Tag AWS

⚡ THN Weekly Recap: Stolen Google Secrets, Windows Breach, Latest Crypto Scams, and More!

This week’s cybersecurity update delves into various evolving threats, including a sophisticated phishing technique used by Russian threat actors. Covering issues from device code phishing to cloud-based attacks, this summary transforms complex technicalities into comprehensible insights, tailored for tech-savvy professionals. ⚡ Threat of the Week The recent disclosure from Microsoft…

Read More⚡ THN Weekly Recap: Stolen Google Secrets, Windows Breach, Latest Crypto Scams, and More!

Coinbase Targeted in GitHub Actions Supply Chain Attack; Secrets Exposed from 218 Repositories’ CI/CD Pipelines

Supply Chain Attack Targets GitHub Action, Compromising Sensitive Data A recent supply chain attack has raised significant cybersecurity concerns, particularly for businesses relying on open-source projects. This incident originated from the GitHub Action “tj-actions/changed-files,” which was initially directed at one of Coinbase’s open-source initiatives but subsequently expanded in scale. According…

Read MoreCoinbase Targeted in GitHub Actions Supply Chain Attack; Secrets Exposed from 218 Repositories’ CI/CD Pipelines

Telecom and BPO Firms Targeted by SIM Swapping Hackers

A targeted cyber intrusion campaign has been actively engaging telecommunications and business process outsourcing (BPO) companies since at least June 2022. This ongoing assault aims to infiltrate mobile carrier networks and is characterized by SIM swapping techniques, as highlighted in recent investigations by CrowdStrike. Researcher Tim Parisi detailed these findings…

Read MoreTelecom and BPO Firms Targeted by SIM Swapping Hackers

Hackers Leverage AWS Misconfigurations to Execute Phishing Attacks Using SES and WorkMail

Amazon Web Services Targeted in Phishing Campaigns by Threat Group TGR-UNK-0011 Recent investigations by Palo Alto Networks’ Unit 42 have unveiled alarming activities targeting Amazon Web Services (AWS). The threat group known as TGR-UNK-0011, which has been active since 2019, is leveraging misconfigurations within AWS environments to execute sophisticated phishing…

Read MoreHackers Leverage AWS Misconfigurations to Execute Phishing Attacks Using SES and WorkMail

Amazon EC2 SSM Agent Vulnerability Fixed After Path Traversal Leads to Privilege Escalation

Recent findings by cybersecurity experts have unveiled a significant vulnerability within the Amazon EC2 Simple Systems Manager (SSM) Agent, a flaw that has since been patched. Should it have been exploited by malicious actors, the vulnerability could have led to unauthorized privilege escalation and code execution on affected systems. The…

Read MoreAmazon EC2 SSM Agent Vulnerability Fixed After Path Traversal Leads to Privilege Escalation

Safe{Wallet} Reveals North Korean TraderTraitor Hackers Stole $1.5 Billion in Bybit Heist

Safe{Wallet} has disclosed that the breach associated with the Bybit crypto heist, which resulted in a staggering loss of $1.5 billion, was carried out by a highly sophisticated, state-sponsored actor believed to be linked to North Korea. This group took specific measures to eliminate evidence of their activities, thereby complicating…

Read MoreSafe{Wallet} Reveals North Korean TraderTraitor Hackers Stole $1.5 Billion in Bybit Heist

GCP Cloud Composer Vulnerability Allows Attackers to Elevate Access through Malicious PyPI Packages

Vulnerability in Google Cloud Composer Exposes Privilege Escalation Risk Recent findings by cybersecurity experts have unveiled a significant vulnerability in the Google Cloud Platform (GCP), specifically within the Cloud Composer service, which orchestrates workflows based on Apache Airflow. This flaw, dubbed “ConfusedComposer,” has since been addressed and could have potentially…

Read MoreGCP Cloud Composer Vulnerability Allows Attackers to Elevate Access through Malicious PyPI Packages