Browsing Tag
AWS
84 posts
Hackers Use Fake PoCs on GitHub to Steal WordPress Credentials, AWS Keys
SUMMARY Datadog Security Labs’ cybersecurity researchers have discovered a new, malicious year-long campaign from a threat actor identified…
December 17, 2024
Fabrice Malware on PyPI Has Been Stealing AWS Credentials for 3 Years
The malicious Python package “Fabrice” on PyPI mimics the “Fabric” library to steal AWS credentials, affecting thousands. Learn how…
November 7, 2024
EMERALDWHALE Steals 15,000+ Cloud Credentials, Stores Data in S3 Bucket
Operation EMERALDWHALE compromises over 15,000 cloud credentials, exploiting exposed Git and Laravel files. Attackers use compromised S3 buckets…
November 1, 2024
Russian Cozy Bear Hackers Phish Critical Sectors with Microsoft, AWS Lures
Russian state-sponsored hackers Cozy Bear are targeting over 100 organizations globally with a new phishing campaign. This sophisticated…
October 30, 2024
ALBeast: Misconfiguration Flaw Exposes 15,000 AWS Load Balancers to Risk
ALBeast is a critical vulnerability that allows attackers to bypass authentication and authorization in AWS ALB-based applications. Learn…
August 21, 2024
Black Hat USA 2024: AWS ‘Bucket Monopoly’ Flaw Led to Account Takeover
Black Hat USA 2024 is up and running at full pace as critical AWS vulnerabilities are exposed! Learn…
August 8, 2024
In the jungle of AWS S3 Enumeration
Amazon Web Services (AWS) Simple Storage Service (S3) is a foundational pillar of cloud storage, offering scalable object…
May 31, 2024
One Phish, Two Phish, Red Phish, Blue Phish
One of the interesting things about working for a cybersecurity company is that you get to talk to…
May 30, 2024
Criminal IP: Enhancing Security Solutions through AWS Marketplace Integration
AI SPERA, a leader in Cyber Threat Intelligence (CTI) solutions, announced today that its proprietary search engine, Criminal…
May 22, 2024
New Vulnerability “LeakyCLI” Leaks AWS and Google Cloud Credentials
A critical vulnerability named LeakyCLI exposes sensitive cloud credentials from popular tools used with AWS and Google Cloud. This poses a major risk for developers, showing the need for strong security practices. Learn how to mitigate LeakyCLI and fortify your cloud infrastructure.
April 16, 2024