Over the past two decades, the tech industry has witnessed a marked shift from traditional enterprise networks and collocation data centers to cloud computing. Cloud computing allows users to access servers, storage, and applications over the internet. In contrast to conventional enterprise networks that are typically built onsite and require a significant investment in hardware, software, and personnel to operate and maintain, cloud computing requires no on-premises infrastructure. Cloud service providers (CSPs), such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud, offer automated services that allow customers to provision new systems and applications quickly and efficiently and scale their environments on demand. Despite its numerous advantages, cloud computing introduces several challenges that IT departments, security teams, and application developers must consider when securing their cloud environments.
[Read more…] about 9 Challenges to Securing the CloudCloud
MinIO Exploit Reveals Novel Cloud Attack Vector
Researchers at Security Joes recently discovered threat actors leveraging critical vulnerabilities in MinIO to infiltrate a cloud network. According to the blog post, the attack represents a novel approach to compromising cloud assets using non-native solutions.
[Read more…] about MinIO Exploit Reveals Novel Cloud Attack VectorSecurity Researchers Repurpose Amazon SSM Agent as a Remote Access Trojan
Security researchers at Mitiga have discovered a technique for using AWS Systems Manager (SSM) Agent as a remote access trojan (RAT). The technique allows for persistent command and control of a compromised host by an attacker from within another AWS account.
SSM Agent is software that allows administrators to configure, manage, and update AWS resources through the Systems Manager service. It can be installed on a various systems, including Amazon Elastic Compute Cloud (EC2) instances, edge devices, on-premises servers, and virtual machines.
[Read more…] about Security Researchers Repurpose Amazon SSM Agent as a Remote Access Trojan