Close Menu
CloudSecNewsHub
  • News
  • Technologies
  • Automation
  • Updates
  • Guides
  • Tools
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

What's Hot

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025

How to pick up criminal evidence for Microsoft 365

May 8, 2025

Cloud security treatment: American federal edition

May 7, 2025
Facebook X (Twitter) Instagram
Trending
  • Google Cloud Security Plitz attacks e -hunting, improves vision
  • How to pick up criminal evidence for Microsoft 365
  • Cloud security treatment: American federal edition
  • The most prominent report: 2025 Experience of exposure to cloud data
  • Artificial intelligence agents to convert Google Cloud Security Ops
  • The necessity of cloud security in the electronic scene today
  • Gap block: How to simplify QULYS Compliance NCA ECC 2024 for companies
  • Ransomware Spike displays cracks in cloud safety
Facebook X (Twitter) Instagram Pinterest Vimeo
CloudSecNewsHubCloudSecNewsHub
  • News

    How to pick up criminal evidence for Microsoft 365

    May 8, 2025

    The most prominent report: 2025 Experience of exposure to cloud data

    May 7, 2025

    Artificial intelligence agents to convert Google Cloud Security Ops

    May 6, 2025

    Ransomware Spike displays cracks in cloud safety

    May 5, 2025

    Sentinelone wins the best safety point and cloud security at the 2025 SC Awards

    May 1, 2025
  • Technologies

    Gartner: How to build a safe institution cloud environment

    April 21, 2025

    Promote South Korea's national security by adopting the cloud

    April 11, 2025

    “The traditional methods of cloud safety, where organizations depend on the segmented cloud safety tools, are not simply enough”

    April 3, 2025

    Stream.security The cloud solution in actual time in industry with TRP technology designed to dilute proactively from the effect of breach in the cloud

    April 1, 2025

    Skyhawk's creation platform mentioned in 2024 Gartner Emerging Tech Impact Radar: Preventive Cyber ​​Security

    March 28, 2025
  • Automation

    Cloud Security Alliance launches an initiative to automate compliance

    April 30, 2025

    The security automation market to see a great expansion

    April 25, 2025

    GSA FedRAMP '20X' rejuvenation keys to automation, to the approvals in “Weeks” – MERITALK

    April 16, 2025

    Cortex Cloud – cloud safety conversion

    April 11, 2025

    TUFIN extends the possibilities of the security of the cloud and the network with the latest version of the synchronous pavilion

    April 8, 2025
  • Updates

    Google Cloud Security Plitz attacks e -hunting, improves vision

    May 8, 2025

    April 2025 Correction Tuesday: updates and analysis

    April 15, 2025

    Google Cloud 2025: News and updates

    April 12, 2025

    5 Google Big Google Aman ads on the next 2025

    April 9, 2025

    Google offers a unified safety platform and safety agents driven by artificial intelligence

    April 9, 2025
  • Guides

    CISO guide for effective cloud security strategies

    April 30, 2025

    Singapore offers instructions to support the cloud and the elasticity of the first place

    April 29, 2025

    Singapore has new guidelines to enhance flexibility and security for cloud services and data centers

    April 5, 2025

    What is the safety of the cloud? | IBM

    April 3, 2025

    Google gets Wiz for $ 32 billion to boost cloud safety

    March 19, 2025
  • Tools

    Cloud security treatment: American federal edition

    May 7, 2025

    The necessity of cloud security in the electronic scene today

    May 6, 2025

    Crowdstrike (CRWD) launches Amnesty International Security tools to improve the cloud p

    April 30, 2025

    The 5 best CNAPP benefits that you need to know in 2025

    April 26, 2025

    The security coalition cloud launches the latest security report. Saas

    April 26, 2025
  • Compliance

    Gap block: How to simplify QULYS Compliance NCA ECC 2024 for companies

    May 5, 2025

    Ensuring commitment to international standards

    April 29, 2025

    Thales and Deloitte are an alliance to enhance the security and compliance data strategies

    April 22, 2025

    AWS security compliance is easy: IT-Magic Devops solutions for a stronger security situation

    April 21, 2025

    5 ways that banks can achieve smooth security and compliance in 2025

    April 14, 2025
Login
CloudSecNewsHub
Home»News»What the Snowflake Data Breaches Tell Us About Cloud Security
News

What the Snowflake Data Breaches Tell Us About Cloud Security

CloudSecNewsHubBy CloudSecNewsHubJuly 17, 2024No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
What The Snowflake Data Breaches Tell Us About Cloud Security
Share
Facebook Twitter LinkedIn Pinterest Email

Snowflake has been under scrutiny after hacking clients including AT&T and Ticketmaster.

Experts said the breaches were not necessarily Snowflake's fault.

We have tips for organizations looking to better assess cloud security.

Snowflake has been in the grip of a severe heat wave lately. No, we’re not talking about extreme temperatures, but a series of customer data breaches that have thrust the company into an unwanted spotlight. But was this just a series of unfortunate events, or could it tell us something about cloud security more broadly?

First, there’s the question of who’s to blame for the breaches. Cloud computing company Snowflake (SNOW:NYSE) is the common denominator in the breaches that hit AT&T, Ticketmaster and others. But Snowflake has insisted — backed by CrowdStrike and Mandiant — that it wasn’t at fault.

So what's the truth? Well, it boils down to lax security practices.

“The breach occurred as a result of exploiting a vulnerability in single-factor credentials — stolen Snowflake customer credentials — which were then used in a credential stuffing attack to access customer databases,” Sean Dube, chief technology officer at Semperis, told Fierce.

“This underscores the need for a clear understanding of what the customer is responsible for and what the provider is responsible for in a SaaS shared responsibility model,” he continued. “It’s good that the vulnerability wasn’t exploited, but the weak enforcement of the password policy — the lack of a password change enforced by two-factor authentication upon notification of leaked credentials — on Snowflake’s part makes the threat actor’s job much easier.”

In some ways, Snowflake and its customers should have seen this coming.

Matt Shelton, head of threat research and analysis at Google Cloud, said that next to misconfigurations, identity access and management is the biggest vulnerability in cloud platforms of any size.

In fact, weak or non-credential-based attacks accounted for 47% of breaches in the first half of 2024, according to Google Cloud’s Threat Horizon report for the first half of 2024. (See chart below.)

“When data is stored in the cloud without any safeguards like MFA or IAM, you make it incredibly easy for threat actors to access a trove of data with just credentials,” Shelton explained. “They don’t even need to spend the time or resources to create any sophisticated backdoors or malware like they would with an on-premises system.”

What can help prevent attacks like the one that AT&T experienced are measures like Zero Trust controls to effectively manage who can access an organization's cloud environment, Shelton said.

Snow melting?

But whether these breaches are innocent or not, they don’t look good for Snowflake. Especially since AT&T has openly admitted that it was the third-party cloud platform that was accessed. Will these incidents push customers into the arms of giant competitors? And would they be safer if they did?

The answer to the first question is difficult.

“It’s hard to say how Snowflake’s customers, including AT&T, will respond. As we saw with the Solarwinds incident, no cloud service provider is immune to attacks and breaches that can come in many forms,” Leonard Lee of Next Curve said via email. However, “the data breach does not bode well for Snowflake and calls into question the security measures and practices they implemented to prevent the incident, such as enforcing multi-factor authentication (MFA).”

Cybersecurity experts often say that the best thing an organization can do to protect itself is to practice basic hygiene, no matter which cloud provider it works with, he added.

“Often disaster can be avoided by implementing and practicing the basics well,” he told me.

As for the final question – whether supercomputers are inherently the safest bet? The answer is not that simple.

“Cloud data platforms are able to implement the same cloud security controls as large cloud platforms,” Shelton said. “These security controls can be implemented with varying levels of effectiveness, making it important for businesses to choose a reliable cloud provider. Businesses should focus on understanding the security measures their cloud provider offers and supplement them with additional controls as needed.”

Shelton added that companies looking to evaluate the security of a cloud provider should ask some of the following questions:

How does the cloud provider address data sovereignty and data protection requirements? How does it handle identity and access management? What security measures are in place to protect against misconfigurations? How does the cloud provider detect and respond to threats? What does the cloud provider do to address third-party software risks?

At market close today, Snowflake shares were trading at $135.10, down 0.81%.

Read more about the AT&T data breach in our coverage below:

Serious repercussions for AT&T after massive data theft

Massive AT&T Cellphone and Text Message Records Breach Revealed

Breaches cloud data security Snowflake
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTreasury Issues Key Guidance for Financial Institutions
Next Article 5 Best Practices for Cloud Compliance in Healthcare
admin
CloudSecNewsHub
  • Website

Related Posts

Updates

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025
News

How to pick up criminal evidence for Microsoft 365

May 8, 2025
Tools

Cloud security treatment: American federal edition

May 7, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Debian 12.6 released with 84 security updates and 162 bug fixes

July 15, 20241 Views

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 20250 Views

How to pick up criminal evidence for Microsoft 365

May 8, 20250 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Don't Miss
Updates

Google Cloud Security Plitz attacks e -hunting, improves vision

CloudSecNewsHubMay 8, 2025
News

How to pick up criminal evidence for Microsoft 365

CloudSecNewsHubMay 8, 2025
Tools

Cloud security treatment: American federal edition

CloudSecNewsHubMay 7, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

Most Popular

Debian 12.6 released with 84 security updates and 162 bug fixes

July 15, 20241 Views

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 20250 Views

How to pick up criminal evidence for Microsoft 365

May 8, 20250 Views
Don't Miss

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025

How to pick up criminal evidence for Microsoft 365

May 8, 2025

Cloud security treatment: American federal edition

May 7, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

Facebook X (Twitter) Instagram Pinterest
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
© 2025 CloudSecNewsHub. All Rights Reserved

Type above and press Enter to search. Press Esc to cancel.

Sign In or Register

Welcome Back!

Login to your account below.

Lost password?