Security News

AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation
2025-05-20 12:42

Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web Services that could open the door for attackers to escalate privileges,...

Analyze resource-based policy dependencies across your AWS Organizations accounts
2025-05-09 05:00

Managing multiple AWS accounts in an organization can get complicated, especially when trying to understand how services and permissions are connected. The Account Assessment for AWS Organizations...

Hackers target SSRF bugs in EC2-hosted sites to steal AWS credentials
2025-04-09 20:58

A targeted campaign exploited Server-Side Request Forgery (SSRF) vulnerabilities in websites hosted on AWS EC2 instances to extract EC2 Metadata, which could include Identity and Access Management...

AWS rolls out ML-KEM to secure TLS from quantum threats
2025-04-08 14:54

Amazon Web Services (AWS) has added support for the ML-KEM post-quantum key encapsulation mechanism to AWS Key Management Service (KMS), AWS Certificate Manager (ACM), and AWS Secrets Manager,...

5 Impactful AWS Vulnerabilities You're Responsible For
2025-03-31 11:00

If you're using AWS, it's easy to assume your cloud security is handled - but that's a dangerous misconception. AWS secures its own infrastructure, but security within a cloud environment remains...

Finders Keypers: Open-source AWS KMS key usage finder
2025-03-24 05:30

Finders Keypers is an open-source tool for analyzing the current usage of AWS KMS keys. It supports both AWS customer managed KMS keys and AWS Managed KMS keys. Use cases include: Identifying the...

Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail
2025-03-03 17:26

Threat actors are targeting Amazon Web Services (AWS) environments to push out phishing campaigns to unsuspecting targets, according to findings from Palo Alto Networks Unit 42. The cybersecurity...

Check out this free automated tool that hunts for exposed AWS secrets in public repos
2025-02-19 20:45

You can find out if your GitHub codebase is leaking keys ... but so can miscreants A free automated tool that lets anyone scan public GitHub repositories for exposed AWS credentials has been released.…

New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution
2025-02-14 18:42

Cybersecurity researchers have disclosed a new type of name confusion attack called whoAMI that allows anyone who publishes an Amazon Machine Image (AMI) with a specific name to gain code...

Abandoned AWS S3 buckets can be reused in supply-chain attacks that would make SolarWinds look 'insignificant'
2025-02-04 11:00

When cloud customers don't clean up after themselves, part 97 Abandoned AWS S3 buckets could be reused to hijack the global software supply chain in an attack that would make Russia's "SolarWinds...