https://xca-attacks.github.io/fabricked/ #InfinityFabric #Misconfiguration #FirmwareFails #TechHumor #SecurityBreach #HackerNews #ngated
NEW by me:
Many immigrants have enough anxiety these days without their lawyer leaking their files and having the files all wind up in the hands of criminals. Read about what happened with a NYC law firm in my new post.
No need to hack when itโs leaking: Dalbir Singh & Associates law firm edition:
#dataleak #immigration #incidentresponse #misconfiguration #KillSec #DSDLaw
A misconfigured server tied to the carding marketplace Jerryโs Store exposed 345,000 stolen credit cards after an #AI coding error.
Read: https://hackread.com/misconfigured-server-hackers-leak-stolen-credit-cards/
#CyberSecurity #CyberCrime #DataLeak #Misconfiguration #JerrysStore
Misconfiguration Exposes Azure AI Agent to Unauthorized Access
A single misconfiguration in Microsoft's Azure SRE Agent turned a troubleshooting tool into a live wiretap, potentially allowing outsiders to intercept sensitive conversations, commands, and credentials from other companies in real time. This alarming security flaw may have left organizations vulnerable to unauthorized access,โฆ
#CloudSecurity #Azure #Misconfiguration #UnauthorizedAccess #EmergingThreats
McGraw Hill Data Leak Exposes 13.5M Records After Salesforce Misconfiguration
McGraw Hill, a leading publisher of educational materials, recently suffered a significant data leak, exposing a staggering 13.5 million records due to a misconfigured Salesforce-hosted page. This alarming breach highlights the importance of robust data security measures, even for companies with a traditional focus like textbookโฆ
#DataLeak #McgrawHill #Salesforce #Misconfiguration #Education
โ๏ธ Technical Spotlight: New Session at BSides Luxembourg 2026
โ๏ธ๐ฅ ๐๐๐ข๐จ๐ ๐ ๐๐ฆ๐๐ข๐ก๐๐๐๐จ๐ฅ๐๐ง๐๐ข๐ก๐ฆ: ๐ฃ๐ข๐๐ ๐ฃ๐ข๐๐, ๐๐ฅ๐๐๐๐ โ Kat Fitzgerald ( @rnbwkat ) ๐โ๏ธ
Cloud breaches arenโt going awayโtheyโre evolving.
Forget the classic โpublic bucketโ mistakes. In 2026, real-world breaches are driven by over-privileged identities, risky SaaS integrations, forgotten environments, and insecure defaults in AI and Kubernetes. These arenโt obvious misstepsโtheyโre systemic risks hiding in plain sight.
This talk breaks down the modern hierarchy of cloud misconfigurations based on recent breach data, then shifts the focus from reacting to preventing. Using Policy as Code (PaC), security becomes proactiveโblocking risky deployments before they ever reach production.
Youโll also explore the Toxic Trilogy: assets that are publicly exposed, highly privileged, and critically vulnerable. When these overlap, breaches arenโt just possibleโtheyโre predictable.
Kat Fitzgerald ( @rnbwkat )is a Chicago-based cybersecurity professional with a passion for cloud security, OSS, and creative defensive strategies. Known for blending technical depth with a unique personality (and a certain opinionated flamingo), Kat brings real-world insights into modern cloud risks and how to stop them before they start.
๐ฑ Want to easily navigate all talks, villages, and stages?
Check out the official schedule on Hacker Tracker:
https://hackertracker.app/schedule?conf=BSIDESLUX2026
๐
Conference Dates: 6โ8 May 2026 | 09:00โ18:00
๐ 14, Porte de France, Esch-sur-Alzette, Luxembourg
๐๏ธ Tickets: https://2026.bsides.lu/tickets/
๐
Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/
#BSidesLuxembourg2026 #CloudSecurity #Misconfiguration #Kubernetes #PolicyAsCode #DevSecOps #CyberSecurity
Hello cyber pros! It's been a week of critical reminders about cloud security, diligent patching, and the evolving nature of warfare. Let's dive into the latest:
Salesforce Cloud Misconfigurations Under Attack โ ๏ธ
- Threat actors are actively exploiting "overly permissive" guest user configurations in Salesforce Experience Cloud to steal sensitive data.
- This isn't a Salesforce platform vulnerability, but rather a customer misconfiguration. Attackers are using modified Aura Inspector tools to scan and extract data from public-facing sites.
- Actionable advice: audit guest user profiles, set company-wide defaults to "private", disable public APIs, restrict visibility, disable self-registration if not needed, and regularly review event monitoring logs.
๐๏ธ Dark Reading | https://www.darkreading.com/application-security/overly-permissive-salesforce-cloud-configs-crosshairs
Microsoft's March Patch Tuesday ๐ก๏ธ
- Microsoft released patches for 83 CVEs this month, with six identified as "more likely to exploit" and eight critical severity.
- A notable critical RCE (CVE-2027-21536, CVSS 9.8) in the Microsoft Devices Pricing Program was already patched and mitigated, uniquely identified by an AI agent.
- Two publicly known (zero-day) flaws, CVE-2026-26127 (.NET DoS) and CVE-2026-21262 (SQL Server EoP), are considered low threat despite public disclosure.
- Key EoP vulnerabilities include three in the Windows kernel (CVE-2026-24289, CVE-2026-26132, CVE-2026-24287) and others in SMB Server (CVE-2026-24294) and Microsoft Graphics Component (CVE-2026-23668), all with higher exploit likelihood.
- Two RCEs in Microsoft Office (CVE-2026-26113, CVE-2026-26110, CVSS 8.4) can be exploited via the Preview Pane without opening malicious files. Mitigate by disabling Preview Pane and restricting untrusted Office files.
๐๏ธ Dark Reading | https://www.darkreading.com/application-security/microsoft-patches-83-cves-march-update
Cloud Resilience in Modern Warfare โ๏ธ
- Recent Middle East conflicts saw physical attacks, including drone strikes, on AWS facilities in the UAE and Bahrain, causing significant structural damage and service disruptions.
- This highlights a critical shift: hyper-scale cloud data centres are now "Tier 1 strategic targets" in modern warfare, as militaries and governments increasingly rely on cloud infrastructure.
- Traditional cloud resilience strategies, designed for natural disasters, are insufficient against kinetic attacks that can permanently destroy hardware or sever physical connectivity.
- Organisations must rethink disaster recovery and data governance, especially for real-time, low-latency workloads. The concept of "Allied Data Sovereignty" may emerge, advocating for data backups in allied nations to ensure survival during crises.
๐๏ธ Dark Reading | https://www.darkreading.com/cyber-risk/middle-east-conflict-highlights-cloud-resilience-gaps
#CyberSecurity #ThreatIntelligence #CloudSecurity #Salesforce #Misconfiguration #PatchTuesday #Microsoft #Vulnerabilities #RCE #EoP #CyberWarfare #CloudResilience #InfoSec
Lukasz Olejnik (@lukOlejnik)
OpenClaw ์ฌ์ฉ์๊ฐ ๋ธ๋ผ์ฐ์ ๋ฅผ ์ธํฐ๋ท(0.0.0.0)์ ๋ ธ์ถํด ์ค์ ์ด ๊ณต๊ฐ๋ ATM์ฒ๋ผ ๋์, ์ ์ฉ์นด๋๊ฐ ์ง์ ์ฒญ๊ตฌ๋ผ ํ๋ ๊ฑฐ์ ์ด๊ณผ๋ ์ฌ๊ณ ๋ฐ์. ๊ธฐ๋ณธ๊ฐ ๋๋ ์๋ชป๋ ๊ตฌ์ฑ์์ OpenClaw ์๋น์ค๊ฐ ๋ชจ๋ ์ธํฐํ์ด์ค์์ ๋ฆฌ์ค๋ํด ์ธ๋ถ ์ ๊ทผ ๋ฐ ์๊ธ ํผํด์ ์ทจ์ฝํ๋ค๋ ๋ณด์ ๊ฒฝ๊ณ ์ฑ ๋ด์ฉ์ ๋๋ค.

Someone using @OpenClaw to write programs exposed the browser to the internet turning his setup to a public ATM. The credit card was continuously charged, nearly maxing out the limit. In default or improper configurations, OpenClaw's services listen on all interfaces (0.0.0.0),
Cloudflare misconfiguration behind recent BGP route leak
https://www.bleepingcomputer.com/news/security/cloudflare-misconfiguration-behind-recent-bgp-route-leak/
#Infosec #Security #Cybersecurity #CeptBiro #Cloudflare #Misconfiguration #BGProuteLeak
๐ฐ EY Leaks 4TB+ SQL Database Packed with Corporate Secrets via Cloud Misconfiguration
CRITICAL LEAK: Consulting giant EY exposed a 4TB+ unencrypted SQL database to the public internet. ๐ณ The backup file, found by researchers, contained API keys, passwords & other corporate secrets. #DataBreach #CloudSecurity #Misconfiguration