ChaptersCircleEventsBlog
Get early access to CSA’s Trusted AI Safety Certification Program—updates, resources & beta invites!

Blog

Read the latest cloud security news, trends, and thought leadership from subject matter experts.
Industry Insights
Core Cloud
SCARLETEEL: Operation Leveraging Terraform, Kubernetes, and AWS for Data Theft
Published: 05/02/2023
Core Cloud
Beyond the Inbox: Protecting Against Collaboration Apps as an Emerging Attack Vector
Published: 05/01/2023
Core Cloud
Analysis for CVE-2023-23397 Microsoft Outlook Vulnerability
Published: 04/28/2023
Core Cloud
Unintended Third-Party Access to Data Through Supported Azure Built-In Roles
Published: 04/28/2023
Core Cloud
Malicious Self-Extracting Archives, Decoy Files and Their Hidden Payloads
Published: 04/26/2023
Core Cloud
The Discovery of the First-Ever Dero Cryptojacking Campaign Targeting Kubernetes
Published: 04/20/2023
Core Cloud
Cloud Visibility and Port Spoofing: The Known Unknown
Published: 04/19/2023
Core Cloud
When Instant Messaging Goes Rogue: Safeguarding Your Corporate Communication Channels
Published: 04/14/2023
Core Cloud
Top Cloud Security Challenges in 2023
Published: 04/14/2023
Core Cloud
Securing PostgreSQL from Cryptojacking Campaigns in Kubernetes
Published: 04/12/2023
Core Cloud
Exploiting CVE-2021-3490 for Container Escapes
Published: 04/05/2023
Cloud Misconfigurations Are Not Cloud Vulnerabilities. Stop Treating Them That Way.
Published: 04/04/2023
EmojiDeploy: Smile! Your Azure Web Service Just Got RCE’d ._.
Published: 03/29/2023
How To Achieve InfoSec When Your Tools Do InfraSec
Published: 03/27/2023
Insights from the Uber Breach: Ways to Prevent Similar Attacks
Published: 03/23/2023
Becoming Cyber Resilient—Cybersecurity Trends to Watch in 2023
Published: 03/23/2023
Malware Analysis: GuLoader Dissection Reveals New Anti-Analysis Techniques and Code Injection Redundancy
Published: 03/22/2023
LummaC2 Stealer: A Potent Threat To Crypto Users
Published: 03/21/2023
Analysis on Docker Hub Malicious Images: Attacks Through Public Container Images
Published: 03/20/2023
SCATTERED SPIDER Exploits Windows Security Deficiencies with Bring-Your-Own-Vulnerable-Driver Tactic in Attempt to Bypass Endpoint Security
Published: 03/16/2023
Filter by Theme
Core Cloud

Core Cloud

Whether you have an established cloud security program or are starting your cloud migration, these blogs will help you enhance your cloud security strategy . Learn about cybersecurity threats, certification, and more.

Cloud Assurance

Cloud Assurance

Improve the security and compliance posture of your organization and leverage the controls inside of cloud assurance. Gain the guidance and tools to build your own cloud assurance ecosystem.

Future Cloud

Future Cloud

Leverage CSA to help your organization solve tomorrow's problems today. Explore innovative technologies and strategies through the topics of Zero Trust, Quantum, and more.

Browse by Topic
Unlock Cloud Security Insights

Unlock Cloud Security Insights

Choose the CSA newsletters that match your interests:

Subscribe to our newsletter for the latest expert trends and updates