FreeIntelHub
Feed
Sources
The Hacker News Dark Reading BleepingComputer SecurityWeek Krebs on Security Help Net Security The CyberWire SC Media HackRead GBHackers CSO Online Cybersecurity Dive Information Security Buzz Security Affairs Graham Cluley SANS ISC WeLiveSecurity Google Security Blog Cisco Advisories Palo Alto Networks CISA Advisories US-CERT Alerts Microsoft Security Blog Mandiant Blog Recorded Future Talos Intelligence Unit 42 SentinelOne Blog CrowdStrike Blog Sophos News Threatpost Infosecurity Magazine Cyberscoop The Record SecurityTrails Blog Naked Security Schneier on Security Qualys Blog Rapid7 Blog Tenable Blog Fortinet Blog Trend Micro Research Kaspersky Securelist ESET Research Check Point Research Zscaler Blog Proofpoint Blog Elastic Security Labs Akamai Blog Cisco Talos Blog Volexity Blog NIST NVD Exploit Database Packet Storm Full Disclosure CERT-EU News Wordfence Blog Trail of Bits PortSwigger Research PortSwigger Daily Swig Hacker One Hacktivity Zero Day Initiative Google Project Zero AWS Security Blog Cloudflare Blog Mozilla Security Blog
View all sources
Vendors
Microsoft Google Apple Amazon Intel Cisco Fortinet Linux GitHub Check Point Cloudflare Oracle Rapid7 WordPress Palo Alto Networks
View all vendors
Threats
Data Breach Zero-Day Ransomware CVE Vulnerability Disclosure Advisory TTPs Campaigns Operational Technology Phishing Malware Supply Chain DDoS Insider Threat
View all types
Sectors
Financial Healthcare Defense Government Manufacturing Energy Telecommunications Retail Education Transportation Food & Beverages Technology Legal Media
View all sectors
Actors
Threat Groups Software & Malware Campaigns
Tools
Trending Threat Heatmap MITRE ATT&CK IOC Feed Bookmarks
RSS Feed API
Alerts

Amazon

20 articles

Zero Day Initiative CVE Amazon Mar 30

ZDI-26-246: (0Day) aws-mcp-server Command Injection Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on affected installations of aws-mcp-server. Authentication is not required to exploit t...

T1190 T1059 1 IOC

Zero Day Initiative →

Zero Day Initiative CVE Amazon Mar 30

ZDI-26-245: (0Day) aws-mcp-server AWS CLI Command Injection Remote Code Execution Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on affected installations of aws-mcp-server. Authentication is not required to exploit t...

T1190 T1059 1 IOC

Zero Day Initiative →

GBHackers Data Breach Amazon Mar 28

European Commission Confirms Cyberattack After AWS Account Breach

The European Commission has confirmed a cybersecurity incident affecting its cloud-based infrastructure after attackers gained access to an Amazon Web Servic...

GBHackers →

CSO Online Campaigns Amazon Mar 27

European Commission data stolen in a cyberattack on the infrastructure hosting its web sites

The European Commission is continuing to investigate the theft of data from its cloud infrastructure earlier this week. On Thursday, the Commission revealed ...

T1041

CSO Online →

GBHackers Vulnerability Disclosure Amazon Mar 27

BIND 9 Security Flaws Allow Attackers to Bypass Security Controls and Crash Servers

The Internet Systems Consortium (ISC) has released critical security advisories addressing three new vulnerabilities in the widely used BIND 9 Domain Name Sy...

GBHackers →

BleepingComputer Data Breach Amazon Mar 27

European Commission investigating breach after Amazon cloud hack

The European Commission, the European Union's main executive body, is investigating a security breach after a threat actor gained access to its Amazon cloud ...

BleepingComputer →

BleepingComputer Data Breach Amazon Mar 27

European Commission investigating breach after Amazon cloud account hack

The European Commission, the European Union's main executive body, is investigating a security breach after a threat actor gained access to its Amazon cloud ...

BleepingComputer →

Help Net Security CVE Amazon Mar 27

CISA sounds alarm on Langflow RCE, Trivy supply chain compromise after rapid exploitation

The US Cybersecurity and Infrastructure Security Agency (CISA) has added two new vulnerabilities to its Known Exploited Vulnerabilities catalog: CVE-2026-330...

T1195 2 IOCs

Help Net Security →

The Hacker News General Amazon Mar 27

LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks

Cybersecurity researchers have disclosed three security vulnerabilities impacting LangChain and LangGraph that, if successfully exploited, could expose files...

The Hacker News →

The Record General Amazon Mar 26

EU investigating Snapchat and pornography sites in child safety crackdown

The European Commission opened an investigation into Snapchat and warned four pornographic platforms they could face penalties for failing to follow child sa...

The Record →

Infosecurity Magazine General Amazon Mar 26

OpenAI Expands Bug Bounty to Cover AI Abuse and 'Safety' Concerns

OpenAI’s Safety Bug Bounty program seeks to address AI safety vulnerabilities beyond traditional security flaws

Infosecurity Magazine →

GBHackers Campaigns Amazon Mar 26

Fake Screenshot Lures Target Web3 Support Staff with Multi-Stage Malware Attack

Fake screenshot links are being used to quietly deploy a multi‑stage backdoor against Web3 customer support teams, in a campaign assessed to be linked to the...

GBHackers →

BleepingComputer Zero-Day Amazon Citrix Mar 25

Citrix urges admins to patch NetScaler flaws as soon as possible

Citrix has patched two NetScaler ADC and NetScaler Gateway vulnerabilities, one of which is very similar to the CitrixBleed and CitrixBleed2 flaws exploited ...

BleepingComputer →

AWS Security Blog General Amazon Mar 23

IAM policy types: How and when to use them

June 3, 2022: Original publication date of this post. This post has been updated to add the additional IAM policy types: Resource control policies.

AWS Security Blog →

The Hacker News General Amazon Salesforce Mar 23

We Found Eight Attack Vectors Inside AWS Bedrock. Here's What Attackers Can Do with Them

AWS Bedrock is Amazon's platform for building AI-powered applications. It gives developers access to foundation models and the tools to connect those models ...

The Hacker News →

Infosecurity Magazine Zero-Day Amazon Cisco Mar 19

AWS Warns Hackers Have Abused Cisco Firewall Zero-Day Since January

Notorious ransomware group Interlock has been exploiting a Cisco zero-day bug since January, AWS says

Infosecurity Magazine →

The Hacker News Zero-Day Amazon Cisco Oracle Intel Mar 18

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access

Amazon Threat Intelligence is warning of an active Interlock ransomware campaign that's exploiting a recently disclosed critical security flaw in Cisco Secur...

1 IOC

The Hacker News →

AWS Security Blog Ransomware Amazon Cisco Oracle Intel Mar 18

Amazon threat intelligence teams identify Interlock ransomware campaign targeting enterprise firewalls

Amazon threat intelligence has identified an active Interlock ransomware campaign exploiting CVE-2026-20131, a critical vulnerability in Cisco Secure Firewal...

1 IOC

AWS Security Blog →

The Hacker News General Amazon Mar 18

9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendors

Cybersecurity researchers have warned about the risks posed by low-cost IP KVM (Keyboard, Video, Mouse over Internet Protocol) devices, which can grant attac...

The Hacker News →

AWS Security Blog General Amazon Mar 17

AWS completes the second GDV community audit with participant insurers in Germany

We’re excited to announce that Amazon Web Services (AWS) has completed its second GDV (German Insurance Association) community audit with 36 members from the...

AWS Security Blog →

« Prev 1 2 3 4 5 6 Next »
FreeIntelHub · Open-source CTI platform

All articles belong to their respective owners. FreeIntelHub aggregates publicly available RSS feeds for informational purposes only. DMCA