#cloudsecurity

2026-01-15

🚨 Lambda Watchdog CVE Report 🚨
Latest AWS Lambda image scan detected 25 CVEs across 27 images:
• 🔴 Critical: 0
• 🟠 High: 10
• 🟡 Medium: 12
• 🔵 Low: 3

Check the full report 👉 lambdawatchdog.com/
#AWS #Lambda #CVE #CloudSecurity #Serverless

2026-01-15

🚨 New LOW CVE detected in AWS Lambda 🚨
GHSA-73rr-hh4g-fpgx impacts diff in 4 Lambda base images.

Details: github.com/aws/aws-lambda-base
More: lambdawatchdog.com/

#AWS #Lambda #CVE #CloudSecurity #Serverless

Lambda Watchdoglambdawatchdog
2026-01-15

🚨 New LOW CVE detected in AWS Lambda 🚨
GHSA-73rr-hh4g-fpgx impacts diff in 4 Lambda base images.

Details: github.com/aws/aws-lambda-base
More: lambdawatchdog.com/

2026-01-15

🚨 New LOW CVE detected in AWS Lambda 🚨
GHSA-73rr-hh4g-fpgx impacts diff in 4 Lambda base images.

Details: github.com/aws/aws-lambda-base
More: lambdawatchdog.com/

#AWS #Lambda #CVE #CloudSecurity #Serverless

2026-01-15

🚨 Lambda Watchdog CVE Report 🚨
Latest AWS Lambda image scan detected 25 CVEs across 27 images:
• 🔴 Critical: 0
• 🟠 High: 10
• 🟡 Medium: 12
• 🔵 Low: 3

Check the full report 👉 lambdawatchdog.com/
#AWS #Lambda #CVE #CloudSecurity #Serverless

Lambda Watchdoglambdawatchdog
2026-01-15

🚨 Lambda Watchdog CVE Report 🚨
Latest AWS Lambda image scan detected 25 CVEs across 27 images:
• 🔴 Critical: 0
• 🟠 High: 10
• 🟡 Medium: 12
• 🔵 Low: 3

Check the full report 👉 lambdawatchdog.com/

🏆 BSI C5 certification for mailbox confirms full compliance with BSI criteria for cloud security!

mailbox has been awarded the C5 Type 1 certification by the German Federal Office for Information Security (BSI). The BSI C5 certification complements mailbox's ISO/IEC 27001 certification.

Learn more about our cloud security standards: mailbox.org/en/news/bsi-c5-cer

#BSI #C5Certification #ISO27001 #CloudSecurity #InformationSecurity #DataSecurity #mailbox

BSI C5 certificate for mailbox confirms cloud securityWhat does C5 mean? The Cloud Computing Compliance Criteria Catalogue (C5) is a catalogue of criteria developed specifically for cloud providers that raises the information security, availability and confidentiality of your data to a tested and verifiable level.‘mailbox has been committed to data security for years. We are therefore particularly pleased that the certificate officially confirms this.’
Peer Heinlein, founder and CEOmailbox: certified data security. In addition to the C5 certificate and the ISO 27001 certificate, mailbox has been awarded further quality seals: Learn more - Link in post.

Level up your hacking knowledge and defensive skills with today’s cyber playlist. 🚀 youtube.com/playlist?list=PLXq

#CyberSecurity #ZeroTrust #Hacking #CloudSecurity #CyberDefense

2026-01-14

It's been a busy 24 hours in the cyber world with a flurry of significant data breaches, critical vulnerabilities (including an actively exploited zero-day), and some fascinating new threat intelligence on malware and attack techniques. Let's dive in:

Recent Cyber Attacks and Breaches 🚨

- Multiple organisations have reported data breaches, affecting millions of individuals. Monroe University disclosed a 2024 breach impacting over 320,000 people, exposing personal, financial, and health data. Spanish energy giant Endesa is investigating claims of a 1.05 TB data theft affecting 20 million customers.
- Australia's Victorian Department of Education reset student passwords after an attack exposed names, school details, and encrypted passwords, while cloud marketplace Pax8 accidentally exposed internal business and Microsoft licensing data for 1,800 MSP partners.
- Eurail confirmed a breach exposing passport numbers, bank details, and even photocopies of IDs for some DiscoverEU travellers. In Belgium, AZ Monica hospitals were hit by a cyberattack, forcing surgery cancellations and the transfer of critical patients, likely due to ransomware. Poland also thwarted a major cyberattack on its power grid, attributing it to Russia.
- Ukraine's Defense Forces were targeted in a charity-themed campaign by the Russian 'Void Blizzard' (aka 'Laundry Bear') group, delivering the PluggyApe backdoor via malicious PIF files in instant messages.

🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🕵🏼 The Register | go.theregister.com/feed/www.th
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🕵🏼 The Register | go.theregister.com/feed/www.th
🕵🏼 The Register | go.theregister.com/feed/www.th
🗞️ The Record | therecord.media/belgium-hospit
🗞️ The Record | therecord.media/poland-cyberat
🤖 Bleeping Computer | bleepingcomputer.com/news/secu

New Threat Research and Tradecraft 🛡️

- North Korea's IT worker scheme and cryptocurrency heists continue to fund its weapons program, impacting over 40 countries. The U.S. urged UN member states to take tougher action, highlighting the sophisticated identity theft and remote work fraud used by these actors.
- A new, advanced cloud-native Linux malware framework, VoidLink, has been discovered. Written in Zig, Go, and C, it features custom loaders, implants, rootkits, and over 30 plugins designed for modern cloud environments (Kubernetes, Docker, AWS, GCP, Azure), with sophisticated anti-analysis and anti-forensics capabilities.
- Researchers identified a "Reprompt" attack method that could hijack Microsoft Copilot sessions, allowing attackers to exfiltrate sensitive data via hidden malicious prompts in URLs. This leverages parameter-to-prompt injection, double-request, and chain-request techniques to bypass safeguards.
- The DeadLock ransomware gang is using Polygon smart contracts to hide their command-and-control (C2) infrastructure, making it difficult for defenders to block their operations. This novel technique allows for frequent rotation of proxy server URLs, a method also observed with North Korean state-sponsored attackers.
- Microsoft, in collaboration with international law enforcement, disrupted RedVDS, a fast-growing cybercrime-as-a-service marketplace. RedVDS facilitated over $40 million in fraud, providing cybercriminals with disposable virtual computers for phishing, business email compromise, and real estate scams.
- Predator spyware operators are using sophisticated anti-analysis techniques, including an error code system (e.g., "error code 304" for security tools detected) to diagnose failed infections and evade researchers. It also suppresses crash logs and can detect network monitoring by privacy-conscious users.
- The Kimwolf botnet, a splinter of the Aisuru DDoS botnet, has rapidly grown to over 2 million infected unofficial Android TV devices. Its operators abuse residential proxy networks for local control, primarily targeting Minecraft servers with short, high-volume DDoS attacks.

🗞️ The Record | therecord.media/40-countries-i
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🕵🏼 The Register | go.theregister.com/feed/www.th
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🕵🏼 The Register | go.theregister.com/feed/www.th
🤫 CyberScoop | cyberscoop.com/microsoft-seize
🗞️ The Record | therecord.media/microsoft-redv
🤫 CyberScoop | cyberscoop.com/predator-spywar
🤫 CyberScoop | cyberscoop.com/kimwolf-aisuru-

Vulnerabilities and Exploitation ⚠️

- Microsoft's January Patch Tuesday addressed 112 vulnerabilities, including one actively exploited information disclosure zero-day (CVE-2026-20805) in Desktop Window Manager. This medium-severity flaw (CVSS 5.5) can leak memory addresses, potentially aiding privilege escalation or arbitrary code execution, and CISA has added it to its Known Exploited Vulnerabilities catalog.
- Vulnerabilities in popular AI/ML Python libraries (NeMo, Uni2TS, FlexTok) used in Hugging Face models allow remote attackers to hide and execute malicious code in metadata. These RCE flaws, tracked by CVEs, stem from improper use of Hydra's instantiate() function, affecting models with millions of downloads.
- A "most severe AI-driven vulnerability to date" in ServiceNow's Virtual Agent chatbot allowed arbitrary attackers to gain full platform control. Authentication issues (universal credential, email-only user impersonation) combined with agentic AI capabilities enabled admin account creation and lateral movement to connected systems.
- A critical Node.js vulnerability (CVE-2025-59466, CVSS 7.5) can cause server crashes via async_hooks stack overflow, leading to denial-of-service. This impacts numerous frameworks and APM tools like React Server Components, Next.js, and Datadog, as Node.js exits instead of gracefully handling the exception.
- Exploit code has been publicly released for a critical FortiSIEM command injection flaw (CVE-2025-25256), allowing unauthenticated remote attackers to execute commands or code. The vulnerability, a combination of arbitrary write with admin permissions and privilege escalation to root, affects versions 6.7 to 7.5.

🤫 CyberScoop | cyberscoop.com/microsoft-patch
🕵🏼 The Register | go.theregister.com/feed/www.th
🗞️ The Record | therecord.media/desktop-window
🕵🏼 The Register | go.theregister.com/feed/www.th
🚨 Dark Reading | darkreading.com/remote-workfor
📰 The Hacker News | thehackernews.com/2026/01/crit
🤖 Bleeping Computer | bleepingcomputer.com/news/secu

Threat Landscape Commentary 🌍

- Taiwan is experiencing a significant increase in cyber pressure from China, with an average of 2.63 million attacks daily in 2025, a 6% rise from the previous year. Energy infrastructure saw a tenfold increase, and emergency/hospital systems a 54% jump, indicating a deliberate attempt to disrupt critical infrastructure during both peacetime and potential conflict.
- Western cyber agencies, including the NCSC, CISA, and FBI, have issued new guidance warning about growing digital threats to industrial operational technology (OT). With OT systems increasingly connected, they present a larger attack surface for ransomware gangs and state-backed hackers, necessitating strong authentication, network segmentation, and minimised remote access.

🚨 Dark Reading | darkreading.com/cyber-risk/tai
🗞️ The Record | therecord.media/cyber-agencies

Data Privacy 🔒

- California's Attorney General has launched an investigation into xAI's Grok AI tool over allegations it's being used to create nonconsensual sexually explicit deepfakes of women and children. This follows similar probes by the UK's Ofcom and the Paris Prosecutor's Office, highlighting growing regulatory concern over AI-generated content.
- The California Privacy Protection Agency (CPPA) Board has appointed Nicole Ozer, a privacy and surveillance expert and former ACLU leader, as a new member. This appointment is expected to significantly influence the agency's data privacy policy decisions.

🗞️ The Record | therecord.media/california-gro
🤫 CyberScoop | cyberscoop.com/california-ag-i
🗞️ The Record | therecord.media/ccpa-appoints-

Regulatory Issues and Changes ⚖️

- France's data protection regulator, CNIL, has fined telecom companies Free and Free Mobile a collective €42 million ($48.9 million) for GDPR violations stemming from an October 2024 data breach that compromised over 24 million customer records, including IBANs. The fines were due to inadequate security measures (weak VPN authentication, ineffective detection), insufficient breach notification, and excessive data retention.

🕵🏼 The Register | go.theregister.com/feed/www.th
🗞️ The Record | therecord.media/france-data-re
🤖 Bleeping Computer | bleepingcomputer.com/news/secu

Government Staffing and Program Changes 🏛️

- Alex Fitzsimmons, acting director of the Department of Energy’s Office of Cybersecurity, Energy and Emergency Response (CESER), endorsed new cybersecurity bills for the energy sector and highlighted a new AI-driven cyber defence program, AI-FORTS. This comes amidst Democratic concerns over thousands of job cuts at the Department of Energy impacting cybersecurity and reliability.
- Sean Plankey has been re-nominated by President Trump to lead the Cybersecurity and Infrastructure Security Agency (CISA). His previous nomination stalled in the Senate last year due to holds from Senators over unrelated issues.

🤫 CyberScoop | cyberscoop.com/ceser-chief-tou
🤫 CyberScoop | cyberscoop.com/sean-plankey-re

Everything Else 💡

- Anthropic, an AI upstart, has invested $1.5 million in the Python Software Foundation (PSF) to enhance security in the Python ecosystem, specifically CPython and the Python Package Index (PyPI). This aims to protect millions of PyPI users from supply-chain attacks and could benefit other open-source package repositories.
- Microsoft has resolved a known issue where security applications were incorrectly flagging a core Windows component, WinSqlite3.dll, as vulnerable to a memory corruption flaw (CVE-2025-6965). The update addresses these false positive detections across various Windows client and server platforms.

🕵🏼 The Register | go.theregister.com/feed/www.th
🤖 Bleeping Computer | bleepingcomputer.com/news/micr

#CyberSecurity #ThreatIntelligence #DataBreach #Ransomware #Vulnerability #ZeroDay #APT #Malware #AI #CloudSecurity #OTSecurity #GDPR #InfoSec #PatchTuesday #IncidentResponse

2026-01-14

📢⚠️ New China linked VoidLink Linux malware targets major cloud providers like AWS, Azure and Google Cloud to steal data and evade detection.

Read: hackread.com/china-voidlink-li

#CyberSecurity #Malware #CloudSecurity #Linux #VoidLink

2026-01-14

VoidLink is a new cloud-native Linux malware framework with 30+ plugins, adaptive cloud detection, and stealth-focused evasion targeting AWS, Azure, and GCP.

technadu.com/voidlink-cloud-na

Thoughts on defending cloud Linux workloads?

#Infosec #CloudSecurity #LinuxMalware

VoidLink Cloud-Native Malware Framework Targets Linux Systems via Custom Plugin API
2026-01-14

🚨 New HIGH CVE detected in AWS Lambda 🚨
GHSA-58pv-8j8x-9vj2 impacts jaraco.context in 2 Lambda base images.

Details: github.com/aws/aws-lambda-base
More: lambdawatchdog.com/

#AWS #Lambda #CVE #CloudSecurity #Serverless

2026-01-14

🚨 Lambda Watchdog CVE Report 🚨
Latest AWS Lambda image scan detected 24 CVEs across 27 images:
• 🔴 Critical: 0
• 🟠 High: 8
• 🟡 Medium: 13
• 🔵 Low: 3

Check the full report 👉 lambdawatchdog.com/
#AWS #Lambda #CVE #CloudSecurity #Serverless

2026-01-14

🚨 New HIGH CVE detected in AWS Lambda 🚨
GHSA-58pv-8j8x-9vj2 impacts jaraco.context in 2 Lambda base images.

Details: github.com/aws/aws-lambda-base
More: lambdawatchdog.com/

#AWS #Lambda #CVE #CloudSecurity #Serverless

Lambda Watchdoglambdawatchdog
2026-01-14

🚨 New HIGH CVE detected in AWS Lambda 🚨
GHSA-58pv-8j8x-9vj2 impacts jaraco.context in 2 Lambda base images.

Details: github.com/aws/aws-lambda-base
More: lambdawatchdog.com/

2026-01-14

🚨 Lambda Watchdog CVE Report 🚨
Latest AWS Lambda image scan detected 24 CVEs across 27 images:
• 🔴 Critical: 0
• 🟠 High: 8
• 🟡 Medium: 13
• 🔵 Low: 3

Check the full report 👉 lambdawatchdog.com/
#AWS #Lambda #CVE #CloudSecurity #Serverless

Lambda Watchdoglambdawatchdog
2026-01-14

🚨 Lambda Watchdog CVE Report 🚨
Latest AWS Lambda image scan detected 24 CVEs across 27 images:
• 🔴 Critical: 0
• 🟠 High: 8
• 🟡 Medium: 13
• 🔵 Low: 3

Check the full report 👉 lambdawatchdog.com/

2026-01-14

It's been a busy 24 hours in the cyber world with significant updates on recent attacks, actively exploited vulnerabilities, new malware campaigns, and a reminder about the ever-evolving privacy landscape. Let's take a look:

Kyowon Group Hit by Suspected Ransomware ⚠️
- South Korea's Kyowon Group, a major education and lifestyle company, shut down parts of its network after identifying a suspected ransomware attack.
- The company confirmed an extortion demand and is investigating potential data leakage, including sensitive customer information, possibly affecting millions.
- This incident follows other high-profile data breaches in South Korea, prompting pledges for stronger data protection laws.

🗞️ The Record | therecord.media/kyowon-group-s

Dutch Port Hacked for Cocaine Smuggling 🚨
- A Dutch appeals court upheld a seven-year prison sentence for a man who hacked port IT systems using malware-stuffed USB sticks to aid cocaine smugglers.
- The attacker gained months of remote access, exploring the network and hunting for admin rights, even live-blogging the break-in via encrypted chats.
- The case highlights the real-world impact of cyber intrusions facilitating organised crime, with the hack directly enabling a 210 kg cocaine shipment.

🕵🏼 The Register | go.theregister.com/feed/www.th

Black Axe Leaders Arrested in Spain 🕵️
- Spanish police, supported by Europol, arrested 34 alleged cybercriminals, including leaders of the transnational Black Axe organisation, across four cities.
- Black Axe is known for business email compromise (BEC) scams, money laundering, and vehicle trafficking, with estimated fraud exceeding $6.9 million.
- The operation froze $139,000 in bank accounts and seized cash, vehicles, and devices, significantly disrupting the hierarchical, Nigerian-led group.

🤫 CyberScoop | cyberscoop.com/black-axe-disru

Supreme Court Filing System Hack 🏛️
- A Tennessee man is expected to plead guilty to a misdemeanor charge for hacking into the U.S. Supreme Court’s electronic case filing system on 25 occasions between August and October 2023.
- Nicholas Moore, 24, "intentionally accessed a computer without authorization," though details on the specific information accessed were not released.
- This incident underscores ongoing vulnerabilities in federal judicial systems, which have seen strengthened protections following sophisticated cyberattacks.

🗞️ The Record | therecord.media/guilty-plea-ha

Malicious Chrome Extension Steals MEXC API Keys 💰
- A malicious Google Chrome extension, "MEXC API Automator," is actively stealing API keys from the MEXC cryptocurrency exchange by masquerading as a trading tool.
- The extension programmatically creates new API keys with withdrawal permissions, hides these permissions in the UI, and exfiltrates the keys to a Telegram bot.
- This attack leverages an already authenticated browser session, bypassing traditional authentication, and grants attackers unfettered access to victims' crypto accounts.

📰 The Hacker News | thehackernews.com/2026/01/mali

Gogs Zero-Day Under Active Exploitation 🛡️
- CISA has added CVE-2025-8110, a high-severity path traversal vulnerability in the Gogs self-hosted Git service, to its KEV catalog due to active exploitation.
- The flaw allows authenticated users to bypass previous fixes (CVE-2024-55947) by exploiting symbolic link handling in the PutContents API, leading to remote code execution.
- With no official patch yet, federal agencies are mandated to apply mitigations by February 2, 2026, or cease using Gogs, while other users should disable open registration and restrict access.

📰 The Hacker News | thehackernews.com/2026/01/13/c
🕵🏼 The Register | go.theregister.com/feed/www.th

ServiceNow AI Platform Critical Flaw 🔒
- ServiceNow patched CVE-2025-12420, a critical 9.3 CVSS vulnerability in its AI Platform, allowing unauthenticated users to impersonate others and perform arbitrary actions.
- The flaw stemmed from a universal credential ("servicenowexternalagent") and lack of password/MFA for user identity verification, which could lead to full platform takeover.
- Although no in-the-wild exploitation has been confirmed, the vulnerability was deemed the "most severe AI-driven vulnerability to date" due to ServiceNow's deep integration across enterprise IT.

📰 The Hacker News | thehackernews.com/2026/01/serv
🌑 Dark Reading | darkreading.com/remote-workfor

AI/ML Python Libraries RCE Vulnerabilities 🐍
- Vulnerabilities in popular AI/ML Python libraries (Nvidia's NeMo, Salesforce's Uni2TS, Apple/EPFL VILAB's FlexTok) allow remote code execution via poisoned metadata.
- The flaws exploit Hydra's instantiate() function, which can execute arbitrary callables, enabling attackers to hide malicious code in model metadata that runs automatically upon loading.
- Patches have been issued for NeMo (CVE-2025-23304) and Uni2TS (CVE-2026-22584), with FlexTok also fixed, urging users to only load models from trusted sources.

🕵🏼 The Register | go.theregister.com/feed/www.th

Kremlin-linked Hackers Target Ukraine Military 🪖
- CERT-UA reports a new cyber-espionage campaign by Void Blizzard (UAC-0190) targeting Ukraine's military personnel using a novel PluggyApe malware.
- Attackers impersonate charitable organisations and use messaging apps like Signal and WhatsApp to deliver password-protected malicious executables.
- This campaign highlights a shift towards highly tailored social engineering, leveraging trusted communication channels and detailed target knowledge to deliver malware.

🗞️ The Record | therecord.media/kremlin-linked

SHADOW#REACTOR Delivers Remcos RAT 👻
- A new campaign, SHADOW#REACTOR, uses an evasive multi-stage Windows attack chain to deploy the Remcos RAT for persistent remote access.
- The infection leverages obfuscated VBS launchers, PowerShell downloaders, fragmented text-based payloads, and a .NET Reactor-protected loader to complicate detection.
- This broad, opportunistic activity, likely by initial access brokers, abuses LOLBins like MSBuild.exe and employs self-healing mechanisms to ensure payload delivery.

📰 The Hacker News | thehackernews.com/2026/01/new-

AsyncRAT Campaign Abuses Cloudflare & Python ☁️
- An emerging phishing campaign is delivering AsyncRAT by exploiting Cloudflare's free-tier services (TryCloudflare tunneling) and legitimate Python downloads.
- Attackers use Dropbox links with double-extension files (.pdfurl) in phishing emails, installing a full Python environment to inject code into explorer.exe.
- This technique masks malicious activity under trusted domains and legitimate tools, making detection challenging and highlighting the ongoing effectiveness of phishing and abuse of legitimate services.

🌑 Dark Reading | darkreading.com/endpoint-secur

AVCheck Malware Kingpin Arrested 🚫
- Dutch police arrested a 33-year-old man at Amsterdam's Schiphol Airport, believed to be the mastermind behind the AVCheck online platform.
- AVCheck was a counter-antivirus (CAV) service, shuttered in May by Operation Endgame, that allowed cybercriminals to test malware against various AV products to evade detection.
- The arrest underscores ongoing international law enforcement efforts to dismantle critical components of the cybercrime ecosystem.

🕵🏼 The Register | go.theregister.com/feed/www.th

North Korea's IT Worker & Crypto Theft Schemes 🇰🇵
- The U.S. urged UN member states to take tougher action against North Korea's IT worker scheme and cryptocurrency heists, which fund its weapons programs.
- A 140-page report highlights that over 40 countries are impacted, with North Korean IT workers stealing identities to secure remote jobs and laundered crypto funds exceeding $2 billion last year.
- China and Russia were criticised for providing safe havens, with 1,500 North Korean IT workers estimated in China alone, violating UN Security Council Resolutions.

🗞️ The Record | therecord.media/40-countries-i

India's Strict Crypto KYC/AML Rules 🇮🇳
- India's Financial Intelligence Unit (FIU-IND) updated regulations for crypto service providers, requiring strict client due diligence for all serving Indian residents, even offshore.
- New rules mandate collecting identity documents, bank details, occupation, income, and crucially, "Latitude and longitude coordinates of the onboarding location with date and timestamp along with IP address," plus a selfie.
- These measures aim to combat fraud, money laundering, and terrorism financing in the anonymous and instantaneous crypto transaction landscape.

🕵🏼 The Register | go.theregister.com/feed/www.th

US Cyber Command Leadership Shake-up 🇺🇸
- Air Force Lt. Col. Jason Gargan, commander of a Cyber National Mission Force task force aligned against Russia, was "relieved for cause" due to operational disagreements.
- This unusual dismissal highlights a "loss of trust and confidence" in command ability, with Gargan now expected to retire by the end of 2026.
- The incident occurs amidst other top-rank changes at Cyber Command, which has been without a Senate-confirmed leader for over nine months.

🗞️ The Record | therecord.media/senior-militar

US Cyber Offense vs. Defense Debate ⚖️
- A House Homeland Security subcommittee debated the U.S. approach to cyber deterrence, with some lawmakers warning against expanding offensive cyber operations before strengthening defenses.
- Concerns were raised about CISA losing one-third of its workforce and the potential for offensive actions to provoke retaliation if U.S. networks are not adequately defended.
- While acknowledging the importance of offense, experts suggested a hybrid approach where the private sector supports government offensive operations, with CISA coordinating and receiving legal protections.

🤫 CyberScoop | cyberscoop.com/us-offensive-cy

Mandiant's Salesforce Security Tool 🛠️
- Mandiant has open-sourced AuraInspector, a tool designed to help Salesforce admins detect misconfigurations in Aura (Experience Cloud sites) that could expose sensitive data.
- The tool targets access control issues, such as unauthenticated users gaining access to Salesforce Account object records, and can bypass 2,000-record limits via GraphQL API abuse.
- AuraInspector automates potential abuse techniques and remediation strategies, providing read-only operations to identify damaging misconfigurations without modifying Salesforce instances.

🕵🏼 The Register | go.theregister.com/feed/www.th

#CyberSecurity #ThreatIntelligence #Ransomware #Vulnerability #ZeroDay #RCE #Malware #APT #NationState #Cybercrime #DataPrivacy #InfoSec #IncidentResponse #CloudSecurity #AI #BrowserSecurity #KYC #AML

2026-01-13

Câu chuyện học bảo mật đám mây đầu tiên của tôi: Nhận ra tầm quan trọng của danh tính (identity) hơn tường lửa. Trong môi trường cloud như Azure, danh tính là hàng rào bảo mật đầu tiên và quan trọng nhất. Microsoft Entra ID đóng vai trò trung tâm với xác thực, phân quyền, kiểm soát truy cập và hỗ trợ mô hình Zero Trust. Học cách bảo vệ danh tính chính là nền tảng để đảm bảo an ninh trên Azure. #CloudSecurity #IdentitySecurity #MicrosoftEntraID #ZeroTrust #BảoMậtĐámMây #DanhTínhSố #AzureSecurity

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst