whoAMI Attack Exploiting AWS EC2 Instances

whoAMI Attack Exploiting AWS EC2 Instances

The "whoAMI" attack is a sophisticated name confusion attack that targets Amazon Web Services (AWS) accounts, particularly those using EC2 instances. Discovered by researchers at Datadog Security Labs, this attack…
Codefinger Ransomware Dissection

Codefinger Ransomware Dissection

The Codefinger ransomware campaign is a sophisticated and highly targeted attack aimed at users of Amazon Web Services (AWS). Unlike conventional ransomware attacks, Codefinger leverages AWS's own encryption tools to…
EleKtra-Leak Campaign Targets AWS

EleKtra-Leak Campaign Targets AWS

Palo Alto Networks Unit 42 warns about a new campaign targeting AWS IAM credentials within public GitHub repositories. The campaign dubbed as EleKtra-Leak, described as both sophisticated and concerning, due…
AWS Introduces European Sovereign Cloud

AWS Introduces European Sovereign Cloud

AWS has previewed the European Sovereign Cloud, an upcoming network of data centers that will be used by government agencies and highly regulated enterprises in the European Union. As per…
AWS Console and MFA Requirements

AWS Console and MFA Requirements

AWS customers will be required to use MFA to log into their AWS Management Console starting mid-2024 in a move designed to strengthen the security posture of AWS. The decision…
AWS Introduces Dedicated Local Zones

AWS Introduces Dedicated Local Zones

AWS has introduced Dedicated Local Zones, enabling customers to isolate sensitive workloads to meet their digital sovereignty requirements. This new option is designed for public sector and regulated industry customers…
New Attack Vector in AWS possess a Threat

New Attack Vector in AWS possess a Threat

Researchers have uncovered a new type of threat that evolves in the newly introduces AWS functionality The attack vector relates to AWS VPC  feature ‘Elastic IP transfer,’ which was announced…