Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail
Mar 03, 2025Ravie LakshmananCloud Security / Email Security Threat actors are targeting…
New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution
Feb 14, 2025Ravie LakshmananVulnerability / DevOps Cybersecurity researchers have disclosed a new…
Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws
Jan 16, 2025Ravie LakshmananEndpoint Security / Ransomware Cybersecurity researchers have detailed an…
Anthropic Just Became America’s Most Intriguing AI Company
While most AI companies chase viral moments, Anthropic has made waves once…
The Problem of Permissions and Non-Human Identities
According to research from GitGuardian and CyberArk, 79% of IT decision-makers reported…
AWS Cloud Development Kit Vulnerability Exposes Users to Potential Account Takeover Risks
Cybersecurity researchers have disclosed a security flaw impacting Amazon Web Services (AWS)…
AWS and Boerse Stuttgart Digital team up to offer crypto solutions to EU financial institutions
The partnership was in response to retail customers and corporates seeking ways…
Key Indicators in CloudTrail Logs for Stolen API Keys
Aug 20, 2024The Hacker NewsCybersecurity / Cloud Security As cloud infrastructure becomes…
Experts Uncover Severe AWS Flaws Leading to RCE, Data Theft, and Full-Service Takeovers
Aug 09, 2024Ravie LakshmananCloud Security / Data Protection Cybersecurity researchers have discovered…