cloud_sec | Unsorted

Telegram-канал cloud_sec - CloudSec Wine

2199

All about cloud security Contacts: @AMark0f @dvyakimov About DevSecOps: @sec_devops

Subscribe to a channel

CloudSec Wine

🤖 When an AI agent came knocking: Catching malicious contributions in Datadog’s open source repos

How Datadog discovered malicious issues and PRs in two of their public repositories as the result of attacks by hackerbot-claw, an AI agent designed to target GitHub Actions and LLM-powered workflows.

https://www.datadoghq.com/blog/engineering/stopping-hackerbot-claw-with-bewaire

#AI

Читать полностью…

CloudSec Wine

🔶 Behind the console: Active phishing campaign targeting AWS console credentials

Datadog Security Research identified an active adversary-in-the-middle (AiTM) phishing campaign targeting AWS Console credentials via typosquatted domains that mimic AWS infrastructure.

https://securitylabs.datadoghq.com/articles/behind-the-console-aws-aitm-phishing-campaign

#aws

Читать полностью…

CloudSec Wine

🤖 How AI Agents Automate CVE Vulnerability Research

A technical deep-dive into Praetorian's multi-agent CVE research pipeline, exploring how orchestrated AI agents transform vulnerability data into validated detection templates.

https://www.praetorian.com/blog/how-ai-agents-automate-cve-vulnerability-research/

#AI

Читать полностью…

CloudSec Wine

🤖 hackerbot-claw: An AI-Powered Bot Actively Exploiting GitHub Actions

A week-long automated attack campaign targeted CI/CD pipelines across major open source repositories, achieving remote code execution in at least 4 out of 5 targets. The attacker, an autonomous bot called hackerbot-claw, used 5 different exploitation techniques and successfully exfiltrated a GitHub token with write permissions from one of the most popular repositories on GitHub. This post breaks down each attack, shows the evidence, and explains what you can do to protect your workflows.

https://www.stepsecurity.io/blog/hackerbot-claw-github-actions-exploitation#attack-6-aquasecuritytrivy---evidence-cleared

#AI

Читать полностью…

CloudSec Wine

🤖 Running OpenClaw safely: identity, isolation, and runtime risk

OpenClaw, a self-hosted agent runtime, lacks built-in security controls, enabling credential exfiltration, memory/state manipulation, and host compromise via indirect prompt injection and malicious skills. Microsoft recommends isolated deployment, least-privilege identities, continuous monitoring, and Defender XDR hunting queries.

https://www.microsoft.com/en-us/security/blog/2026/02/19/running-openclaw-safely-identity-isolation-runtime-risk/

#AI

Читать полностью…

CloudSec Wine

🤖 Using threat modeling and prompt injection to audit Comet

Trail of Bits used ML-centered threat modeling and adversarial testing to identify four prompt injection techniques that could exploit Perplexity's Comet browser AI assistant to exfiltrate private Gmail data. The audit demonstrated how fake security mechanisms, system instructions, and user requests could manipulate the AI agent into accessing and transmitting sensitive user information.

https://blog.trailofbits.com/2026/02/20/using-threat-modeling-and-prompt-injection-to-audit-comet/

#AI

Читать полностью…

CloudSec Wine

🔶 AWS Incident Response: IAM Containment That Survives Eventual Consistency

Standard AWS IR containment fails against attackers exploiting IAM eventual consistency. This article presents an SCP-enforced technique that makes identity-level containment attacker-resistant.

https://www.offensai.com/blog/eventual-consistency-resistant-iam-containment-aws-incident-response

(Use VPN to open from Russia)

#aws

Читать полностью…

CloudSec Wine

🤖 MCP Server Security: The Hidden AI Attack Surface

MCP servers connecting AI assistants to external tools create significant attack surfaces enabling arbitrary code execution, data exfiltration, and social engineering. Both local and remote MCP servers can be exploited through server chaining, supply chain attacks, and malicious tool implementations.

https://www.praetorian.com/blog/mcp-server-security-the-hidden-ai-attack-surface/

#AI

Читать полностью…

CloudSec Wine

🤖 3 Principles for Designing Agent Skills

Block Engineering discusses designing agent skills using three principles: make deterministic outputs script-based, let agents handle interpretation and conversation, and write explicit constitutional constraints. Skills codify tribal knowledge into executable documentation for AI agents across their organization.

https://engineering.block.xyz/blog/3-principles-for-designing-agent-skills

#AI

Читать полностью…

CloudSec Wine

🏗 Encrypting Files with Passkeys and age

A post explaining how to encrypt files with passkeys, using the WebAuthn prf extension and the TypeScript age implementation.

https://words.filippo.io/passkey-encryption

#build

Читать полностью…

CloudSec Wine

🔐 Standardizing Privileged Access Architecture for Multi-Cloud

This white paper examines the risks and attack vectors inherent in hybrid multi-cloud infrastructures, and analyzes various attack paths observed by Mandiant in real-world multi-cloud scenarios.

#iam

Читать полностью…

CloudSec Wine

🤖 From Automation to Infection: How OpenClaw AI Agent Skills Are Being Weaponized

The fastest-growing personal AI agent ecosystem just became a new delivery channel for malware. Over the last few days, VirusTotal has detected hundreds of OpenClaw skills that are actively malicious.

https://blog.virustotal.com/2026/02/from-automation-to-infection-how.html

#AI

Читать полностью…

CloudSec Wine

🔐 Blog: A Beginners Guide: Cross-Device Passkeys

Find out more about how passkeys can be used across devices using a mechanism called Hybrid transport.

https://bughunters.google.com/blog/passkeys

#iam

Читать полностью…

CloudSec Wine

👩‍💻 Weaponizing Whitelists: An Azure Blob Storage Mythic C2 Profile

Mature enterprises lock down egress but often carve out broad exceptions for trusted cloud services. This post shows how reviewing deployment guides can help identify those exceptions and weaponize them with a new Mythic C2 profile called azureBlob.

https://specterops.io/blog/2026/01/30/weaponizing-whitelists-an-azure-blob-storage-mythic-c2-profile/

#azure

Читать полностью…

CloudSec Wine

⚙️ Stealing Salesforce OAuth Tokens using the WAF

This post details a method for stealing Salesforce OAuth tokens by exploiting an XSS vulnerability and leveraging the Cloudflare Web Application Firewall (WAF).

https://castilho.sh/salesforce-oauth-ato

#saas

Читать полностью…

CloudSec Wine

🔶 Introducing account regional namespaces for Amazon S3 general purpose bucket

AWS launches a new feature of Amazon S3 that lets you create general purpose buckets in your own account regional namespace simplifying bucket creation and management as your data storage needs grow in size and scope.

https://aws.amazon.com/ru/blogs/aws/introducing-account-regional-namespaces-for-amazon-s3-general-purpose-buckets

#aws

Читать полностью…

CloudSec Wine

🔶 Bucketsquatting is (Finally) Dead

AWS introduced account-regional namespaces for S3 (<prefix> - <accountid> - <region> - an) to eliminate bucketsquatting, where attackers claim deleted bucket names.

https://onecloudplease.com/blog/bucketsquatting-is-finally-dead

#aws

Читать полностью…

CloudSec Wine

🤖 The Reach Pattern

The "Reach" pattern is a personal CLI that hijacks existing browser sessions to query SaaS APIs (Slack, Jira, Confluence, etc.) on your behalf, feeding structured organizational context to your AI coding assistant.

https://jackdanger.com/the-reach-pattern

#AI

Читать полностью…

CloudSec Wine

🔶 Inside AWS Security Agent: A multi-agent architecture for automated penetration testing

AWS Security Agent's penetration testing uses a multi-agent architecture: specialized swarm agents handle reconnaissance, managed/guided exploration, and exploit validation. The system achieves 80% attack success rate on CVE Bench under real-world conditions, with assertion-based validation reducing false positives and CVSS-scored reporting.

https://aws.amazon.com/ru/blogs/security/inside-aws-security-agent-a-multi-agent-architecture-for-automated-penetration-testing/

(Use VPN to open from Russia)

#aws

Читать полностью…

CloudSec Wine

🤖 How "Clinejection" Turned an AI Bot into a Supply Chain Attack

A prompt injection in a GitHub issue title gave attackers code execution inside Cline's CI/CD pipeline, leading to cache poisoning, stolen npm credentials, and an unauthorized package publish affecting the popular AI coding tool's 5 million users. Here's the full technical breakdown and what developers should do now.

https://snyk.io/blog/cline-supply-chain-attack-prompt-injection-github-actions/

(Use VPN to open from Russia)

#AI

Читать полностью…

CloudSec Wine

🔴 Google API Keys Weren't Secrets. But then Gemini Changed the Rules

Enabling the Gemini API on a GCP project silently grants existing public AIza... keys (e.g., Maps/Firebase) access to sensitive Gemini endpoints. Truffle Security found 2,863 such exposed keys via Common Crawl, enabling data access, billing abuse, and quota exhaustion, including against Google's own infrastructure.

https://trufflesecurity.com/blog/google-api-keys-werent-secrets-but-then-gemini-changed-the-rules

#gcp

Читать полностью…

CloudSec Wine

🤖 caterpillar

Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior.

https://github.com/alice-dot-io/caterpillar

#AI

Читать полностью…

CloudSec Wine

🔶🤖 Building an AI-powered defense-in-depth security architecture for serverless microservices

This AWS blog demonstrates implementing a seven-layer AI-powered defense-in-depth security architecture for serverless microservices using AWS Shield, WAF, Cognito, API Gateway, VPC, Lambda, Secrets Manager, and DynamoDB, enhanced with GuardDuty and Amazon Bedrock for intelligent threat detection and automated response.

https://aws.amazon.com/ru/blogs/security/building-an-ai-powered-defense-in-depth-security-architecture-for-serverless-microservices/

(Use VPN to open from Russia)

#aws #AI

Читать полностью…

CloudSec Wine

🤖 augustus

LLM security testing framework for detecting prompt injection, jailbreaks, and adversarial attacks. See also the companion blog post.

https://github.com/praetorian-inc/augustus

#AI

Читать полностью…

CloudSec Wine

🤖 Manipulating AI memory for profit: The rise of AI Recommendation Poisoning

That helpful “Summarize with AI” button? It might be secretly manipulating what your AI recommends. Microsoft security researchers have discovered a growing trend of AI memory poisoning attacks used for promotional purposes, a technique they called "AI Recommendation Poisoning".

https://www.microsoft.com/en-us/security/blog/2026/02/10/ai-recommendation-poisoning/

#AI

Читать полностью…

CloudSec Wine

🤖 Threat modeling agentic AI: a scenario-driven approach

A practical workflow for threat modeling agentic AI systems: use a five-zone navigation lens to trace attack paths, formalize them as attack trees, and map to OWASP's threat taxonomy and playbooks.

https://christian-schneider.net/blog/threat-modeling-agentic-ai/

#AI

Читать полностью…

CloudSec Wine

👀 Building Slack’s Anomaly Event Response

This article introduces Slack's Anomaly Event Response (AER), an automated security system that detects suspicious activities and terminates user sessions in real-time, reducing detection-to-response gaps from hours to minutes.

https://slack.engineering/building-slacks-anomaly-event-response/

#monitor

Читать полностью…

CloudSec Wine

🔴 Google Looker RCE vulnerabilities: Patch now

Tenable Research discovered two novel vulnerabilities in Google Looker that could allow an attacker to completely compromise a Looker instance.

https://www.tenable.com/blog/google-looker-vulnerabilities-rce-internal-access-lookout

#gcp

Читать полностью…

CloudSec Wine

🤖 AI-Assisted Development at Block

Block's AI engineering approach includes: 95% of engineers using AI assistants, providing freedom to explore multiple tools, launching an AI Champions program focused on repo readiness and context engineering, implementing automated PRs, and planning team-based workshops for multi-agent workflows.

https://engineering.block.xyz/blog/ai-assisted-development-at-block

#AI

Читать полностью…

CloudSec Wine

We should all be using dependency cooldowns

Dependency cooldowns delay automatic dependency updates, providing a free and effective mitigation against most open source supply chain attacks. Tools like Dependabot and Renovate support configurable cooldown periods before adopting new dependency versions.

https://blog.yossarian.net/2025/11/21/We-should-all-be-using-dependency-cooldowns

(Use VPN to open from Russia)

#cicd

Читать полностью…
Subscribe to a channel