Headlines
The Escalation of Cloud Credential Stealing: From AWS to Azure and Google Cloudcloudsecurity,credentialstealing,AWS,Azure,GoogleCloud

The Escalation of Cloud Credential Stealing: From AWS to Azure and Google Cloud

Cloud-Credential Stealing and Cryptomining Campaign Expands to Azure and Google Cloud Platform Background Over the past several months, a sophisticated campaign targeting Amazon Web Services (AWS) environments has now expanded to Azure and Google Cloud Platform (GCP). Researchers have determined that the tools used in the campaign share considerable overlap with those associated with TeamTNT,…

Read More
The Expanding Reach: TeamTNT's Cloud Credential Stealing Campaign Extends to Azure and Google Cloudwordpress,cybersecurity,TeamTNT,cloudsecurity,credentialstealing,Azure,GoogleCloud

The Expanding Reach: TeamTNT’s Cloud Credential Stealing Campaign Extends to Azure and Google Cloud

The Importance of Internet Security in an Era of Increasing Cyber Threats The Growing Concern of Identity Theft and Cybersecurity In today’s interconnected world, the threat of cyber attacks has become a significant concern for individuals, businesses, and governments alike. With every passing day, the sophistication and frequency of these attacks are on the rise….

Read More
Thousands Affected by Microsoft Azure AD 'Log in With Microsoft' Authentication Bypassmicrosoft,azure,AD,authentication,bypass

Thousands Affected by Microsoft Azure AD ‘Log in With Microsoft’ Authentication Bypass

Organizations at Risk: Vulnerability in “Log in with Microsoft” Feature Exposes Accounts to Attacks The nOAuth Attack: Authentication Bypass in Microsoft Azure AD A recent discovery by researchers at Descope highlights a critical vulnerability in the “Log in with Microsoft” feature implemented in Microsoft Azure Active Directory (AD) environments. Dubbed “nOAuth,” this flaw allows malicious…

Read More
Security Alert: Vulnerability Discovered in Microsoft Azure AD OAuth Appsmicrosoft,azure,ad,oauth,security,vulnerability,apps

Security Alert: Vulnerability Discovered in Microsoft Azure AD OAuth Apps

## Cloud Security Researchers Flag Account Takeover Flaw in Microsoft Azure AD OAuth Apps In a recent report, security startup Descope has identified a major misconfiguration in Microsoft Azure Active Directory (AD) OAuth applications, warning that businesses using the ‘Log in with Microsoft‘ feature could be exposed to full account takeover exploits. This security flaw,…

Read More
Microsoft Investigates Massive DDoS Attack Behind Azure, Outlook, and OneDrive OutagesMicrosoft,DDoSattack,Azure,Outlook,OneDrive,Outages

Microsoft Investigates Massive DDoS Attack Behind Azure, Outlook, and OneDrive Outages

Report: API Security Testing for Dummies Introduction In today’s digital world, where an increasing number of services rely on Application Programming Interfaces (APIs) for seamless integration and communication, ensuring robust API security has become paramount. As cyber threats continue to evolve, organizations must not only prioritize preventing breaches but also release secure code and optimize…

Read More
Deep Dive into Keytos: Unveiling the Expedient Discovery of 15,000 Vulnerable Azure Subdomains via Cryptographic Certificatesazure,subdomains,vulnerability,cryptographiccertificates,keytos,discovery

Deep Dive into Keytos: Unveiling the Expedient Discovery of 15,000 Vulnerable Azure Subdomains via Cryptographic Certificates

Vulnerability of Subdomain Takeover in Microsoft Azure Poses Significant Threat The Issue Researchers at Keytos have recently discovered a vulnerability in Microsoft Azure that presents a significant threat to organizations. This vulnerability, known as subdomain takeover, allows cybercriminals to impersonate organizations, launch attacks, and display spam content through legitimate sites. This exploit occurs when a…

Read More
Azure's XSS Vulnerabilities Expose User Sessions to Unauthorized Accessazure,xss,vulnerabilities,usersessions,unauthorizedaccess

Azure’s XSS Vulnerabilities Expose User Sessions to Unauthorized Access

Cloud Security XSS Vulnerabilities in Azure Led to Unauthorized Access to User Sessions Introduction In a recent report, cloud security firm Orca identified and Microsoft resolved two cross-site scripting (XSS) vulnerabilities in Azure Bastion and Azure Container Registry (ACR) that could have led to unauthorized access to user sessions, data tampering, and service disruptions. The…

Read More
XSS Vulnerabilities in Azure: Examining Unauthorized User Session AccessXSS,Vulnerabilities,Azure,UnauthorizedUser,SessionAccess

XSS Vulnerabilities in Azure: Examining Unauthorized User Session Access

XSS Vulnerabilities in Azure Led to Unauthorized Access to User Sessions Overview Cloud security firm Orca has identified two cross-site scripting (XSS) vulnerabilities in Azure Bastion and Azure Container Registry (ACR) that could have resulted in unauthorized access to user sessions, data tampering, and service disruptions. These vulnerabilities were resolved by Microsoft in April and…

Read More
"Cyber Threat Group Exploits Azure Serial Console for Complete Virtual Machine Hijacking"azure,cyberthreat,virtualmachine,hijacking,serialconsole,exploit

“Cyber Threat Group Exploits Azure Serial Console for Complete Virtual Machine Hijacking”

Perimeter 81: A Comprehensive Network Security Solution Protecting Your Business in the Age of Cyber Attacks Cybersecurity is no longer a luxury but a necessity for businesses, especially in times when remote work and cloud computing have opened up more avenues for cybercriminals to exploit. The increase in cyber threats, such as malware, hacking, and…

Read More
Microsoft Azure API Management Service Exposed to 3 Critical Security Flaws: Researchers WarnMicrosoft,Azure,APIManagement,Security,Flaws,Researchers.

Microsoft Azure API Management Service Exposed to 3 Critical Security Flaws: Researchers Warn

In today’s digital age, internet security has become more crucial than ever. As companies move their operations online, the need for secure networks has increased greatly. IT managers are burdened with the task of managing their company’s network security, but with the help of Perimeter 81’s network security platform, the workday has become more efficient….

Read More