Tag AWS

Malicious Python Package Steals AWS Credentials

Security Operations Developers’ Credentials Compromised Through Typosquatted ‘Fabric’ Library Prajeet Nair (@prajeetspeaks) • November 11, 2024 Image: Shutterstock A deceptive Python package, masquerading as a popular SSH automation library, has been active on the PyPi repository since 2021. This malicious package is designed to distribute payloads that compromise user credentials…

Read MoreMalicious Python Package Steals AWS Credentials

Essential Principles of Cloud Security Stress Testing

Cloud Security: The Imperative of Penetration Testing "Defenders think in lists, attackers think in graphs," remarked John Lambert from Microsoft, encapsulating the contrasting mindsets of cybersecurity defenders and attackers. This fundamental difference underscores the need for organizations to adopt an attacker’s viewpoint in bolstering their cybersecurity measures. While traditional defense…

Read MoreEssential Principles of Cloud Security Stress Testing

Researchers Discover ‘LLMjacking’ Scheme Targeting AI Models in the Cloud

New Cyberattack Technique Exploits Stolen Cloud Credentials to Target LLM Services Cybersecurity researchers have recently uncovered a sophisticated attack that leverages stolen cloud credentials to infiltrate cloud-hosted large language model (LLM) services. This technique, dubbed LLMjacking by the Sysdig Threat Research Team, poses a significant threat as attackers aim to…

Read MoreResearchers Discover ‘LLMjacking’ Scheme Targeting AI Models in the Cloud

New Cuttlefish Malware Compromises Router Connections to Steal Cloud Credentials

A new cyber threat has emerged, identified as “Cuttlefish,” specifically targeting small office and home office (SOHO) routers. This sophisticated malware aims to covertly monitor all traffic traversing these devices while collecting authentication data from HTTP GET and POST requests. According to a recent report from the Black Lotus Labs…

Read MoreNew Cuttlefish Malware Compromises Router Connections to Steal Cloud Credentials

Non-Human Access: The Path of Least Resistance – A 2023 Overview

New Trends in Cyber Security: The Rising Threat of Non-Human Access As we navigate through 2023, numerous cyber attacks have highlighted a disturbing trend: non-human access is becoming a prevalent attack vector that poses significant security risks to organizations. Recent reports indicate that there have been "11 high-profile attacks in…

Read MoreNon-Human Access: The Path of Least Resistance – A 2023 Overview

Socure Strengthens Identity Services with $136M Acquisition of Effectiv

Socure to Acquire Effectiv: A $136 Million Investment to Enhance Identity Verification Solutions In a strategic move aimed at bolstering its identity verification capabilities, Socure, based in the Lake Tahoe region of Nevada, has announced plans to acquire Effectiv, a startup specializing in risk decisioning. The acquisition, valued at $136…

Read MoreSocure Strengthens Identity Services with $136M Acquisition of Effectiv

Attackers Target Public .env Files to Compromise Cloud Accounts in Extortion Scheme

A significant extortion campaign has emerged, targeting various organizations by exploiting publicly accessible environment variable files (commonly ending in .env) that contain sensitive credentials for cloud and social media applications. This alarming trend underscores the vulnerabilities in data security practices across industries. According to a report by Palo Alto Networks’…

Read MoreAttackers Target Public .env Files to Compromise Cloud Accounts in Extortion Scheme

New “ALBeast” Misconfiguration Reveals Vulnerabilities in AWS Application Load Balancer

Recent investigations have uncovered a significant cybersecurity vulnerability affecting approximately 15,000 applications that utilize Amazon Web Services’ (AWS) Application Load Balancer (ALB) for authentication purposes. This configuration issue could enable malicious actors to bypass access controls, thereby compromising the security of these applications. The research, conducted by the Israeli cybersecurity…

Read MoreNew “ALBeast” Misconfiguration Reveals Vulnerabilities in AWS Application Load Balancer