Articles tagged "Amazon"

Found 20 articles

U.S. Senator Chuck Grassley is investigating eight major tech companies for potentially failing to properly report instances of child sexual abuse material (CSAM). The companies under scrutiny include Meta, Amazon AI Services, TikTok, Snapchat, Discord, X.AI, Grindr, and Roblox. This inquiry follows concerns about how these platforms handle and report CSAM, which is a significant issue given the potential harm to children and the legal obligations these companies have. Grassley's investigation aims to ensure that these tech giants are held accountable for their reporting practices and that they take necessary steps to protect vulnerable users. The outcome of this probe could lead to stricter regulations and oversight of how online platforms manage and report such sensitive content.

Impact: Meta, Amazon AI Services, TikTok, Snapchat, Discord, X.AI, Grindr, Roblox
Remediation: Companies should improve their reporting mechanisms for CSAM and ensure compliance with legal requirements.
Read Original

A significant credential harvesting campaign has been detected, utilizing the React2Shell vulnerability (CVE-2025-55182) to gain access to sensitive data from 766 Next.js hosts. Attackers are stealing various credentials, including database logins, SSH private keys, AWS secrets, Stripe API keys, and GitHub tokens. This operation has been linked to a threat group that Cisco Talos is monitoring. The widespread nature of this breach is concerning, as it affects a range of developers and companies using Next.js, potentially compromising their applications and user data. Companies need to be vigilant and take immediate steps to secure their systems against this threat.

Impact: Next.js hosts, database credentials, SSH private keys, Amazon Web Services (AWS) secrets, Stripe API keys, GitHub tokens.
Remediation: Organizations should patch their systems to address the React2Shell vulnerability (CVE-2025-55182) and implement security best practices such as limiting access to sensitive credentials, regularly rotating keys and secrets, and monitoring for unauthorized access attempts.
Read Original

The latest ThreatsDay Bulletin highlights a range of pressing cybersecurity threats impacting various systems. Researchers are reporting on the alarming trend of chaining together minor vulnerabilities to create significant backdoors, which could allow attackers to gain unauthorized access. Additionally, there are ongoing concerns about Android rootkits and methods for evading AWS CloudTrail logging, raising red flags for cloud security. These developments underscore the need for organizations to stay vigilant and proactive in patching software and monitoring their systems for unusual activity. With cyber threats evolving quickly, it’s crucial for companies to keep their defenses updated and educate their teams on the latest risks.

Impact: Android devices, AWS CloudTrail, various software with known vulnerabilities
Remediation: Regularly update software, patch known vulnerabilities, monitor for unusual activity
Read Original

The European Commission has confirmed a data breach affecting its AWS infrastructure, compromising sensitive information. While specific details regarding the extent of the breach remain limited, the incident raises concerns about the security of cloud services used by governmental bodies. The breach could potentially expose personal data and operational information, impacting trust in the Commission's digital systems. This incident highlights the ongoing risks associated with cloud computing, especially for entities dealing with sensitive or confidential data. Users and stakeholders are advised to remain vigilant and review their cybersecurity protocols in light of this breach.

Impact: AWS infrastructure used by the European Commission
Remediation: N/A
Read Original

The European Commission is looking into a security breach involving its Amazon cloud infrastructure. Unauthorized access was gained by a threat actor, raising concerns about the potential exposure of sensitive data. This incident is particularly significant because it affects a major governmental body within the European Union, which handles important regulatory and policy decisions. The investigation aims to assess the scope of the breach and determine any necessary actions to safeguard data moving forward. This incident serves as a reminder of the vulnerabilities that can exist even within high-profile organizations and the importance of robust security measures in cloud environments.

Impact: Amazon cloud infrastructure, European Commission data
Remediation: N/A
Read Original

Amazon Threat Intelligence has issued a warning regarding an active ransomware campaign known as Interlock, which is exploiting a significant vulnerability in Cisco's Secure Firewall Management Center (FMC) Software. This vulnerability, identified as CVE-2026-20131, has a maximum severity score of 10.0 and stems from an insecure deserialization of user-supplied Java byte streams. This flaw could allow attackers to gain root access without authentication, posing a serious risk to organizations using affected Cisco products. The exploitation of this vulnerability is concerning as it enables unauthorized access, potentially leading to data breaches and system compromises. Companies using Cisco FMC Software must take immediate action to protect their systems from this ongoing threat.

Impact: Cisco Secure Firewall Management Center (FMC) Software
Remediation: Organizations should immediately update their Cisco FMC Software to the latest version to mitigate this vulnerability. Additionally, they should review their security configurations and consider implementing network segmentation and access controls to limit exposure.
Read Original
New Phishing Scam Uses LiveChat to Pose as Amazon and PayPal in Real Time

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Cofense researchers have identified a new phishing scam where attackers use LiveChat to impersonate customer service agents from Amazon and PayPal. This tactic enables them to interact with victims in real-time, making the scam appear more convincing. The goal is to extract sensitive information such as credit card details and multi-factor authentication (MFA) codes. This type of scam poses a significant risk to users who may inadvertently share their financial information with these impersonators. As online shopping and payment services continue to grow, consumers need to be more vigilant about verifying the identity of customer service representatives to avoid falling victim to such schemes.

Impact: Amazon, PayPal
Remediation: Users should verify the authenticity of customer service communications and avoid sharing sensitive information through chat platforms without confirming the identity of the representative.
Read Original

A recent social engineering campaign is targeting individuals by impersonating well-known companies like PayPal and Amazon. Attackers are using customer support interactions through LiveChat to trick users into revealing sensitive information, including credit card details and personal data. This type of phishing attack takes advantage of the trust that users place in these popular services, making it easier for the criminals to manipulate their victims. It's crucial for users to stay vigilant and verify the authenticity of any communication claiming to be from these companies, especially when asked for personal information. As these tactics become more sophisticated, both consumers and companies must be cautious about sharing sensitive data online.

Impact: PayPal, Amazon, LiveChat users
Remediation: Users should verify the authenticity of communications from PayPal and Amazon, avoid sharing sensitive information through chat, and report suspicious interactions to the companies.
Read Original

A recent security flaw in the AWS Bedrock Code Interpreter has raised concerns among cloud users. This vulnerability involves a DNS-based attack that allows AI sandboxes to exfiltrate sensitive data from cloud environments. The issue affects AWS Bedrock's AgentCore, which is crucial for running AI applications in a secure environment. Companies using AWS Bedrock services need to be aware of this vulnerability as it could potentially expose their data to unauthorized access. This incident underscores the need for enhanced security measures in cloud-based AI applications.

Impact: AWS Bedrock, AWS Bedrock Code Interpreter, AWS Bedrock AgentCore
Remediation: Users should immediately review their AWS Bedrock configurations and apply any available security patches provided by AWS to mitigate the risk of data exfiltration.
Read Original

A federal judge has ruled that Perplexity's AI browser cannot make purchases on Amazon, following a lawsuit filed by Amazon last year. The lawsuit accused Perplexity of computer fraud, claiming that its AI browser accessed password-protected accounts to buy items without authorization. This decision is significant as it addresses the legal implications of AI technology interacting with online marketplaces. The ruling raises questions about the ethical use of AI in e-commerce and the protection of user accounts. It also highlights the ongoing legal battles surrounding AI capabilities and their potential for misuse.

Impact: Amazon accounts accessed by Perplexity's AI browser
Remediation: N/A
Read Original

Recent outages at major cloud service providers like AWS, Azure, and Cloudflare have significantly disrupted internet services, affecting countless websites and applications. These incidents caused widespread interruptions for businesses and consumers who rely on these platforms for daily operations. Not only did users face difficulties accessing services, but many organizations found their workflows halted as a result of the outages. The ripple effects of these disruptions highlight the interconnected nature of online services and the vulnerabilities that can arise from relying on a few key providers. As outages become more frequent, understanding their impact is crucial for organizations that depend on cloud infrastructure.

Impact: AWS, Azure, Cloudflare, various websites and applications
Remediation: Organizations should evaluate their cloud dependencies and consider diversifying their service providers to reduce risk.
Read Original

TA584, a known threat actor, is currently using compromised email accounts to distribute malicious content through services like SendGrid and Amazon SES. Their attack method incorporates tools such as Tsundere Bot and XWorm, which are designed to gain unauthorized access to networks. This tactic raises concerns for organizations that rely on these email services, as attackers can exploit trusted channels to deliver malware. The use of legitimate platforms for malicious purposes complicates detection and prevention efforts. Companies need to be vigilant and enhance their security measures to protect against such sophisticated email-based attacks.

Impact: SendGrid, Amazon SES, Tsundere Bot, XWorm
Remediation: Implement email security measures, monitor for unusual account activity, and educate employees on phishing threats.
Read Original

Amazon Web Services (AWS) has released an updated compliance report for its Payment Cryptography service, confirming that it meets Payment Card Industry Personal Identification Number (PCI PIN) standards. This update follows a thorough audit by a Qualified Security Assessor (QSA). The compliance package is now available on AWS's compliance portal and includes an Attestation of Compliance (AOC) as well as additional documentation. This is significant for businesses using AWS Payment Cryptography, as it assures them that the service adheres to stringent security measures for handling payment data. Ensuring compliance not only helps protect sensitive information but also builds trust with customers who rely on secure payment processing.

Impact: AWS Payment Cryptography service
Remediation: N/A
Read Original

A misconfiguration in AWS CodeBuild has left key repositories vulnerable to potential attacks. This flaw could allow unauthorized access to sensitive data stored within those repositories, posing a significant risk to companies relying on AWS for their software development and deployment processes. Developers and organizations using AWS CodeBuild should be aware of this vulnerability and take immediate action to secure their environments. The issue emphasizes the need for stringent security practices, especially in cloud-based development tools. As this misconfiguration could impact a wide range of users, timely remediation is essential to prevent exploitation.

Impact: AWS CodeBuild, core repositories
Remediation: Review and adjust AWS CodeBuild configurations to ensure proper access controls are in place.
Read Original

Recent data from Chainalysis reveals that North Korea has stolen approximately $2 billion in cryptocurrency through cyber operations. This surge in digital theft is part of a broader strategy to fund the country's activities, including its weapons programs. Concurrently, Amazon has identified and blocked around 1,800 fake IT workers believed to be linked to North Korean cybercriminals. These workers were likely part of a scheme to infiltrate legitimate companies and potentially facilitate further cyber thefts. The implications of these actions are significant, as they show the ongoing threat posed by state-sponsored hacking groups and the need for companies to enhance their security measures against such attacks.

Impact: Cryptocurrency, Amazon IT services
Remediation: Companies should enhance their cybersecurity protocols and monitor for unusual activity, especially related to remote workers.
Read Original
Page 1 of 2Next