FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ The Hacker News

Hackers Could Exploit Google Workspace and Cloud Platform for Ransomware Attacks

By: Newsroom β€” November 16th 2023 at 11:18
A set of novel attack methods has been demonstrated against Google Workspace and the Google Cloud Platform that could be potentially leveraged by threat actors to conduct ransomware, data exfiltration, and password recovery attacks. "Starting from a single compromised machine, threat actors could progress in several ways: they could move to other cloned machines withΒ GCPWΒ installed, gain access
☐ β˜† βœ‡ The Hacker News

TeamTNT's Cloud Credential Stealing Campaign Now Targets Azure and Google Cloud

By: THN β€” July 14th 2023 at 10:12
A malicious actor has been linked to a cloud credential stealing campaign in June 2023 that's focused on Azure and Google Cloud Platform (GCP) services, marking the adversary's expansion in targeting beyond Amazon Web Services (AWS). The findings come fromΒ SentinelOneΒ andΒ Permiso, which said the "campaigns share similarity with tools attributed to the notorious TeamTNT cryptojacking crew,"
☐ β˜† βœ‡ The Hacker News

Severe Flaw in Google Cloud's Cloud SQL Service Exposed Confidential Data

By: Ravie Lakshmanan β€” May 26th 2023 at 16:25
A new security flaw has been disclosed in the Google Cloud Platform's (GCP) Cloud SQL service that could be potentially exploited to obtain access to confidential data. "The vulnerability could have enabled a malicious actor to escalate from a basic Cloud SQL user to a full-fledged sysadmin on a container, gaining access to internal GCP data like secrets, sensitive files, passwords, in addition
☐ β˜† βœ‡ The Hacker News

GhostToken Flaw Could Let Attackers Hide Malicious Apps in Google Cloud Platform

By: Ravie Lakshmanan β€” April 21st 2023 at 12:13
Cybersecurity researchers have disclosed details of a now-patched zero-day flaw in Google Cloud Platform (GCP) that could have enabled threat actors to conceal an unremovable, malicious application inside a victim's Google account. Dubbed GhostToken by Israeli cybersecurity startup Astrix Security, the shortcoming impacts all Google accounts, including enterprise-focused Workspace accounts. It
❌