CloudSec Wine
2.19K subscribers
968 photos
19 files
1.31K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
🔶 Introducing account regional namespaces for Amazon S3 general purpose bucket

AWS launches a new feature of Amazon S3 that lets you create general purpose buckets in your own account regional namespace simplifying bucket creation and management as your data storage needs grow in size and scope.

https://aws.amazon.com/ru/blogs/aws/introducing-account-regional-namespaces-for-amazon-s3-general-purpose-buckets

#aws
1👍1🔥1
🤖 When an AI agent came knocking: Catching malicious contributions in Datadog’s open source repos

How Datadog discovered malicious issues and PRs in two of their public repositories as the result of attacks by hackerbot-claw, an AI agent designed to target GitHub Actions and LLM-powered workflows.

https://www.datadoghq.com/blog/engineering/stopping-hackerbot-claw-with-bewaire

#AI
1👍1🔥1
trajan

A multi-platform CI/CD vulnerability detection and attack automation tool for identifying security weaknesses in pipeline configurations. You can also check out the companion blog post.

https://github.com/praetorian-inc/trajan

#cicd
👍3🔥21
🔶 Pentesting a pentest agent - Here's what I've found in AWS Security Agent

A researcher pentested AWS Security Agent, finding 4 issues: DNS confusion enabling unauthorized domain pentesting, a full reverse shell/container escape chain to host root + AWS credentials via prompt injection, unnecessary destructive actions (e.g., DROP TABLE probes, exploit-based cleanup deleting /etc/crontab), and unredacted secrets in pentest reports.

https://blog.richardfan.xyz/2026/03/14/pentesting-a-pentest-agent-heres-what-ive-found-in-aws-security-agent.html

#aws
🔥21👍1
🔶 Pwning AI Code Interpreters in AWS Bedrock AgentCore

Phantom Labs discovered that AWS Bedrock AgentCore Code Interpreter's sandbox mode allows DNS queries, enabling bypass of network isolation through DNS-based command-and-control. This research details the discovery, proof-of-concept exploit, disclosure timeline, and defensive guidance for organizations using Code Interpreter workloads.

https://www.beyondtrust.com/blog/entry/pwning-aws-agentcore-code-interpreter

#aws
1👍1🔥1
🤖 Securing our codebase with autonomous agents

Cursor's security team built a fleet of security agents to find and fix vulnerabilities across a fast-changing codebase.

https://cursor.com/blog/security-agents

#AI
👍21🔥1
🤖 OpenSandbox

OpenSandbox is a general-purpose sandbox platform for AI applications, offering multi-language SDKs, unified sandbox APIs, and Docker/Kubernetes runtimes for scenarios like Coding Agents, GUI Agents, Agent Evaluation, AI Code Execution, and RL Training.

https://github.com/alibaba/OpenSandbox

#AI
Please open Telegram to view this post
VIEW IN TELEGRAM
1👍1🔥1
🔶 Cracks in the Bedrock: Bypassing SCP Enforcement with Long-Lived API Keys

Sonrai Security researcher discovered that AWS "bedrock-mantle" IAM permissions could bypass SCP enforcement when using long-lived Service Specific Credential API keys. IAM policy denials worked correctly, but SCP denials were bypassed. AWS patched this between Jan–Feb 2026; no customer action required.

https://sonraisecurity.com/blog/cracks-in-the-bedrock

#aws
1👍1🔥1
🔶 Simulating Ransomware with AWS KMS

Post that demonstrates how attackers can abuse AWS KMS by importing malicious key material to encrypt RDS/EBS resources, then deleting the material to make data inaccessible without ransom payment.

https://heilancoos.github.io/research/2025/09/02/aws-kms-ransomware.html

#aws
1👍1🔥1
🔶 Locking down AWS principal tags with RCPs and SCPs

A post explaining how to use SCPs to restrict sensitive IAM actions to tagged principals, RCPs to block unauthorized "scp-*" session tags from external/non-tagger principals, and SCPs to protect the "tagger" role itself via CloudFormation StackSets.

https://awsteele.com/blog/2026/02/21/locking-down-aws-principal-tags-with-rcps-and-scps.html

#aws
1👍1🔥1
🔴 Remote Command Execution in Google Cloud with Single Directory Deletion - GMO Flatt Security Research

A race condition in Google Cloud Looker's directory deletion API allows deleting the ".git" directory while concurrent Git operations proceed, causing Git to use attacker-controlled worktree configs for RCE. Kubernetes service account misconfigurations further enabled cross-instance privilege escalation.

https://flatt.tech/research/posts/remote-command-execution-in-google-cloud-with-single-directory-deletion

#gcp
1👍1🔥1
👨‍💻 Widespread GitHub Campaign Uses Fake VS Code Security Alerts to Deliver Malware

A large-scale phishing campaign is targeting developers directly inside GitHub, using fake Visual Studio Code security alerts posted through Discussions to trick users into installing malicious software.

https://socket.dev/blog/widespread-github-campaign-uses-fake-vs-code-security-alerts-to-deliver-malware

#github
Please open Telegram to view this post
VIEW IN TELEGRAM
1👍1🔥1
📤 Threat Actors Abuse Railway.com PaaS as Microsoft 365 Token Attack Infrastructure

Railway PaaS is being weaponized as a clean token replay engine in an active AiTM and device code phishing campaign impacting 268+ M365 organizations and 100+ MSPs.

https://www.huntress.com/blog/railway-paas-m365-token-replay-campaign

#PaaS
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
2👍1🔥1
🔴 Double Agents: Exposing Security Blind Spots in GCP Vertex AI

Unit 42 researchers found that GCP Vertex AI Agent Engine's default P4SA service account has excessive permissions, enabling credential theft via the metadata service. This allows privilege escalation to read all consumer GCS buckets, access restricted Google-internal Artifact Registry container images, and expose internal source code.

https://unit42.paloaltonetworks.com/double-agents-vertex-ai

#gcp
1👍1🔥1