AWS
- APPLICATIONS
Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data
Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that’s capable of harvesting sensitive developer-related…
Read More » - APPLICATIONS
Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI
î ‚Jun 05, 2025î „Ravie LakshmananNetwork Security / Vulnerability Cisco has released security patches to address a critical security flaw impacting the…
Read More » - APPLICATIONS
AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation
Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web Services that could open the…
Read More » - APPLICATIONS
5 Impactful AWS Vulnerabilities You’re Responsible For
î ‚Mar 31, 2025î „The Hacker NewsIntrusion Detection / Vulnerability If you’re using AWS, it’s easy to assume your cloud security is…
Read More » - APPLICATIONS
Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail
î ‚Mar 03, 2025î „Ravie LakshmananCloud Security / Email Security Threat actors are targeting Amazon Web Services (AWS) environments to push out…
Read More » - APPLICATIONS
New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution
î ‚Feb 14, 2025î „Ravie LakshmananVulnerability / DevOps Cybersecurity researchers have disclosed a new type of name confusion attack called whoAMI that…
Read More »