Archive for the ‘Amazon AWS’ Category

5 Places Where Hackers Are Stealthily Stealing Your Data In 2019

October 31st, 2019
Skyrocketing data breaches bring incalculable losses to organizations and can cost cybersecurity executives their jobs. Here we examine the top five places in 2019 where cybercriminals are stealing corporate and government data without ever getting noticed and then learn how to avoid falling victim to unscrupulous attackers. 1. Misconfigured Cloud Storage 48% of all corporate data is

Posted in Amazon AWS, cloud server, Cyber Criminal, cybersecurity, dark web, data breach, data protection, Deep Web, mobile api security | Comments (0)

RunC Flaw Lets Attackers Escape Linux Containers to Gain Root on Hosts

February 12th, 2019
A serious security vulnerability has been discovered in the core runC container code that affects several open-source container management systems, potentially allowing attackers to escape Linux container and obtain unauthorized, root-level access to the host operating system. The vulnerability, identified as CVE-2019-5736, was discovered by open source security researchers Adam Iwaniuk and

Posted in Amazon AWS, Cloud hosting, docker, Google Cloud, hacking news, how to hack linux, Kubernetes, linux, linux container, Linux hacking, redhat linux, SELinux, Suse Linux, Virtualization software | Comments (0)

Critical Flaws Found in Amazon FreeRTOS IoT Operating System

October 19th, 2018
A security researcher has discovered several critical vulnerabilities in one of the most popular embedded real-time operating systems—called FreeRTOS—and its other variants, exposing a wide range of IoT devices and critical infrastructure systems to hackers. What is FreeRTOS (Amazon, WHIS OpenRTOS, SafeRTOS)? FreeRTOS is a leading open source real-time operating system (RTOS) for embedded

Posted in Amazon AWS, Amazon Web Services, embedded devices, FreeRTOS, IoT Hacking, IoT Operating System, IoT security, OpenRTOS, remote code execution, SafeRTOS, Vulnerability | Comments (0)