The Latest News & Insights

    blog post card image
    Massive Data Breach Could Affect 10% of Texas-Based Truckers

    Casmer Labs, the threat research team within Cloud Storage Security, has continued to observe cases in 2025 where sensitive data became exposed through publicly accessible cloud storage. These exposures are typically caused by configuration, not intrusion. A storage resource such as an Amazon S3 bucket is left open to the internet and ends up holding real personal and compliance documentation. In these situations, no exploit is required. If an S3 bucket allows public read or list access, anyone who can locate it can download its contents. That is a cloud data exposure event even if there was no malware, credential theft, or lateral movement. One recent case involving AJT Compliance LLC shows how severe this can get.

    blog post card image
    August Threat Report: Qilin Attacks Inotiv & Nissan, NFCU Exposes 378TB

    Casmer Labs is the internal threat research team within Cloud Storage Security. We monitor activity in cybersecurity, cloud security, and cloud data security. Our role is to document material incidents and explain where organizations are still exposed.

    ransomware protection blog post image
    Ransomware Protection and Defense: A Comprehensive Guide

    Ransomware attacks are among the most disruptive and costly cybersecurity incidents experienced by healthcare organizations and other businesses. Attackers see a tremendous opportunity to extract large sums of money by holding data hostage. And by preying on organizations that have valuable data, mission-critical systems, and insufficient defenses, these attackers too often succeed.

    healthcare ransomware and solutions to protect your business and data
    Identify and Mitigate Ransomware Threats in Healthcare

    If cybercriminals have their way, you won’t know your healthcare organization has been attacked with ransomware until it’s too late. By the time they demand a sizable ransom, your highly sensitive patient data will already be encrypted, locking you out. You’ll need to shut down critical systems, curtail services, and set your emergency plan into motion.

    Image of cars illustrating the lessons learned from the CDK global cyberattack on mitigating ransomware threats to protect businesses and their data
    Dude, Where's My Car?

    Mitigating Ransomware Threats: Lessons from the CDK Global Cyberattack

    How to Secure Amazon S3 and Cloud Storage from Malware
    Ransomware: The Hidden Threat in Cloud Storage

    According to a release from the U.S. Department of Justice, “Roughly $350 million in ransom was paid to malicious cyber actors in 2020, a more than 300% increase from the previous year”. With Amazon S3 buckets continuously being the storage medium for uploaded files by most organizations, the attack surface is only increasing when an S3 bucket is left misconfigured and storing infected files.

    angled bg image

    Tired of Reading?

    Want to watch something instead?

    watch video blog cta image 614x261