VulnCheck researchers report a private OAST service exploiting more than 200 CVEs using Google Cloud infrastructure. Activity involved modified Nuclei templates, custom payloads, and targeted scanning against Canary Systems in Brazil.
The long-running Interactsh server (active since 2024) and multiple Google Cloud IPs make this campaign particularly notable.
What defensive controls do you think matter most when attackers blend in through legitimate cloud services?
Follow @technadu for more cybersecurity updates.
Source: https://gbhackers.com/mystery-oast-tool-exploits-200-cves/
#Cybersecurity #ThreatIntel #OAST #AppSec #CloudSecurity #CVE #SecurityResearch #InfoSec #TechNadu



