Security News

Hackers target SSRF bugs in EC2-hosted sites to steal AWS credentials
2025-04-09 20:58

A targeted campaign exploited Server-Side Request Forgery (SSRF) vulnerabilities in websites hosted on AWS EC2 instances to extract EC2 Metadata, which could include Identity and Access Management...

AWS rolls out ML-KEM to secure TLS from quantum threats
2025-04-08 14:54

Amazon Web Services (AWS) has added support for the ML-KEM post-quantum key encapsulation mechanism to AWS Key Management Service (KMS), AWS Certificate Manager (ACM), and AWS Secrets Manager,...

5 Impactful AWS Vulnerabilities You're Responsible For
2025-03-31 11:00

If you're using AWS, it's easy to assume your cloud security is handled - but that's a dangerous misconception. AWS secures its own infrastructure, but security within a cloud environment remains...

Finders Keypers: Open-source AWS KMS key usage finder
2025-03-24 05:30

Finders Keypers is an open-source tool for analyzing the current usage of AWS KMS keys. It supports both AWS customer managed KMS keys and AWS Managed KMS keys. Use cases include: Identifying the...

Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail
2025-03-03 17:26

Threat actors are targeting Amazon Web Services (AWS) environments to push out phishing campaigns to unsuspecting targets, according to findings from Palo Alto Networks Unit 42. The cybersecurity...

Check out this free automated tool that hunts for exposed AWS secrets in public repos
2025-02-19 20:45

You can find out if your GitHub codebase is leaking keys ... but so can miscreants A free automated tool that lets anyone scan public GitHub repositories for exposed AWS credentials has been released.…

New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution
2025-02-14 18:42

Cybersecurity researchers have disclosed a new type of name confusion attack called whoAMI that allows anyone who publishes an Amazon Machine Image (AMI) with a specific name to gain code...

Abandoned AWS S3 buckets can be reused in supply-chain attacks that would make SolarWinds look 'insignificant'
2025-02-04 11:00

When cloud customers don't clean up after themselves, part 97 Abandoned AWS S3 buckets could be reused to hijack the global software supply chain in an attack that would make Russia's "SolarWinds...

Protecting AWS environments from cyberthreats
2025-01-28 15:00

The shared responsibility model: why securing AWS workloads is essential Partner Content Organizations are increasingly shifting their deployments to the cloud due to its many benefits over...

Week in review: AWS S3 data encrypted without ransomware, data of 15k Fortinet firewalls leaked
2025-01-19 09:00

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Attackers are encrypting AWS S3 data without using ransomware A ransomware gang dubbed Codefinger...