X

Vous n'êtes pas connecté

Maroc Maroc - THECYBERTHRONE.IN - A La Une - 18/Feb 01:26

whoAMI Attack Exploiting AWS EC2 Instances

The “whoAMI” attack is a sophisticated name confusion attack that targets Amazon Web Services (AWS) accounts, particularly those using EC2 instances. Discovered by researchers at Datadog Security Labs, this attack exploits the way software projects retrieve Amazon Machine Image (AMI) IDs to create EC2 instances. Nature of the Attack The “whoAMI” attack leverages the name […]

Articles similaires

Sorry! Image not available at this time

whoAMI attacks give hackers code execution on Amazon EC2 instances

bleepingcomputer.com - 13/Feb 23:35

Security researchers discovered a name confusion attack that allows access to an Amazon Web Services account to anyone that publishes an Amazon...

Sorry! Image not available at this time

whoAMI attack could allow remote code execution within AWS account

securityaffairs.co - 17/Feb 09:05

Researchers warn that the whoAMI attack lets attackers publish an AMI with a specific name to execute code in an AWS account. Cybersecurity...

Sorry! Image not available at this time

New Golang-based backdoor relies on Telegram for C2 communication

itsecuritynews.info - 17/Feb 19:11

Netskope Threat Labs researchers discovered a Golang-based backdoor using Telegram for C2 communication, possibly of Russian origin. Netskope Threat...

Sorry! Image not available at this time

New Golang-based backdoor relies on Telegram for C2 communication

securityaffairs.co - 17/Feb 18:41

Netskope Threat Labs researchers discovered a Golang-based backdoor using Telegram for C2 communication, possibly of Russian origin. Netskope Threat...

Sorry! Image not available at this time

MoovingON and Datadog Announces Strategic Partnership to Deliver Enhanced Datadog’s Cloud Observability and Reliability Solutions to Businesses in Israel

bestproductsreview.in  - 10/Feb 13:26

“This partnership with Datadog is a major step in bringing top cloud observability to Israeli businesses,” said Asaf Matyas, VP Sales...

Sorry! Image not available at this time

New Go-Based Malware Exploits Telegram and Use It as C2 Channel

itsecuritynews.info - 15/Feb 12:32

Researchers have identified a new backdoor malware, written in Go programming language, that leverages Telegram as its command-and-control (C2)...

Sorry! Image not available at this time

DarkMind A Novel Backdoor Attack Exploits Reasoning Capabilities of Customized LLMs

itsecuritynews.info - 18/Feb 12:11

A groundbreaking study by researchers Zhen Guo and Reza Tourani at Saint Louis University has exposed a novel vulnerability in customized large...

Sorry! Image not available at this time

Experts discovered PostgreSQL flaw chained with BeyondTrust zeroday in targeted attacks

securityaffairs.co - 14/Feb 09:23

Threat actors are exploiting a zero-day SQL injection vulnerability in PostgreSQL, according to researchers from cybersecurity firm Rapid7. Rapid7...

Sorry! Image not available at this time

New Phishing Attacks Abuses Webflow CDN & CAPTCHAs to Steal Credit Card details

itsecuritynews.info - 13/Feb 13:05

Netskope Threat Labs has uncovered a sophisticated phishing campaign targeting users across various industries, including technology, manufacturing,...

Sorry! Image not available at this time

Attackers used a public ASP.NET machine to conduct ViewState code injection attacks

securityaffairs.co - 07/Feb 09:31

Microsoft researchers warn that threat actors are delivering the Godzilla framework using a static ASP.NET machine. In December 2024, Microsoft Threat...

Les derniers communiqués

  • Aucun élément