Academia CloudSec

Bem-vindo à CloudSec Academy, seu guia para navegar pela sopa de letrinhas dos acrônimos de segurança em nuvem e jargão do setor. Livre-se das distrações com conteúdo claro, conciso e habilmente elaborado, cobrindo os fundamentos para as melhores práticas.

Malware Detection: Tools and Techniques

Equipe de especialistas do Wiz

To defend against malware in the cloud, businesses need a detection and response solution that’s built for the cloud, fluent in cloud-based indicators of compromise (IOCs), and enriched by cloud threat intelligence.

7 Serious AI Security Risks and How to Mitigate Them

Equipe de especialistas do Wiz

There are many sneaky AI security risks that could impact your organization. Learn practical steps to protect your systems and data while still leveraging AI's benefits.

What Is a Brute Force Attack? Types and Countermeasures

Equipe de especialistas do Wiz

A brute force attack is a cybersecurity threat where a hacker attempts to access a system by systematically testing different passwords until a correct set of credentials is identified.

O que é Shadow IT? Causas, riscos e exemplos

Equipe de especialistas do Wiz

Shadow IT é o uso não autorizado de serviços, aplicativos e recursos de TI por um funcionário que não são controlados ou visíveis para o departamento de TI de uma organização.

Source Code Leaks: Risks, Examples, and Prevention

Equipe de especialistas do Wiz

In this blog post, we’ll explore security measures and continuous monitoring strategies to prevent these leaks, mitigating the risks posed by security vulnerabilities, human error, and attacks.

LLM Security for Enterprises: Risks and Best Practices

Equipe de especialistas do Wiz

LLM models, like GPT and other foundation models, come with significant risks if not properly secured. From prompt injection attacks to training data poisoning, the potential vulnerabilities are manifold and far-reaching.

Data Leakage: riscos, causas e prevenção

O vazamento de dados é a exfiltração descontrolada de dados organizacionais para terceiros. Isso ocorre por vários meios, como bancos de dados mal configurados, servidores de rede mal protegidos, ataques de phishing ou até mesmo manuseio descuidado de dados.

The Threat of Adversarial AI

Equipe de especialistas do Wiz

Adversarial artificial intelligence (AI), or adversarial machine learning (ML), is a type of cyberattack where threat actors corrupt AI systems to manipulate their outputs and functionality.

What is LLM Jacking?

LLM jacking is an attack technique that cybercriminals use to manipulate and exploit an enterprise’s cloud-based LLMs (large language models).

What is Credential Access (TA0006)?

Equipe de especialistas do Wiz

Credential access is a cyberattack technique where threat actors access and hijack legitimate user credentials to gain entry into an enterprise's IT environments.