
Cloud

U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams – Krebs on Security
Image: Shutterstock, ArtHead. The U.S. government today imposed economic sanctions on Funnull Technology Inc., a Philippines-based company that provides computer infrastructure for hundreds of thousands of websites involved in virtual currency investment scams known as “pig butchering.” In January 2025, KrebsOnSecurity detailed how Funnull was being used as a content delivery network that catered to…

RAID Recovery in the Cloud Era: Hybrid Solutions When Your Physical RAID Server Fails
The sad truth is that RAID levels are not immune to data loss in critical scenarios – they only provide a safeguard in minor situations such as drive failures and inaccessible volumes. If your system crashes due to a virus attack or a problem with the operating system, chances are your RAID array will fail…

HPE strengthens hybrid cloud and connectivity with Aruba Networking and GreenLake security upgrades – Help Net Security
Hewlett Packard Enterprise has announced expansions of HPE Aruba Networking and HPE GreenLake cloud to help enterprises modernize secure connectivity and hybrid cloud operations by blending multi-layered and zero trust approaches to protect against threats. These new expansions include: New cloud-based access control security capabilities of HPE Aruba Networking Central, which accelerate enterprise-grade zero trust…

Addressing the gaps in modern cloud protection: Using CNAPP to unify cloud security
As cloud-native architectures continue to evolve, so have the complexities of securing them. Traditional security approaches, often built around static infrastructure and perimeter defenses, struggle to keep pace with the speed and scale of modern cloud deployments. Enter cloud-native application protection platforms (CNAPPs), a term coined by Gartner® to describe an integrated security approach that…

SaaS Security Essentials: Reducing Risks in Cloud Applications
As organizations increasingly rely on SaaS applications to run their operations, securing them has become a necessity. Without strong protection, sensitive data, user access, and cloud infrastructure are left vulnerable to breaches. SaaS security is not a single-layer fix; it demands multiple approaches to address cybersecurity threats across identity, data, and applications. Key Components of…

Cloud IMS: The Confluence of Innovation and Security in Modern Telecommunications
The telecom industry is at a major turning point. With 5G, IoT, and AI reshaping global connectivity, the need for scalable, secure, and smart networks is higher than ever. Cloud IMS is stepping up as a game-changer, combining the flexibility of cloud technology with the reliability of traditional IMS systems. Virtualizing core network functions helps…

How CISOs can balance security and business agility in the cloud – Help Net Security
In this Help Net Security interview, Natalia Belaya, CISO at Cloudera, discusses common misconceptions about cloud security, the balance between protection and business agility, and overlooked risks that CISOs should prioritize. Belaya also offers practical strategies for integrating cloud-native security solutions and mitigating misconfigurations at scale. What key security principles should enterprises follow when migrating…

SAP integrates Databricks to enhance AI readiness with new Business Data Cloud
Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More German software giant SAP is pushing the bar on the data front to power next-gen AI use cases. The company today introduced Business Data Cloud (BDC), a new SaaS product that embraces lakehouse architecture to help…

What Is Cloud Computing? – SitePoint
Cloud computing has completely changed how individuals and businesses interact with technology. It helps users run complex workflows on the cloud without worrying about capacity, security concerns or management. For instance, if you’ve tried to self-host an application, you would’ve done the following: Built an on-premise server. Managed the server room by providing comprehensive cooling….

Blending in with the Cloud – Krebs on Security
Image: Shutterstock, ArtHead. In an effort to blend in and make their malicious traffic tougher to block, hosting firms catering to cybercriminals in China and Russia increasingly are funneling their operations through major U.S. cloud providers. Research published this week on one such outfit — a sprawling network tied to Chinese organized crime gangs and…
- 1
- 2