Cloud Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/category/cloud/ GBhackers Offering Exclusive Cyber Security News Coverage, New Research papers & Technology Updates. Tue, 29 Oct 2024 09:02:17 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://gbhackers.com/wp-content/uploads/2024/09/cropped-gbh-32x32.png Cloud Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/category/cloud/ 32 32 Hardcoded Creds in Popular Apps Put Millions of Android and iOS Users at Risk https://gbhackers.com/hardcoded-creds-risk-android-ios-apps/ https://gbhackers.com/hardcoded-creds-risk-android-ios-apps/#respond Tue, 29 Oct 2024 09:01:38 +0000 https://gbhackers.com/?p=113873 Recent analysis has revealed a concerning trend in mobile app security: Many popular apps store hardcoded and unencrypted cloud service credentials directly within their codebases.  It poses a significant security risk as anyone accessing the app’s binary or source code could extract and misuse these credentials to manipulate or exfiltrate data.  Examples include Pic Stitch, […]

The post Hardcoded Creds in Popular Apps Put Millions of Android and iOS Users at Risk appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Hardcoded Creds in Popular Apps Put Millions of Android and iOS Users at Risk appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/hardcoded-creds-risk-android-ios-apps/feed/ 0
Cloud Penetration Testing Checklist – 2024 https://gbhackers.com/cloud-computing-penetration-testing-checklist-important-considerations/ https://gbhackers.com/cloud-computing-penetration-testing-checklist-important-considerations/#comments Fri, 04 Oct 2024 07:12:50 +0000 https://gbhackers.com/?p=4036 Cloud Penetration Testing is a method of actively checking and examining the Cloud system by simulating the attack from the malicious code. Cloud computing is the shared responsibility of the Cloud provider and the client who earn the service from the provider. Due to the impact of the infrastructure, Penetration Testingnot allowed in SaaS Environment. […]

The post Cloud Penetration Testing Checklist – 2024 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Cloud Penetration Testing Checklist – 2024 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/cloud-computing-penetration-testing-checklist-important-considerations/feed/ 1
TeamTNT Hackers Attacking VPS Servers Running CentOS https://gbhackers.com/teamtnt-attacks-centos-vps/ https://gbhackers.com/teamtnt-attacks-centos-vps/#respond Thu, 26 Sep 2024 07:46:01 +0000 https://gbhackers.com/?p=112428 TeamTNT is targeting CentOS VPS clouds with SSH brute force attacks. It has uploaded a malicious script that disables security, deletes logs, and modifies system files to kill existing miners, remove Docker containers, and redirect DNS to Google servers. The script stealthily installs the Diamorphine rootkit to gain root privileges and maintain persistent control by […]

The post TeamTNT Hackers Attacking VPS Servers Running CentOS appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post TeamTNT Hackers Attacking VPS Servers Running CentOS appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/teamtnt-attacks-centos-vps/feed/ 0
CloudSOC – An OpenSource Project for SOC & Security Analysts https://gbhackers.com/cloudsoc-an-opensource-project/ https://gbhackers.com/cloudsoc-an-opensource-project/#respond Tue, 03 Sep 2024 08:46:16 +0000 https://gbhackers.com/?p=103765 Security Operations Centers (SOCs) and security analysts are under immense pressure to stay ahead of potential attacks. Enter CloudSOC, an open-source project designed to empower SOC teams and security analysts by providing a modern architecture that leverages open-source tools for comprehensive threat detection, response, and security management. CloudSOC is not just another tool in the […]

The post CloudSOC – An OpenSource Project for SOC & Security Analysts appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post CloudSOC – An OpenSource Project for SOC & Security Analysts appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/cloudsoc-an-opensource-project/feed/ 0
Hackers Exploited Digital Advertising Tools to Launch Malicious Campaigns https://gbhackers.com/hackers-exploited-digital-advertising-tools/ https://gbhackers.com/hackers-exploited-digital-advertising-tools/#respond Fri, 30 Aug 2024 07:44:35 +0000 https://gbhackers.com/?p=96470 Cybersecurity researchers from Mandiant and Google Cloud have uncovered a sophisticated scheme where hackers exploit digital advertising tools to conduct malicious campaigns. These tools, originally designed to enhance marketing efforts, have been repurposed by threat actors to evade detection and amplify their attacks. This article delves into the methods these cybercriminals use, the tools they […]

The post Hackers Exploited Digital Advertising Tools to Launch Malicious Campaigns appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Hackers Exploited Digital Advertising Tools to Launch Malicious Campaigns appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/hackers-exploited-digital-advertising-tools/feed/ 0
Hackers Abusing Google Cloud For Phishing https://gbhackers.com/hackers-abusing-google-cloud/ https://gbhackers.com/hackers-abusing-google-cloud/#respond Tue, 23 Jul 2024 12:53:48 +0000 https://gbhackers.com/?p=94055 Threat actors often attack cloud services for several illicit purposes. Google Cloud is targeted due to its extensive and powerful resources, which could be abused for a multitude of malicious activities. The vast amounts of data and computing power that Google Cloud services provide often lure threat actors. Due to the complexity of cloud environments, […]

The post Hackers Abusing Google Cloud For Phishing appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Hackers Abusing Google Cloud For Phishing appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/hackers-abusing-google-cloud/feed/ 0
New TE.0 HTTP Request Smuggling Flaw Impacts Google Cloud Websites https://gbhackers.com/te-0-http-request-smuggling-flaw/ https://gbhackers.com/te-0-http-request-smuggling-flaw/#respond Thu, 18 Jul 2024 09:32:11 +0000 https://gbhackers.com/?p=93812 HTTP Request Smuggling is a flaw in web security that is derived from variations in the way different web servers or intermediaries, such as load balancers and proxies handle HTTP request sequences. By creating malicious HTTP requests that exploit these inconsistencies, an attacker can control the order in which requests are processed, possibly resulting in […]

The post New TE.0 HTTP Request Smuggling Flaw Impacts Google Cloud Websites appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post New TE.0 HTTP Request Smuggling Flaw Impacts Google Cloud Websites appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/te-0-http-request-smuggling-flaw/feed/ 0
Cloud-Based Malware Attack Abusing Google Drive & Dropbox https://gbhackers.com/cloud-malware-attack-google-drive-dropbox/ https://gbhackers.com/cloud-malware-attack-google-drive-dropbox/#respond Wed, 22 May 2024 11:28:09 +0000 https://gbhackers.com/?p=90605 A phishing email with a malicious zip attachment initiates the attack. The zip contains a single executable disguised as an Excel file using Left-To-Right Override characters (LTRO).  LTRO makes the filename appears to have a harmless .xlsx extension (e.g., RFQ-101432620247flexe.xlsx) while it’s actually an executable (.exe). Unsuspecting users, deceived by the icon and filename, launch […]

The post Cloud-Based Malware Attack Abusing Google Drive & Dropbox appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Cloud-Based Malware Attack Abusing Google Drive & Dropbox appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/cloud-malware-attack-google-drive-dropbox/feed/ 0
Critical Memory Corruption In Cloud Logging Infrastructure Enables Code Execution Attack https://gbhackers.com/critical-memory-corruption/ https://gbhackers.com/critical-memory-corruption/#respond Tue, 21 May 2024 08:03:10 +0000 https://gbhackers.com/?p=90466 Fluent Bit, a widely used open-source data collector and processor, has been found to have a major memory loss flaw. Many big cloud providers use Fluent Bit for their logging because it is easy to use and can be scaled up or down as needed. Tenable Research found the flaw, which affects Fluent Bit’s built-in […]

The post Critical Memory Corruption In Cloud Logging Infrastructure Enables Code Execution Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Critical Memory Corruption In Cloud Logging Infrastructure Enables Code Execution Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/critical-memory-corruption/feed/ 0
New LLMjacking Used Stolen Cloud Credentials to Attack Cloud LLM Servers https://gbhackers.com/llmjacking-stolen-cloud-credentials/ https://gbhackers.com/llmjacking-stolen-cloud-credentials/#respond Fri, 10 May 2024 11:47:03 +0000 https://gbhackers.com/?p=89786 Researchers have identified a new form of cyberattack termed “LLMjacking,” which exploits stolen cloud credentials to hijack cloud-hosted large language models (LLMs). This sophisticated attack leads to substantial financial losses and poses significant risks to data security. LLMjacking involves attackers gaining unauthorized access to cloud environments through compromised credentials, initially sourced from vulnerabilities in widely […]

The post New LLMjacking Used Stolen Cloud Credentials to Attack Cloud LLM Servers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post New LLMjacking Used Stolen Cloud Credentials to Attack Cloud LLM Servers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/llmjacking-stolen-cloud-credentials/feed/ 0