Tag: AWS
-
Beijing-linked hackers are hammering max-severity React bug, AWS warns
Amazon has warned that China-nexus hacking crews began hammering the critical React “React2Shell” vulnerability within hours of disclosure, …
-
China-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182)
Within hours of the public disclosure of CVE-2025-55182 (React2Shell) on December 3, 2025, Amazon threat intelligence teams observed active …
-
University of Pennsylvania joins list of victims from Clop’s Oracle EBS raid
The University of Pennsylvania has become the latest victim of Clop’s smash-and-grab spree against Oracle’s E-Business Suite (EBS) …
-
AWS rolls out Security Agent and strengthens GuardDuty and Security Hub at re:Invent 2025
Amazon Web Services Inc. today announced a set of major security enhancements across application protection, cloud security operations and …
-
AWS introduces DNS failover feature to prevent future outages
Amazon Web Services (AWS) has introduced “Accelerated Recovery” for Amazon Route 53, a significant architectural update designed to …
-
ShadowV2 botnet exploited AWS outage timeline to test global IoT attacks
Cybersecurity researchers at Fortinet’s FortiGuard Labs have identified a new Mirai-based botnet, dubbed ‘ShadowV2,’ which appears to …
-
Botnet takes advantage of AWS outage to smack 28 countries
A Mirai-based botnet named ShadowV2 emerged during last October’s widespread AWS outage, infecting IoT devices across industries and …
-
Introducing guidelines for network scanning
is introducing guidelines for network scanning of customer workloads. By following these guidelines, conforming scanners will collect more …
-
AWS WAF vs. Google Cloud Armor: A Multicloud Security Showdown
In 2025, multicloud is standard, not a new trend. Teams now run workloads across AWS, Google Cloud Platform (GCP) and …
-
Clop’s Oracle EBS rampage reaches Dartmouth College
Dartmouth College has confirmed it’s the latest victim of Clop’s Oracle E-Business Suite (EBS) smash-and-grab. According to a breach …
-
Practical steps to minimize key exposure using AWS Security Services
Exposed long-term credentials continue to be the top entry point used by threat actors in security incidents observed by the AWS Customer …
●●●
