Tag: AWS S3

  • Slashdot: Ransomware Crew Abuses AWS Native Encryption, Sets Data-Destruct Timer for 7 Days

    Source URL: https://it.slashdot.org/story/25/01/14/0141238/ransomware-crew-abuses-aws-native-encryption-sets-data-destruct-timer-for-7-days?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Ransomware Crew Abuses AWS Native Encryption, Sets Data-Destruct Timer for 7 Days Feedly Summary: AI Summary and Description: Yes Summary: The emergence of the ransomware group Codefinger highlights a novel and dangerous method of exploiting AWS S3 buckets by using compromised AWS keys and AWS’s SSE-C (Server-Side Encryption with…

  • The Register: Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

    Source URL: https://www.theregister.com/2025/01/13/ransomware_crew_abuses_compromised_aws/ Source: The Register Title: Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days Feedly Summary: ‘Codefinger’ crims on the hunt for compromised keys A new ransomware crew dubbed Codefinger targets AWS S3 buckets and uses the cloud giant’s own server-side encryption with customer provided keys (SSE-C) to lock up…

  • Hacker News: VictoriaLogs: A Grafana Dashboard for AWS VPC Flow Logs – Migrating from Grafan

    Source URL: https://rtfm.co.ua/en/victorialogs-a-grafana-dashboard-for-aws-vpc-flow-logs-migrating-from-grafana-loki/ Source: Hacker News Title: VictoriaLogs: A Grafana Dashboard for AWS VPC Flow Logs – Migrating from Grafan Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text details the implementation of a monitoring system for AWS VPC Flow Logs using Terraform in conjunction with tools like Grafana, Loki, and VictoriaLogs. It…

  • Hacker News: Transactional Object Storage?

    Source URL: https://blog.mbrt.dev/posts/transactional-object-storage/ Source: Hacker News Title: Transactional Object Storage? Feedly Summary: Comments AI Summary and Description: Yes Summary: The text explores the challenges and solutions in developing a portable and cost-effective database solution using object storage services like AWS S3 and Google Cloud Storage. By reinventing aspects of traditional databases, the author outlines a…

  • Hacker News: S3 Express Append has issues

    Source URL: https://blog.astradot.com/s3-express-append-has-issues/ Source: Hacker News Title: S3 Express Append has issues Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the recent updates to AWS S3 Express, particularly its append functionality, and compares it with EBS disks in handling data consistency within distributed systems. Professionals in AI, cloud, and infrastructure security…

  • The Register: Gang gobbles 15K credentials from cloud and email providers’ garbage Git configs

    Source URL: https://www.theregister.com/2024/10/31/emeraldwhale_credential_theft/ Source: The Register Title: Gang gobbles 15K credentials from cloud and email providers’ garbage Git configs Feedly Summary: Emeraldwhale gang looked sharp – until it made a common S3 bucket mistake A criminal operation dubbed Emeraldwhale has been discovered after it dumped more than 15,000 credentials belonging to cloud service and email…

  • The Register: Developer pockets $2M in savings from going cloud-free

    Source URL: https://www.theregister.com/2024/10/21/37signals_aws_savings/ Source: The Register Title: Developer pockets $2M in savings from going cloud-free Feedly Summary: 37signals CTO claims cost of new hardware was ‘entirely recouped’ as contracts expired after AWS exit The web software biz that decided to exit the cloud after racking up a huge bill says it has saved almost $2…

  • Hacker News: Hacking misconfigured AWS S3 buckets: A complete guide

    Source URL: https://blog.intigriti.com/hacking-tools/hacking-misconfigured-aws-s3-buckets-a-complete-guide Source: Hacker News Title: Hacking misconfigured AWS S3 buckets: A complete guide Feedly Summary: Comments AI Summary and Description: Yes Summary: The provided text outlines common security misconfigurations associated with AWS S3 buckets, detailing methods for enumeration, testing permissions, and the implications of misconfigured access controls. This content is highly relevant for…