The Latest News & Insights
Public S3 Bucket Exposure: Misconfiguration Risks in 2025
Casmer Labs, the threat research team within Cloud Storage Security, continues to observe cases in 2025 where sensitive data is exposed through publicly accessible cloud storage. In these cases, exposure typically comes from configuration, not intrusion. A storage resource such as an Amazon S3 bucket is left open to the internet and contains real customer data, financial records, or other regulated information.
Jan 16, 2026
Why Storage Layer Security Is Critical for MSPs Managing AWS Environments
Executive summary Managed service providers have always owned availability, performance, and baseline security for customer environments. In AWS, that responsibility is expanding not because MSPs are adding more services, but because risk is increasingly concentrated in storage.
Cloud Storage Security
Dec 31, 2025
ikeGPS: Advancing Cloud- Native Malware Protection for Geospatial Data in Critical Infrastructure Sectors
ikeGPS provides data solutions that help electric utilities, communications providers, and engineering partners design, build, and inspect overhead infrastructure. With two decades of expertise, ikeGPS is the standard for eight of the ten largest investor - owned electric utilities in North America and five of the ten largest communications companies in the United States. Headquartered in Broomfield, Colorado, its solutions support pole inspections, data collection, and pole loading analysis to enable reliable, safe overhead asset management.
Cloud Storage Security
Nov 4, 2025
What is DSPM in Cyber Security and How to Choose the Right Cloud DSPM Platform
Year after year, more data moves into the cloud. In fact, this year, over 200 zettabytes of data have landed in cloud storage repositories. The nature of that data hasn’t changed — Social Security numbers, cardholder information, intellectual property — but the surface area and accessibility have. Cloud storage’s inherent convenience introduces new risks: attack paths, misconfigurations, insider behavior, and compliance gaps. These challenges demand attention not just with tools, but with architectural clarity and operational readiness. This piece explains what DSPM is, why it matters at the data layer, and what to look for without the buzzwords. TL;DR DSPM discovers and classifies sensitive data in cloud storage, validates storage controls, monitors risky activity, and delivers audit-ready, actor–time–object evidence. Use DSPM alongside CSPM, CNAPP, and DLP to close the blind spot across Amazon S3, EBS, EFS, FSx, and similar services. When evaluating DSPM tools, prioritize coverage depth, in-tenant architecture, ML-based anomaly detection, evidence quality, and predictable pricing.
Cloud Storage Security
Nov 4, 2025
Proactive Malware Protection for Amazon EFS with Cloud Storage Security
TL:DR Cloud Storage Security brings malware protection to Amazon EFS by scanning files in place inside your AWS account with multiple engines. You can schedule or run on demand scans, apply tag quarantine or delete actions, and stream findings to CloudWatch and your SIEM without moving data outside your environment.
Cloud Storage Security
Aug 13, 2025
FTX Japan Breach Exposes 26M Records via Amazon S3 Error
By late 2024 the public cloud had become the default platform for building and running new applications, business workflows, and data processing pipelines. Cloud adoption continued to accelerate through 2025. Industry forecasts place overall cloud spend in the hundreds of billions of dollars by the end of 2025. Analysts also estimate that more than one hundred zettabytes of data will reside in cloud infrastructure by the end of 2025, representing a significant portion of global digital data. As more workloads move, more data follows. Customer records, payment history, internal analytics output, compliance evidence, audit logs, and operational reports are all copied into cloud storage. That data does not live in a single place. It is replicated across object storage, snapshots, file systems, analytics buckets, and backup archives in multiple regions and accounts. Every storage location, for example an Amazon S3 bucket, an Azure Blob container, or a Google Cloud Storage bucket, has dozens of configuration options. A single misconfiguration can make internal data publicly reachable without any exploit.
Casmer Labs
Aug 7, 2025
Preventing Internal and External Data Breaches with DataDefender
In the first half of 2025 Casmer Labs, Cloud Storage Security's internal threat research team, observed a steady increase in high impact data exposure and data theft incidents driven by insider activity, compromised access, and the lack of proactive activity monitoring.
Cloud Storage Security
Jul 30, 2025
Threat Report - July 2025
Casmer Labs, Cloud Storage Security’s (CSS) internal threat laboratory, monitors the dynamic landscape of cybersecurity, cloud security, and particularly cloud data security. Our mission is to ensure that our customers and the public are informed about critical security developments, incidents, and updates.
Cloud Storage Security
Jul 3, 2025
Columbia University Expose 460GB of Sensitive Records in Targeted Hack
Casmer Labs, Cloud Storage Security’s (CSS) internal threat research laboratory, closely monitors breaches and threats impacting cloud environments and particularly the data contained within. In this report, we analyze the June 2025 cyberattack on Columbia University —a significant breach against a higher education institution in terms of scope, impact, and complexity.
Casmer Labs
Jul 2, 2025
June Threat Report: INTERPOL Attacks Infostealers
Casmer Labs, Cloud Storage Security’s (CSS) internal threat laboratory, monitors the dynamic landscape of cybersecurity, cloud security, and particularly cloud data security. Our mission is to ensure that our customers and the public are informed about critical security developments, incidents, and updates.
Casmer Labs