CloudBreach (@cloud_breach) 's Twitter Profile
CloudBreach

@cloud_breach

๐ŸŒฉ๏ธ Empowering You to Defend Against Cloud Breaches ๐ŸŒฉ๏ธ

ID: 1478753923263614977

linkhttp://cloudbreach.io/ calendar_today05-01-2022 15:43:39

597 Tweet

3,3K Takipรงi

66 Takip Edilen

CloudBreach (@cloud_breach) 's Twitter Profile Photo

๐Ÿšจ New #EntraID vulnerability: Actor Tokens discovered by Dirk-jan. A flaw in token validation that lets an attacker escalate to Global Admin. ๐Ÿช„ Undocumented MS tokens let attackers impersonate ANY user ๐ŸŒ Cross-tenant abuse โ†’ obtain Global Admin in every tenant ๐Ÿ‘€ Bypasses

๐Ÿšจ New #EntraID vulnerability: Actor Tokens discovered by <a href="/_dirkjan/">Dirk-jan</a>. A flaw in token validation that lets an attacker escalate to Global Admin.
๐Ÿช„ Undocumented MS tokens let attackers impersonate ANY user
๐ŸŒ Cross-tenant abuse โ†’ obtain Global Admin in every tenant
๐Ÿ‘€ Bypasses
CloudBreach (@cloud_breach) 's Twitter Profile Photo

๐Ÿš€ Level Up Your Cloud Security Skills with BreachingAWS+ ๐ŸŒฉ๏ธ Improve your Hands-on skills and think like an attacker with BreachingAWS+ ๐Ÿ”ฅ Whatโ€™s inside: โœ… 14 Lessons - structured for real-world learning โœ… 22 Attack Paths โ€“ learn adversary tradecraft โœ… 17 AWS Services โ€“

๐Ÿš€ Level Up Your Cloud Security Skills with BreachingAWS+ ๐ŸŒฉ๏ธ
Improve your Hands-on skills and think like an attacker with BreachingAWS+

๐Ÿ”ฅ Whatโ€™s inside:
โœ… 14 Lessons - structured for real-world learning
โœ… 22 Attack Paths โ€“ learn adversary tradecraft
โœ… 17 AWS Services โ€“
CloudBreach (@cloud_breach) 's Twitter Profile Photo

๐Ÿ› ๏ธ๐Ÿš€๐ŸŒฉ๏ธ OsintTool is a PowerShell 7+ reconnaissance framework built for #Azure/#EntraID tenants. It automates: > Tenant discovery & service fingerprinting > Auth flow probing & conditional access checks > DNS / network mapping & subdomain enumeration > Certificate transparency

๐Ÿ› ๏ธ๐Ÿš€๐ŸŒฉ๏ธ OsintTool is a PowerShell 7+ reconnaissance framework built for #Azure/#EntraID tenants. It automates:
&gt; Tenant discovery &amp; service fingerprinting
&gt; Auth flow probing &amp; conditional access checks
&gt; DNS / network mapping &amp; subdomain enumeration
&gt; Certificate transparency
Cloud Village (@cloudvillage_dc) 's Twitter Profile Photo

๐ŸŒ๐Ÿ”’ Cybersecurity Awareness Month is here ๐Ÿ”’๐ŸŒ A huge THANK YOU to our amazing sponsors of 2025 who enabled us to bring Cloud Village across conferences like DEF CON RSAC BSidesCharm BSidesSF and Out Of The Box Security Conference ๐Ÿ’œ Your support empowers our talks, workshops, CTFs & labs and

๐ŸŒ๐Ÿ”’ Cybersecurity Awareness Month is here ๐Ÿ”’๐ŸŒ

A huge THANK YOU to our amazing sponsors of 2025 who enabled us to bring <a href="/cloudvillage_dc/">Cloud Village</a> across conferences like <a href="/defcon/">DEF CON</a> <a href="/OneRSAC/">RSAC</a> <a href="/BSidesCharm/">BSidesCharm</a> <a href="/BSidesSF/">BSidesSF</a> and <a href="/OOTBconf/">Out Of The Box Security Conference</a> ๐Ÿ’œ

Your support empowers our talks, workshops, CTFs &amp; labs and
CloudBreach (@cloud_breach) 's Twitter Profile Photo

๐Ÿšจ How to stop the next #CloudBreach? ๐Ÿ”‘ Least privilege + MFA ๐Ÿ” Secure secrets โš™๏ธ Harden configs & IaC ๐Ÿ‘€ Monitor & alert ๐Ÿ•ต๏ธ Red/Purple Team drills ๐ŸŽ“ Train your team on real attack paths ๐Ÿ‘‰ Hands-on labs: cloudbreach.io/labs #CloudSecurity #BreachingAWS #BreachingAzure

๐Ÿšจ How to stop the next #CloudBreach?
๐Ÿ”‘ Least privilege + MFA
๐Ÿ” Secure secrets
โš™๏ธ Harden configs &amp; IaC
๐Ÿ‘€ Monitor &amp; alert
๐Ÿ•ต๏ธ Red/Purple Team drills
๐ŸŽ“ Train your team on real attack paths
๐Ÿ‘‰ Hands-on labs: cloudbreach.io/labs

#CloudSecurity #BreachingAWS #BreachingAzure
CloudBreach (@cloud_breach) 's Twitter Profile Photo

๐Ÿฅทโ˜๏ธAWS C2 alert: #AWS X-Ray โ€” built for tracing โ€” can be weaponized as a covert Command & Control channel. ๐Ÿงฉ Attackers encode commands/results in X-Ray annotations ๐Ÿ” Use legit SigV4 API calls โ†’ blends with real telemetry ๐Ÿ‘€ Hard to spot via traditional network defenses โš™๏ธ

๐Ÿฅทโ˜๏ธAWS C2 alert: #AWS X-Ray โ€” built for tracing โ€” can be weaponized as a covert Command &amp; Control channel.

๐Ÿงฉ Attackers encode commands/results in X-Ray annotations
๐Ÿ” Use legit SigV4 API calls โ†’ blends with real telemetry
๐Ÿ‘€ Hard to spot via traditional network defenses
โš™๏ธ
CloudBreach (@cloud_breach) 's Twitter Profile Photo

๐Ÿšจ #Azure Outage Impact #Microsoft suffered a major Azure Front Door (AFD) disruption that knocked out access to Microsoft 365, Azure, and Entra admin portals โ€” with users across Europe, Africa & the Middle East hit hardest. ๐ŸŒ ๐Ÿงฉ The issue stemmed from capacity loss in AFD

๐Ÿšจ #Azure Outage Impact
#Microsoft suffered a major Azure Front Door (AFD) disruption that knocked out access to Microsoft 365, Azure, and Entra admin portals โ€” with users across Europe, Africa &amp; the Middle East hit hardest. ๐ŸŒ
๐Ÿงฉ The issue stemmed from capacity loss in AFD
CloudBreach (@cloud_breach) 's Twitter Profile Photo

๐Ÿ”ฅ Breaching Azure Advanced - Coming Soon Think like a #hacker. Break it to learn how to secure it. ๐Ÿงฉ Hands-on labs, not slides โ€” real scenarios that teach offensive tradecraft and defensive controls. ๐ŸŒ Subdomain Takeovers โ€” find the forgotten edges and claim the namespace. ๐Ÿ’ฌ

๐Ÿ”ฅ Breaching Azure Advanced - Coming Soon
Think like a #hacker. Break it to learn how to secure it. 
๐Ÿงฉ Hands-on labs, not slides โ€” real scenarios that teach offensive tradecraft and defensive controls.
๐ŸŒ Subdomain Takeovers โ€” find the forgotten edges and claim the namespace.
๐Ÿ’ฌ
CloudBreach (@cloud_breach) 's Twitter Profile Photo

โ˜๏ธ Cloud under fire: #Microsoftโ€™s 2025 Digital Defense Report shows a surge in cloud-focused #cyberattacks ๐Ÿ”ฅ ๐Ÿ”ฅ +87% rise in destructive campaigns on Azure ๐Ÿงฉ 40% of ransomware now hybrid (cloud + on-prem) ๐Ÿ•ต๏ธโ€โ™‚๏ธ OAuth & identity abuse increasing ๐Ÿ”‘ Non-human identities = new weak

โ˜๏ธ Cloud under fire: #Microsoftโ€™s 2025 Digital Defense Report shows a surge in cloud-focused #cyberattacks ๐Ÿ”ฅ
๐Ÿ”ฅ +87% rise in destructive campaigns on Azure
๐Ÿงฉ 40% of ransomware now hybrid (cloud + on-prem)
๐Ÿ•ต๏ธโ€โ™‚๏ธ OAuth &amp; identity abuse increasing
๐Ÿ”‘ Non-human identities = new weak
ALI TAJRAN (@alitajran) 's Twitter Profile Photo

ATTENTION: Phishing Attack Uses Azure Blob Storage to Impersonate Microsoft! Attackers have found a new method to trick end users into logging in to a malicious login page, intercepting tokens, and infiltrating the tenant. What makes this particularly sneaky is that they are

ATTENTION: Phishing Attack Uses Azure Blob Storage to Impersonate Microsoft!

Attackers have found a new method to trick end users into logging in to a malicious login page, intercepting tokens, and infiltrating the tenant.

What makes this particularly sneaky is that they are
CloudBreach (@cloud_breach) 's Twitter Profile Photo

๐Ÿšจ Huge #AWS outage underway - major apps including Jiraโ€ฏCloud, Signal, Fortnite, Roblox, Zoom and many more are offline or facing serious disruption. The cloud giantโ€™s US-EAST-1 region is reporting โ€œsignificant error rates for requests made to the Amazonโ€ฏDynamoDB APIsโ€ and

๐Ÿšจ Huge #AWS outage underway - major apps including Jiraโ€ฏCloud, Signal, Fortnite, Roblox, Zoom and many more are offline or facing serious disruption.

The cloud giantโ€™s US-EAST-1 region is reporting โ€œsignificant error rates for requests made to the Amazonโ€ฏDynamoDB APIsโ€ and
CloudBreach (@cloud_breach) 's Twitter Profile Photo

๐Ÿ› ๏ธ๐Ÿงฐ NoPrompt by NotSoSecure | Part of Claranet Cyber Security - #Azure CAP testing tool ๐Ÿ”Ž Checks for password-only access to Microsoft Entra ID / Azure AD (MFA gaps) ๐ŸŒ Simulates OAuth2 & web logins across multiple device user-agents ๐Ÿงฉ Tests Microsoft Graph, AAD Graph, and Service Management APIs โš–๏ธ

๐Ÿ› ๏ธ๐Ÿงฐ NoPrompt by <a href="/NotSoSecure/">NotSoSecure | Part of Claranet Cyber Security</a> - #Azure CAP testing tool

๐Ÿ”Ž Checks for password-only access to Microsoft Entra ID / Azure AD (MFA gaps)
๐ŸŒ Simulates OAuth2 &amp; web logins across multiple device user-agents
๐Ÿงฉ Tests Microsoft Graph, AAD Graph, and Service Management APIs
โš–๏ธ
CloudBreach (@cloud_breach) 's Twitter Profile Photo

๐Ÿšจ Microsoft Threat Intel Alert: Threat actors are actively targeting Azure Blob Storage! ๐Ÿงฉ Full MITRE ATT&CK chain observed: โ€ข Recon: scanning for public containers โ€ข Initial access: abusing misconfigs & SAS tokens โ€ข Persistence: hijacking trusted workflows โ€ข Credential

๐Ÿšจ Microsoft Threat Intel Alert: Threat actors are actively targeting Azure Blob Storage!

๐Ÿงฉ Full MITRE ATT&amp;CK chain observed:
โ€ข Recon: scanning for public containers
โ€ข Initial access: abusing misconfigs &amp; SAS tokens
โ€ข Persistence: hijacking trusted workflows
โ€ข Credential
CloudBreach (@cloud_breach) 's Twitter Profile Photo

โš ๏ธ๐ŸŒฉ๏ธ Microsoft SharePoint Online attacks on the rise! ๐ŸŽฃ Adversaries abuse: ๐Ÿ”ธ Power Automate โ†’ stealthy exfiltration ๐Ÿ”ธ OAuth & Graph โ†’ persistence ๐Ÿ”ธ Guest links โ†’ lateral movement ๐Ÿ›ก๏ธ Defend by: ๐Ÿšซ Disabling anonymous sharing ๐Ÿ”’ Reviewing Power Automate flows โœ… Auditing

โš ๏ธ๐ŸŒฉ๏ธ Microsoft SharePoint Online attacks on the rise!
๐ŸŽฃ Adversaries abuse:
๐Ÿ”ธ Power Automate โ†’ stealthy exfiltration
๐Ÿ”ธ OAuth &amp; Graph โ†’ persistence
๐Ÿ”ธ Guest links โ†’ lateral movement

๐Ÿ›ก๏ธ Defend by:
๐Ÿšซ Disabling anonymous sharing
๐Ÿ”’ Reviewing Power Automate flows
โœ… Auditing
CloudBreach (@cloud_breach) 's Twitter Profile Photo

๐Ÿ”“๐Ÿ’พ 4TB SQL backup exposed online by EY ๐Ÿ˜ฑ Even the Big Four โ€” proof that no org is too big for a simple cloud misconfig to burn them ๐Ÿ‘€ Key takeaways: ๐Ÿ”Ž Discovered by NeoSecurity ๐Ÿ—„๏ธ Full MSSQL .bak file publicly accessible ๐Ÿ“ Contained schema, customer, financial and

๐Ÿ”“๐Ÿ’พ 4TB SQL backup exposed online by EY ๐Ÿ˜ฑ
Even the Big Four โ€” proof that no org is too big for a simple cloud misconfig to burn them ๐Ÿ‘€
Key takeaways:
๐Ÿ”Ž Discovered by <a href="/NeoSecurityNL/">NeoSecurity</a>
๐Ÿ—„๏ธ Full MSSQL .bak file publicly accessible
๐Ÿ“ Contained schema, customer, financial and
CloudBreach (@cloud_breach) 's Twitter Profile Photo

๐Ÿšจ๐ŸŒฉ๏ธ Azure Change alert Implicit outbound internet access for VMs is being retired, no more โ€œmystery egressโ€ in Azure ๐Ÿ”ง Whatโ€™s happening: โ€ข #Azure VMs will no longer get default outbound Internet access โ€ข New VNets โ†’ private by default โ€ข You must explicitly configure egress

๐Ÿšจ๐ŸŒฉ๏ธ Azure Change alert 
Implicit outbound internet access for VMs is being retired, no more โ€œmystery egressโ€ in Azure
๐Ÿ”ง Whatโ€™s happening:
โ€ข #Azure VMs will no longer get default outbound Internet access
โ€ข New VNets โ†’ private by default
โ€ข You must explicitly configure egress
CloudBreach (@cloud_breach) 's Twitter Profile Photo

๐Ÿš€ Breaching Azure Advanced drops 21 Nov โ€” built for defenders, red-teamers & cloud-security pros who want to operate at an adversarial level inside enterprise #Azure. โš”๏ธ๐ŸŒฉ๏ธ ๐Ÿ” Whatโ€™s inside: ๐Ÿชช Entra ID attacks ๐Ÿ”‘ SP/MSI lateral movement โš™๏ธ ARM exploitation ๐Ÿณ AKS &

๐Ÿš€ Breaching Azure Advanced drops 21 Nov โ€” built for defenders, red-teamers &amp; cloud-security pros who want to operate at an adversarial level inside enterprise #Azure. โš”๏ธ๐ŸŒฉ๏ธ

๐Ÿ” Whatโ€™s inside:
  ๐Ÿชช Entra ID attacks
  ๐Ÿ”‘ SP/MSI lateral movement
  โš™๏ธ ARM exploitation
  ๐Ÿณ AKS &amp;