Researchers have found a new way to attack AWS services or third-party projects that automatically provision AWS S3 storage buckets. Dubbed Shadow Resource, the new attack vector can result in AWS account takeover, remote code execution, or sensitive data leaks. Researchers from security firm Aqua Security identified six AWS services that were creating predictably named […]
Category Archives: Cloud Security, Vulnerabilities
Auto Added by WPeMatico
