AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs

New cybersecurity research has found that command-line interface (CLI) tools from Amazon Web Services (AWS) and Google Cloud can expose sensitive credentials in build logs, posing significant risks to organizations. The vulnerability has been codenamed LeakyCLI by cloud security firm Orca. “Some commands on Azure CLI, AWS CLI, and Google Cloud CLI can expose sensitive […]

Azure CLI stores credentials in plaintext in logs. A easy technique to hack cloud environments

CVE-2023-36052 is a critical security vulnerability in the Azure Command-Line Interface (CLI), a tool for managing Azure resources. This vulnerability, reported by Palo Alto’s Prisma Cloud, allowed unauthenticated attackers to remotely access plaintext contents, including usernames and passwords, from Continuous Integration and Continuous Deployment (CI/CD) logs created using Azure CLI. These logs could be published […]

How cyber criminals are hacking into AWS Fargate, EKS & evading cloudtrail logs detection

Sysdig, a company that specializes in cybersecurity intelligence, uncovered a sophisticated hacking operation known as Scarleteel in February. Since then, Scarleteel has refined both its infection and exfiltration techniques and moved into phase two. Recent operations by Scarleteel have targeted settings such as AWS Fargate and Kubernetes, which indicates a clear shift from just crypto […]

What If Your VPN Keeps Logs and Why You Should Care

Have you ever asked yourself the question: “So what if my VPN keeps logs?” Don’t worry. It’s a good question to ask. It means you’re actually curious about the nuances of data collection, management and how they affect you. In order to answer this question, we first have to delve into the inner workings of […]

Unprotected VOIP Server Exposed Millions of SMS Messages, Call Logs

A California-based Voice-Over-IP (VoIP) services provider VOIPO has accidentally left tens of gigabytes of its customer data, containing millions of call logs, SMS/MMS messages, and plaintext internal system credentials, publicly accessible to anyone without authentication. VOIPo is one of a leading providers of Voice-Over-IP (VoIP) services in the United States offering reseller VoIP, Cloud VoIP, and […]

Google Play Store To Remove Apps That Seek SMS, Call Logs Permission

After cracking down on apps involving ad-fraud and spread of malware, Google is calling rogue Android apps on Play Store which require permission to access call logs and SMS. Google has warned developers that in upcoming weeks, apps whose core functionality require SMS and call log permission will be removed from the Android app store. Until […]

Now, Only Default Android Apps Can Access Call Logs And SMS Data

A few hours ago, the company announced its “not shocking” intention to shut down Google+ social network as a result of a “shocking” data breach. Now, in order to prevent the abuse and potential leakage of confidential data to third-party application developers, Google has made several important changes to help users better control the type […]

CT-Exposer – An OSINT Tool That Discovers Sub-Domains By Searching Certificate Transparency Logs

Discover sub-domains by searching through Certificate Transparency logs. What is CT? Certificate Transparency (CT) is an experimental IETF standard. The goal of it was to allow the public to audit which certificates were created by Certificate Authorities (CA). TLS has a weakness that comes from the large list of CAs that your browser implicitly trusts. […]

“OwnMe” Android Spyware Can Access Your WhatsApp Texts, Call Logs, Browsing History

A security researcher from ESET has announced that he has unearthed new Android-based spyware that is capable of accessing the Whatsapp database and features a host of surveillance features. As reported by ZDNet, the spyware has been discovered on Github in a repository named “OwnMe.” It features a MainActivity.class that initiates a new service OwnMe.class, […]

Log-killer : Clear All Your Logs In Linux & Windows Servers

Log-killer clear all your logs in linux and windows servers. Just download the tool and run it on the server. If your server OS is Windows then download the batch file and run it as administrator. But if your server Linux and then you should run the php script. Log-killer ScreenShots Windows : Linux : […]

20 Best Free Image Download Sites | Get Stock Photos For Blogs In 2018

It is said that a picture is worth a thousand words, so pairing up your articles, blogs, newsletter, ad-campaigns or presentations with the right image is crucial to make them stand out on or off the internet. But many people struggle to find the perfect image for their blog post or design projects that would […]

Woman who hacked airline network busted through VPN logs

VPN Logs Lead to Capturing of an Ex-PenAir Employee Who Hacked Into Company’s Internal Networks. A 59-year old US female has been arrested for hacking into her previous employer’s internal networks and creating havoc by sabotaging the day-to-day activities of the company, thanks to the VPN logs – The accused is a former employee of […]

Facebook collected users’ call and SMS logs with “their permission”

Facebook is in hot waters for the last couple of weeks after it was reported that the company secretly shared 50 million user profiles with a British political consulting and data mining firm Cambridge Analytica. The data was apparently used to influence Brexit campaign and US presidential election since Cambridge Analytica also worked President Trump and Republican Senator […]

Facebook Caught Sucking Your Call Logs And SMS History For Years

If the Cambridge Analytica story wasn’t enough, Facebook is again under fire for collecting people’s call logs and SMS history for years. Per reports, the said data was discovered by many Android users after they obtained the offline copy of their Facebook data. Earlier, it was said that the company did so without asking the […]

certstreamcatcher – Catching phishing by observing certificate transparency logs

Catching phishing by observing certificate transparency logs. This tool is based on regex with effective standards for detecting phishing sites in real time using certstream.   Installation $ cd /opt/ $ git clone https://github.com/6IX7ine/certstreamcatcher.git $ cd certstreamcatcher $ npm install npm package To install certstreamcatcher using npm run: npm install –save certstreamcatcher Try on npm […]

PureVPN Aided FBI to Track CyberStalker by Providing His Logs

On Friday a New Town, Massachusetts based man called Ryan Lin was arrested for cyberstalking after his VPN logs were provided by PureVPN. Lin was accused of cyberstalking his ex-roommate 24-year old Jennifer Smith. Initially, the case was handled by the Waltham Police department, but it was then transferred to the FBI [PDF]. According to the […]

Mobile Banking Malware “Svpeng” Working as a Keylogger and Steals Contacts and Call Logs

New Banking Malware called “Svpeng” -Trojan-Banker.AndroidOS.Svpeng.ae Discovered with New Advance Futures that working as Keylogger and steals sensitive information such as Entering texts, to send SMS, Call logs and Contacts Details from victims Mobile. Taking Advantages of accessibility services and abusing the system futures allow this Trojan not only steal the call logs and Entering texts, […]