<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cloud Storage apps being abused in Cloud Security</title>
    <link>https://community.isc2.org/t5/Cloud-Security/Cloud-Storage-apps-being-abused/m-p/49071#M145</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;According to Netskope Cloud Storage Apps are being abused to bring payloads to compromise cloud provider clients and systems.&amp;nbsp;&amp;nbsp; One wonders whether a bit of marketing is used to spice this up in reality.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.darkreading.com/cloud/cloud-apps-replace-web-as-source-for-most-malware-downloads" target="_blank"&gt;https://www.darkreading.com/cloud/cloud-apps-replace-web-as-source-for-most-malware-downloads&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
    <pubDate>Mon, 09 Oct 2023 10:04:44 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2023-10-09T10:04:44Z</dc:date>
    <item>
      <title>Cloud Storage apps being abused</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Cloud-Storage-apps-being-abused/m-p/49071#M145</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;According to Netskope Cloud Storage Apps are being abused to bring payloads to compromise cloud provider clients and systems.&amp;nbsp;&amp;nbsp; One wonders whether a bit of marketing is used to spice this up in reality.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.darkreading.com/cloud/cloud-apps-replace-web-as-source-for-most-malware-downloads" target="_blank"&gt;https://www.darkreading.com/cloud/cloud-apps-replace-web-as-source-for-most-malware-downloads&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 10:04:44 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Cloud-Storage-apps-being-abused/m-p/49071#M145</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T10:04:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cloud Storage apps being abused</title>
      <link>https://community.isc2.org/t5/Cloud-Security/Cloud-Storage-apps-being-abused/m-p/49472#M148</link>
      <description>&lt;P&gt;I don't think so. It makes perfectly sense that attackers store their maleware in OneDrive or S3 buckets to circumvent corporate firewalls.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Basically you cannot block access to Microsfot, AWS or Google ressources as many services are using them. Hence they are allowed on corporate firewalls.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you don't have a good Secure Web Gateway which is also checking for maleware you are basically at a high risk. From my point of view this is the message at the end of the day.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just my 2 cents &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Feb 2022 10:36:35 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/Cloud-Storage-apps-being-abused/m-p/49472#M148</guid>
      <dc:creator>StefanGraf</dc:creator>
      <dc:date>2022-02-01T10:36:35Z</dc:date>
    </item>
  </channel>
</rss>

