Cloud Misconfigurations Expose 110,000 Domains to Extortion in Widespread Campaign

August 16, 2024 at 10:33AM Palo Alto Networks discovered threat actors extorting organizations by exploiting inadvertently exposed environment variables in cloud environments, compromising sensitive information. Over 110,000 domains were targeted, exposing access keys and login credentials for various services. The attackers used various methods to exploit the compromised data and urged organizations to enhance their … Read more

Expired Redis Service Abused to Use Metasploit Meterpreter Maliciously

April 11, 2024 at 02:30PM The cloud platform’s 8-year-old version was compromised by attackers to distribute malware capable of taking over infected systems. It seems like there was a discussion in the meeting about attackers compromising an 8-year-old version of a cloud platform to distribute malware that can take over infected systems. Are there any … Read more

Ongoing Azure Cloud Account Takeover Campaign Targeting Senior Personnel

February 12, 2024 at 11:21AM A cloud account takeover campaign has affected numerous Azure environments and compromised many user accounts. The campaign specifically targets senior personnel. This ongoing threat is a significant security concern within the Azure cloud environment, as reported by SecurityWeek. Based on the meeting notes, it appears that there has been a … Read more

Ongoing Azure Compromises Target Senior Execs, Microsoft 365 Apps

February 12, 2024 at 05:05AM An ongoing campaign targeting Microsoft Azure corporate clouds has compromised dozens of environments and hundreds of user accounts. The attacks involve data exfiltration, financial fraud, and impersonation across various industries and geographic regions. The threat actors show sophistication and adaptability, using tailor-made phishing and diverse toolkits. To defend against this, … Read more

Jupyter Notebook Ripe for Cloud Credential Theft, Researchers Warn

October 18, 2023 at 06:04AM Researchers have discovered a Tunisian hacker using Jupyter Notebook and malware to engage in cryptomining and compromise cloud systems. The incident highlights the importance of prioritizing cloud security as advanced productivity tools are increasingly adopted. Jupyter Notebook is an open-source platform for creating notebook documents that is used in data … Read more