CROC Talks - Securing DBs, Cloud Threat Intel, and Detection- Special Guest: Snowflakes’ Haider Dost
Hosts Alon and Eden interview Haider Dost from Snowflake on securing databases, cloud threat intelligence, and more
Podcast (in inglese)
👀 Here's a sneak peek at today’s episode:
🔒 Stay ahead of the game! LAPSUS$ Hackers may be making waves. Two members of this notorious group faced consequences in the UK, but shockingly, they continued their hacking activities even while under house arrest.
🤖 Data Poisoning in AI Training is a growing concern. Hackers can manipulate the data used to train AI models, introducing risks and vulnerabilities. Validating data integrity and randomizing data ingestion times are useful mitigations against this threat.
💻 The WinRAR Vulnerability (CVE-2023-38831)! This flaw was exploited against crypto-traders to infect their devices with malware, but should be considered a low concern for cloud customers unless using virtual desktops.
https://gizmodo.com/hackers-lapsus-uber-nvidia-rockstar-games-microsoft-1850766324 https://www.bbc.com/news/technology-66549159 https://www.cisa.gov/resources-tools/resources/review-attacks-associated-lapsus-and-related-threat-groups-executive-summary https://www.cisa.gov/sites/default/files/2023-08/CSRBLapsus%24508c.pdf https://duo.com/decipher/lapsususd-analysis-finds-need-for-better-iam-mfa-deployments https://www.youtube.com/watch?v=h9jf1ikcGyk https://arxiv.org/pdf/2302.10149.pdf https://www.blackhat.com/us-23/briefings/schedule/#poisoning-web-scale-training-datasets-is-practical-32112 https://arstechnica.com/security/2023/08/winrar-0-day-that-uses-poisoned-jpg-and-txt-files-under-exploit-since-april/
Hosts Alon and Eden interview Haider Dost from Snowflake on securing databases, cloud threat intelligence, and more
Tune in to the latest episode of #CryingOutCloud for insights on AI, data privacy, and the latest cloud security news!
RCE Vulnerability in Ollama explained
Rimani al sicuro e informato: ricevi le ultime notizie sulla sicurezza del cloud, approfondimenti sugli attacchi reali e la guida di esperti per proteggere il tuo ambiente.
La nostra carrellata delle ultime vulnerabilità e innovazioni della sicurezza cloud che stanno scuotendo il settore e richiedono la tua attenzione.
Uno sguardo all'interno dei nostri dati di ricerca, basati su statistiche di percorsi di attacco reali che abbiamo rilevato in ambienti cloud reali.
Suggerimenti del nostro team di ricerca sulle minacce su come prevenire le violazioni dei dati nella tua azienda e su come migliorare la tua strategia di sicurezza cloud complessiva.
Iscriviti per ricevere gli ultimi aggiornamenti sulla sicurezza del cloud direttamente nella tua casella di posta