Financial Institutes
Last updated: February 25, 2022Distributed ledger technologies (DLT) introduce a multitude of value propositions for the financial services industry. The pace of innovation is aggressively picking up in use cases pertaining to finance such as digital assets, tokenization and cryptocurrency. Howev...
The Use of Blockchain in Healthcare: A Collaboration Between Two CSA Working Groups
The unique attributes of healthcare data make it a prime target for nefarious actors. Predictably, healthcare information is tightly regulated by privacy and security laws in the United States, the European Union and international rules governing cloud data storage. The data’s high value, coupled...
Detecting new crypto-mining attack targeting Kubeflow and TensorFlow
This blog was originally published by Sysdig hereWritten by Stefano Chierici, Security Researcher, SysdigMicrosoft has discovered a new large-scale attack targeting Kubeflow instances to deploy malicious TensorFlow pods, using them to mine Monero cryptocurrency in Kubernetes cluster environments....
Can Blockchains Survive the Quantum Computer?
Suppose you were asked to rank the most significant innovations in IT over the last few years. What would come to your mind? It is very likely that both blockchain and quantum technologies would come close to the top of your list.Blockchains promise the secure exchange of digital assets (such as ...
Rent to Pwn the Blockchain - 51% Attacks Made Easy
By Kurt SeifriedThis article is not legal or investment advice. This article covers some aspects of 51% attacks (and 34% attacks and some other variations) in DeFi, and some potential solutions to prevent these attacks from succeeding. So where I say “51% Attack” I mean “all attacks where you get...
Why lions shouldn’t invest in DeFi Smart Contracts
By Kurt Seifried, Chief Blockchain Officer at Cloud Security AllianceThis article is not legal or investment advice, it covers some aspects of front running in DeFi, and potential security solutions. This article also assumes you have a relatively deep understanding of the following Blockchain/DL...
Browse by Topic
Write for the CSA blog
Submit your blog proposalSign up to receive CSA's latest blogs
This list receives 1-2 emails a month.