The Latest News & Insights

    blog post card image
    Public S3 Bucket Exposure: Misconfiguration Risks in 2025

    Casmer Labs, the threat research team within Cloud Storage Security, continues to observe cases in 2025 where sensitive data is exposed through publicly accessible cloud storage. In these cases, exposure typically comes from configuration, not intrusion. A storage resource such as an Amazon S3 bucket is left open to the internet and contains real customer data, financial records, or other regulated information. When an S3 bucket is publicly readable, often called an S3 bucket misconfiguration, anyone with the URL can download its contents. That is a cloud data exposure event even if there is no exploit, malware, or credential theft involved.

    blog post card image
    Massive Data Breach Could Affect 10% of Texas-Based Truckers

    Casmer Labs, the threat research team within Cloud Storage Security, has continued to observe cases in 2025 where sensitive data became exposed through publicly accessible cloud storage. These exposures are typically caused by configuration, not intrusion. A storage resource such as an Amazon S3 bucket is left open to the internet and ends up holding real personal and compliance documentation. In these situations, no exploit is required. If an S3 bucket allows public read or list access, anyone who can locate it can download its contents. That is a cloud data exposure event even if there was no malware, credential theft, or lateral movement. One recent case involving AJT Compliance LLC shows how severe this can get.

    blog post card image
    August Threat Report: Qilin Attacks Inotiv & Nissan, NFCU Exposes 378TB

    Casmer Labs is the internal threat research team within Cloud Storage Security. We monitor activity in cybersecurity, cloud security, and cloud data security. Our role is to document material incidents and explain where organizations are still exposed.

    blog post card image
    World’s Largest Credit Union Leaks 378GB of Data

    Cloud Growth and Escalating Risk Cloud computing has reshaped how organizations store, manage, and secure information. The global public cloud market has accelerated from roughly one hundred fifty six billion dollars in 2020 to projections in the hundreds of billions of dollars for 2025, with some estimates approaching nine hundred billion dollars in total cloud spend. At the same time, overall data volume continues to increase. Industry analysts expect that more than one hundred zettabytes of information will reside in cloud infrastructure by the end of 2025. That would account for a significant share of global digital data. As more data moves to the cloud, the risk surface changes. Applications, workflows, and regulated data are distributed across multiple accounts, regions, and services. Each storage location such as an Amazon S3 bucket, an EBS snapshot, or an EFS file system has its own configuration model. A single misconfiguration can expose internal information at scale.

    blog post card image
    FTX Japan Breach Exposes 26M Records via Amazon S3 Error

    By late 2024 the public cloud had become the default platform for building and running new applications, business workflows, and data processing pipelines. Cloud adoption continued to accelerate through 2025. Industry forecasts place overall cloud spend in the hundreds of billions of dollars by the end of 2025. Analysts also estimate that more than one hundred zettabytes of data will reside in cloud infrastructure by the end of 2025, representing a significant portion of global digital data. As more workloads move, more data follows. Customer records, payment history, internal analytics output, compliance evidence, audit logs, and operational reports are all copied into cloud storage. That data does not live in a single place. It is replicated across object storage, snapshots, file systems, analytics buckets, and backup archives in multiple regions and accounts. Every storage location, for example an Amazon S3 bucket, an Azure Blob container, or a Google Cloud Storage bucket, has dozens of configuration options. A single misconfiguration can make internal data publicly reachable without any exploit.

    blog post card image
    Columbia University Expose 460GB of Sensitive Records in Targeted Hack

    Casmer Labs, Cloud Storage Security’s (CSS) internal threat research laboratory, closely monitors breaches and threats impacting cloud environments and particularly the data contained within. In this report, we analyze the June 2025 cyberattack on Columbia University —a significant breach against a higher education institution in terms of scope, impact, and complexity.

    June Threat Report
    June Threat Report: INTERPOL Attacks Infostealers

    Casmer Labs, Cloud Storage Security’s (CSS) internal threat laboratory, monitors the dynamic landscape of cybersecurity, cloud security, and particularly cloud data security. Our mission is to ensure that our customers and the public are informed about critical security developments, incidents, and updates.

    blog post card image
    Secure Amazon S3 with Advanced Access Control and Antivirus Scanning

    The typical enterprise organization stores high volumes of data in cloud storage services such as Amazon S3– with much of this data being sensitive or otherwise business critical in nature. Particularly for organizations who leverage data lakes built on Amazon S3, the sheer volume of data housed within one (or a few) individual storage resources is staggering. Scaling cloud infrastructure requires implementing proper access controls and comprehensive malware protection. These measures limit exposure to bad actors and unintended user mistakes, protecting against data breaches, system disruptions, and financial losses. Implementing these controls secures the cloud and helps achieve certifications like ISO 27001. Cloud Storage Security Antivirus for Amazon S3 enhances Amazon S3's native features, offering advanced antivirus scanning and malware protection.

    Managing Configurations at Scale with Datadefender
    Managing Misconfigurations at Scale With DataDefender

    Modern enterprises understand that their data stores are ever-growing– and becoming more distributed through more IT systems, accounts, resources, and more. An enterprise with hundreds of cloud accounts and thousands of buckets and volumes would have been a statistical anomaly 10 years ago. In 2025, cloud usage at this scale is commonplace.

    angled bg image

    Tired of Reading?

    Want to watch something instead?

    watch video blog cta image 614x261