Security News

Week in review: AWS S3 data encrypted without ransomware, data of 15k Fortinet firewalls leaked
2025-01-19 09:00

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Attackers are encrypting AWS S3 data without using ransomware A ransomware gang dubbed Codefinger...

Attackers are encrypting AWS S3 data without using ransomware
2025-01-13 16:59

A ransomware gang dubbed Codefinger is encrypting data stored in target organizations’ AWS S3 buckets with AWS’s server-side encryption option with customer-provided keys (SSE-C), and asking for...

Ransomware abuses Amazon AWS feature to encrypt S3 buckets
2025-01-13 15:27

A new ransomware campaign encrypts Amazon S3 buckets using AWS's Server-Side Encryption with Customer Provided Keys (SSE-C) known only to the threat actor, demanding ransoms to receive the...

Crooks stole AWS credentials from misconfigured sites then kept them in open S3 bucket
2024-12-09 16:15

ShinyHunters-linked heist thought to have been ongoing since March Exclusive A massive online heist targeting AWS customers during which digital crooks abused misconfigurations in public websites...

The Rise of S3 Ransomware: How to Identify and Combat It
2023-10-25 11:36

In today's digital landscape, around 60% of corporate data now resides in the cloud, with Amazon S3 standing as the backbone of data storage for many major corporations. Despite S3 being a secure...

How to set up and speed up Amazon S3 Replication for cross-region data replication
2023-09-21 04:30

A popular replication solution for AWS is Amazon S3 Replication, a robust feature that replicates objects and their metadata across multiple S3 buckets. Disaster recovery and data redundancy: Cross-region replication is an integral component of disaster recovery strategies, ensuring data integrity, and mitigating data loss through backups and active/passive or active/active failover strategies.

S3 Ep149: How many cryptographers does it take to change a light bulb?
2023-08-24 20:50

Researchers have discovered how to trick you into thinking your iPhone is in Airplane mode while actually leaving mobile data turned on. The main one seems to be that when you're setting up the light bulb for the first time, there is some effort put into making sure that the app and the light bulb each reason that they are communicating with the right sort of code at the other end.

#S3
S3 Ep148: Remembering crypto heroes
2023-08-17 19:43

ATMs always take your card right in, don't they? So the idea of these ATM skimming crooks is they're not just interested in your card details, like a web phisher would be.

S3 Ep147: What if you type in your password during a meeting?
2023-08-10 19:34

DUCK. So we did get the Mark I, and I guess it was the last mainstream digital computer that had a driveshaft, Doug, operated by an electrical motor. DUCK. I think they intended that as a slightly humorous note, but they did note that previous research, not their own, has discovered that touch-typers tend to be much more regular about the way that they type.

#S3
S3 Ep146: Tell us about that breach! (If you want to.)
2023-08-03 17:56

The root of the problem is that shared CPU components, like the internal memory system, combine attacker data and data from any other application, resulting in a combined leakage signal in the power consumption. Whether just suffering a ransomware attack is inevitably enough to be a material data breach.