Cloud

CloudSOC – An OpenSource Project for SOC & Security AnalystsCloudSOC – An OpenSource Project for SOC & Security Analysts

CloudSOC – An OpenSource Project for SOC & Security Analysts

Security Operations Centers (SOCs) and security analysts are under immense pressure to stay ahead of potential attacks. Enter CloudSOC, an…

7 months ago
Hackers Exploited Digital Advertising Tools to Launch Malicious CampaignsHackers Exploited Digital Advertising Tools to Launch Malicious Campaigns

Hackers Exploited Digital Advertising Tools to Launch Malicious Campaigns

Cybersecurity researchers from Mandiant and Google Cloud have uncovered a sophisticated scheme where hackers exploit digital advertising tools to conduct…

7 months ago
Hackers Abusing Google Cloud For PhishingHackers Abusing Google Cloud For Phishing

Hackers Abusing Google Cloud For Phishing

Threat actors often attack cloud services for several illicit purposes. Google Cloud is targeted due to its extensive and powerful…

8 months ago
New TE.0 HTTP Request Smuggling Flaw Impacts Google Cloud WebsitesNew TE.0 HTTP Request Smuggling Flaw Impacts Google Cloud Websites

New TE.0 HTTP Request Smuggling Flaw Impacts Google Cloud Websites

HTTP Request Smuggling is a flaw in web security that is derived from variations in the way different web servers…

9 months ago
Cloud-Based Malware Attack Abusing Google Drive & DropboxCloud-Based Malware Attack Abusing Google Drive & Dropbox

Cloud-Based Malware Attack Abusing Google Drive & Dropbox

A phishing email with a malicious zip attachment initiates the attack. The zip contains a single executable disguised as an…

11 months ago
Critical Memory Corruption In Cloud Logging Infrastructure Enables Code Execution AttackCritical Memory Corruption In Cloud Logging Infrastructure Enables Code Execution Attack

Critical Memory Corruption In Cloud Logging Infrastructure Enables Code Execution Attack

Fluent Bit, a widely used open-source data collector and processor, has been found to have a major memory loss flaw.…

11 months ago
New LLMjacking Used Stolen Cloud Credentials to Attack Cloud LLM ServersNew LLMjacking Used Stolen Cloud Credentials to Attack Cloud LLM Servers

New LLMjacking Used Stolen Cloud Credentials to Attack Cloud LLM Servers

Researchers have identified a new form of cyberattack termed "LLMjacking," which exploits stolen cloud credentials to hijack cloud-hosted large language…

11 months ago
Attackers Leverage Sidecar Container Injection Technique To Stay StealthyAttackers Leverage Sidecar Container Injection Technique To Stay Stealthy

Attackers Leverage Sidecar Container Injection Technique To Stay Stealthy

Kubernetes (K8s) is an open-source container orchestration platform designed to automate application container deployment, scaling, and running.  Containers are isolated…

11 months ago
Ahoi Attacks – New Attack Breaking VMs With Malicious InterruptsAhoi Attacks – New Attack Breaking VMs With Malicious Interrupts

Ahoi Attacks – New Attack Breaking VMs With Malicious Interrupts

Ahoy, which is often associated with communicating to ships, has now been playfully adopted in pirate language. We coin 'Ahoi,'…

12 months ago
DarkGate Malware Abusing Cloud Storage & SEO Following Delivery Over TeamsDarkGate Malware Abusing Cloud Storage & SEO Following Delivery Over Teams

DarkGate Malware Abusing Cloud Storage & SEO Following Delivery Over Teams

DarkGate loader delivery surged after the Qakbot takedown, with financially motivated actors like TA577 and ransomware groups (BianLian, Black Basta)…

1 year ago