Hackers Exploiting Azure Key Vault Access Policies To Read Sensitive Data

Hackers Exploiting Azure Key Vault Access Policies To Read Sensitive Data

A critical security configuration in Azure Key Vault has been discovered, potentially allowing users with the Key Vault Contributor role to access sensitive data contrary to Microsoft's documented intentions. This finding, reported by Datadog to...
Beware Of New Phishing Attacks Stealing Microsoft Azure Cloud Logins

New Phishing Attack Exploiting HubSpot Tools To Steal Microsoft Azure Logins

A sophisticated phishing campaign targeting European companies. The attack, which peaked in June 2024, aims to harvest Microsoft Azure cloud credentials and compromise victims' cloud infrastructure. The campaign primarily targets automotive, chemical, and industrial compound...
Azure Data Factory And Apache Airflow Integration Flaws Let Attackers Gain Write Access

Azure Data Factory And Apache Airflow Integration Flaws Let Attackers Gain Write Access

Researchers uncovered new security vulnerabilities in the Azure Data Factory Apache Airflow integration dubbed “Dirty DAG”, which allow attackers to get unauthorized write permissions to a directed acyclic graph (DAG) file or use a...
Russian BlueAlpha APT Abuses Cloudflare Tunnels To Deliver Custom Malware

Russian BlueAlpha APT Abuses Cloudflare Tunnels To Deliver Custom Malware

The state-sponsored cyber threat group BlueAlpha has been active since at least 2014 and has recently upgraded its malware delivery system to leverage Cloudflare Tunnels to stage GammaDrop malware.  BlueAlpha has been observed employing spear...
Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit

Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit

Hackers often target cloud services due to their vast attack surface and the widespread presence of vulnerabilities. Not only that, but even the increasing dependence on cloud infrastructure across various industries boosts the possible impact...
Trend Micro Cloud Edge Vulnerability Let Attackers Execute Arbitrary Code

Trend Micro Cloud Edge Vulnerability Let Attackers Execute Arbitrary Code

Trend Micro has issued an urgent security bulletin warning users of a critical vulnerability in its Cloud Edge appliance that could allow remote attackers to execute arbitrary code without authentication. The vulnerability tracked as...
Storm-0501 Ransomware Group Attacking Hybrid Cloud Environments

Storm-0501 Ransomware Group Attacking Hybrid Cloud Environments

Ransomware groups are organized cybercriminal entities that deploy malicious software to encrypt victims' data, demanding ransom payments for decryption keys. The rise of ransomware groups has led to an increase in ransomware incidents globally, affecting...
Researchers Backdoored Azure Automation Account Packages And Runtime Environments 

Azure Automation Account Packages & Runtime Environments Backdoored

Azure Automation is a service that automates processes across various cloud platforms, making it easier to manage complicated hybrid setups.  It comes with a runtime environment that lets users set up the environment for running...
Cloudflare Launches Free Threat Intelligence for 10 New Security Tools

Cloudflare Launches Free Threat Intelligence for 10 New Security Tools

 Cloudflare has launched free threat intelligence and over ten new security tools available to all its customers. This initiative addresses some of the most pressing cybersecurity challenges, including account takeover attacks, supply chain attacks,...
TeamTNT Hackers Attacking VPS Servers Running CentOS

TeamTNT Hackers Attacking VPS Servers Running CentOS

A notorious hacking group known as TeamTNT has resurfaced with a new campaign targeting Virtual Private Server (VPS) infrastructures running on the CentOS operating system. The group, known for its cryptojacking activities, has been active...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...