Amazon has alerted users that Sandworm, a group associated with Russia's military intelligence, has changed its approach to cyberattacks. Instead of exploiting software vulnerabilities, the group is now targeting poorly configured network edge devices to maintain access to their targets. This shift raises concerns for organizations that may not have secured their network configurations adequately. The focus on these devices suggests attackers are adapting their strategies to exploit weaknesses in network management rather than relying on traditional software flaws. This change could lead to increased risks for various industries, especially those with critical infrastructure that may be vulnerable due to lax network settings.
Articles tagged "Amazon"
Found 20 articles
AWS Security has reported that multiple China-linked threat actors began exploiting the React2Shell vulnerability (CVE-2025-55182) within hours of its disclosure. Although this flaw does not affect AWS services, the rapid exploitation highlights the urgency for organizations to address this vulnerability to prevent potential breaches.
SCM feed for Latest
The 2025 State of Cloud Security report highlights a significant cybersecurity threat due to the prevalence of outdated cloud identities, with 59% of AWS IAM users and 55% of Google Cloud service accounts having active keys older than one year. This creates a substantial attack surface, increasing the risk of unauthorized access and potential breaches.
Coupang, a major South Korean e-commerce platform, has reported a significant data breach affecting approximately 34 million customers over a five-month period. The breach has exposed personal information, raising concerns about customer privacy and security.
Iran-linked hackers have been involved in cyber warfare to support real-world missile strikes, highlighting the dangerous convergence of cyber attacks and kinetic warfare. This trend indicates a growing need for new frameworks to address the evolving nature of warfare, as traditional boundaries between cyber and physical attacks become increasingly blurred.