Business in the front, party in the back: backdoors in elastic servers expose private data

Credit to Author: Vasilios Hioureas| Date: Fri, 17 Jan 2020 18:58:47 +0000

It’s all too easy to discover data leaks online, especially in cloud services. We take a look at misconfigurations in elastic servers that lead to exposed data on the Internet.

Categories:

Tags:

(Read more…)

The post Business in the front, party in the back: backdoors in elastic servers expose private data appeared first on Malwarebytes Labs.

Read more

Sophos e AWS collaborano per fornire una risposta rapida alle minacce cloud

Credit to Author: Sophos Italia| Date: Fri, 06 Dec 2019 07:41:34 +0000

Siamo lieti di sostenere le ultime novità in fatto di sicurezza del cloud pubblico con la presentazione di Amazon Detective e AWS Identity and Access Management Access Analyzer all’evento AWS re:Invent 2019<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/r9H3T8-ScHA” height=”1″ width=”1″ alt=””/>

Read more

Sophos and AWS collaborate to provide rapid response to cloud threats

Credit to Author: Rich Beckett| Date: Tue, 03 Dec 2019 20:03:27 +0000

We’re excited to support the latest advances in public cloud security with the launch of Amazon Detective and AWS Identity and Access Management Access Analyzer at AWS re:Invent 2019.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/BMU-grXPTso” height=”1″ width=”1″ alt=””/>

Read more

Travel database exposed PII on US government employees

Credit to Author: Danny Bradbury| Date: Wed, 23 Oct 2019 10:32:40 +0000

A property management company owned by hotel chain Best Western has exposed 179 GB of sensitive travel information on thousands of travelers.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/ya-mCNqAOjw” height=”1″ width=”1″ alt=””/>

Read more

Hacking with AWS: incorporating leaky buckets into your OSINT workflow

Credit to Author: Vasilios Hioureas| Date: Fri, 13 Sep 2019 20:44:52 +0000

When penetration testing for an organization, what OSINT tactics can researchers employ? We discuss how hacking with AWS buckets can provide more recon data and uncover any leaks.

Categories:

Tags:

(Read more…)

The post Hacking with AWS: incorporating leaky buckets into your OSINT workflow appeared first on Malwarebytes Labs.

Read more

Capital One breach exposes over 100 million credit card applications

Credit to Author: Pieter Arntz| Date: Fri, 02 Aug 2019 16:00:00 +0000

The Capital One data breach is an exceptional example, if only because of how much we already know. Not only that, but the breach happened to one of the technical front-runners in banking.

Categories:

Tags:

(Read more…)

The post Capital One breach exposes over 100 million credit card applications appeared first on Malwarebytes Labs.

Read more