Netskope

netskope

Amazon themed Phish hosted in Azure Sites

Netskope Threat Research Labs recently found an Amazon-themed phishing page hosted by Azure App Service. The phishing page was created with an intent to steal Amazon credentials and other sensitive personally identifiable information (PII) from the victims. In an earlier post, phishing in the public cloud, we detailed phishing campaigns that used public cloud hosting services to serve up parts of the attack. Here, the entirety of the attack is hosted solely in Azure.

netskope

Cloud Security Use Case #3: Ensure Social Media Compliance

I recently blogged about the two of the most common cloud security use cases that customers are covering with Netskope. I would like to continue the discussion and talk about use case #3, which is ensuring social media compliance. Even with all the upside, there are a number of challenges that are impacting the adoption of social media in the enterprise.

netskope

Customer Zero: a case study

Being CISO for a security technology vendor can be an interesting position. My job combines the usual CISO responsibilities alongside daily self and industry analysis as I support our own product teams to continually improve their understanding of, and support for my industry peers. In this role, I thought it would be interesting to share a recent experience of a security threat originating from one of our enterprise software cloud service providers.

netskope

The 3D approach to User Identity

Most of us are certainly familiar with the notion of 3D video. It has gained tremendous popularity over the last decade, with more and more blockbuster motion pictures being screened in 3D. Why is 3D gaining such popularity, and what is the main benefit that 3D adds over traditional flat 2D? The answer is simple – it’s all about the depth perception.

netskope

Google Storage Bucket Misconfiguration

Rhino Labs recently released a tool for scanning Google Cloud Storage (GCS) buckets, called GCPBruteBucket. The tool gives users an easy way to search for publicly exposed buckets being hosted by Google Cloud Platform (GCP). Netskope Threat Research Labs used this tool to scan a subset of the Majestic Million for not just exposed buckets, but buckets that would allow anonymous users to change permissions.