The Latest News & Insights

    blog post card image
    FTX Japan Breach Exposes 26M Records via Amazon S3 Error

    By late 2024 the public cloud had become the default platform for building and running new applications, business workflows, and data processing pipelines. Cloud adoption continued to accelerate through 2025. Industry forecasts place overall cloud spend in the hundreds of billions of dollars by the end of 2025. Analysts also estimate that more than one hundred zettabytes of data will reside in cloud infrastructure by the end of 2025, representing a significant portion of global digital data. As more workloads move, more data follows. Customer records, payment history, internal analytics output, compliance evidence, audit logs, and operational reports are all copied into cloud storage. That data does not live in a single place. It is replicated across object storage, snapshots, file systems, analytics buckets, and backup archives in multiple regions and accounts. Every storage location, for example an Amazon S3 bucket, an Azure Blob container, or a Google Cloud Storage bucket, has dozens of configuration options. A single misconfiguration can make internal data publicly reachable without any exploit.

    blog post card image
    Preventing Internal and External Data Breaches with DataDefender

    In the first half of 2025 Casmer Labs, Cloud Storage Security's internal threat research team, observed a steady increase in high impact data exposure and data theft incidents driven by insider activity, compromised access, and the lack of proactive activity monitoring.

    blog post card image
    Threat Report - July 2025

    Casmer Labs, Cloud Storage Security’s (CSS) internal threat laboratory, monitors the dynamic landscape of cybersecurity, cloud security, and particularly cloud data security. Our mission is to ensure that our customers and the public are informed about critical security developments, incidents, and updates.

    blog post card image
    Casmer Labs Presents: Quarterly Threat Report (Q2 25')

    The cyber threat landscape is constantly changing, influenced by global politics, technological advances, and more. In 2023, ChatGPT was first used to generate malicious code; in 2024, infostealers and high-profile attacks on federal and Fortune 500 organizations rose. In Q2 of 2025, new alarming trends made themselves known.

    blog post card image
    Why the Lack of Cloud Monitoring Causes Data Breaches

    In the past 6 months, a number of high-profile data breaches, namely cryptocurrency exchange Coinbase, have resulted in the loss of millions of records and millions of dollars in fines, pipeline depletion, and restitution for the affected customers. In many ways, these data breaches are not the result of a lack of commitment to security by these companies, but are rather indicative of the evolving (and improving) tactics utilized by bad actors.

    blog post card image
    Columbia University Expose 460GB of Sensitive Records in Targeted Hack

    Casmer Labs, Cloud Storage Security’s (CSS) internal threat research laboratory, closely monitors breaches and threats impacting cloud environments and particularly the data contained within. In this report, we analyze the June 2025 cyberattack on Columbia University —a significant breach against a higher education institution in terms of scope, impact, and complexity.

    June Threat Report
    June Threat Report: INTERPOL Attacks Infostealers

    Casmer Labs, Cloud Storage Security’s (CSS) internal threat laboratory, monitors the dynamic landscape of cybersecurity, cloud security, and particularly cloud data security. Our mission is to ensure that our customers and the public are informed about critical security developments, incidents, and updates.

    blog post card image
    Secure Amazon S3 with Advanced Access Control and Antivirus Scanning

    The typical enterprise organization stores high volumes of data in cloud storage services such as Amazon S3– with much of this data being sensitive or otherwise business critical in nature. Particularly for organizations who leverage data lakes built on Amazon S3, the sheer volume of data housed within one (or a few) individual storage resources is staggering. Scaling cloud infrastructure requires implementing proper access controls and comprehensive malware protection. These measures limit exposure to bad actors and unintended user mistakes, protecting against data breaches, system disruptions, and financial losses. Implementing these controls secures the cloud and helps achieve certifications like ISO 27001. Cloud Storage Security Antivirus for Amazon S3 enhances Amazon S3's native features, offering advanced antivirus scanning and malware protection.

    Managing Configurations at Scale with Datadefender
    Managing Misconfigurations at Scale With DataDefender

    Modern enterprises understand that their data stores are ever-growing– and becoming more distributed through more IT systems, accounts, resources, and more. An enterprise with hundreds of cloud accounts and thousands of buckets and volumes would have been a statistical anomaly 10 years ago. In 2025, cloud usage at this scale is commonplace.

    angled bg image

    Tired of Reading?

    Want to watch something instead?

    watch video blog cta image 614x261