CloudBreach (@cloud_breach) 's Twitter Profile
CloudBreach

@cloud_breach

🌩️ Empowering You to Defend Against Cloud Breaches 🌩️

ID: 1478753923263614977

linkhttp://cloudbreach.io/ calendar_today05-01-2022 15:43:39

597 Tweet

3,3K Followers

66 Following

CloudBreach (@cloud_breach) 's Twitter Profile Photo

🚨 New #EntraID vulnerability: Actor Tokens discovered by Dirk-jan. A flaw in token validation that lets an attacker escalate to Global Admin. πŸͺ„ Undocumented MS tokens let attackers impersonate ANY user 🌍 Cross-tenant abuse β†’ obtain Global Admin in every tenant πŸ‘€ Bypasses

🚨 New #EntraID vulnerability: Actor Tokens discovered by <a href="/_dirkjan/">Dirk-jan</a>. A flaw in token validation that lets an attacker escalate to Global Admin.
πŸͺ„ Undocumented MS tokens let attackers impersonate ANY user
🌍 Cross-tenant abuse β†’ obtain Global Admin in every tenant
πŸ‘€ Bypasses
CloudBreach (@cloud_breach) 's Twitter Profile Photo

πŸš€ Level Up Your Cloud Security Skills with BreachingAWS+ 🌩️ Improve your Hands-on skills and think like an attacker with BreachingAWS+ πŸ”₯ What’s inside: βœ… 14 Lessons - structured for real-world learning βœ… 22 Attack Paths – learn adversary tradecraft βœ… 17 AWS Services –

πŸš€ Level Up Your Cloud Security Skills with BreachingAWS+ 🌩️
Improve your Hands-on skills and think like an attacker with BreachingAWS+

πŸ”₯ What’s inside:
βœ… 14 Lessons - structured for real-world learning
βœ… 22 Attack Paths – learn adversary tradecraft
βœ… 17 AWS Services –
CloudBreach (@cloud_breach) 's Twitter Profile Photo

πŸ› οΈπŸš€πŸŒ©οΈ OsintTool is a PowerShell 7+ reconnaissance framework built for #Azure/#EntraID tenants. It automates: > Tenant discovery & service fingerprinting > Auth flow probing & conditional access checks > DNS / network mapping & subdomain enumeration > Certificate transparency

πŸ› οΈπŸš€πŸŒ©οΈ OsintTool is a PowerShell 7+ reconnaissance framework built for #Azure/#EntraID tenants. It automates:
&gt; Tenant discovery &amp; service fingerprinting
&gt; Auth flow probing &amp; conditional access checks
&gt; DNS / network mapping &amp; subdomain enumeration
&gt; Certificate transparency
Cloud Village (@cloudvillage_dc) 's Twitter Profile Photo

πŸŒπŸ”’ Cybersecurity Awareness Month is here πŸ”’πŸŒ A huge THANK YOU to our amazing sponsors of 2025 who enabled us to bring Cloud Village across conferences like DEF CON RSAC BSidesCharm BSidesSF and Out Of The Box Security Conference πŸ’œ Your support empowers our talks, workshops, CTFs & labs and

πŸŒπŸ”’ Cybersecurity Awareness Month is here πŸ”’πŸŒ

A huge THANK YOU to our amazing sponsors of 2025 who enabled us to bring <a href="/cloudvillage_dc/">Cloud Village</a> across conferences like <a href="/defcon/">DEF CON</a> <a href="/OneRSAC/">RSAC</a> <a href="/BSidesCharm/">BSidesCharm</a> <a href="/BSidesSF/">BSidesSF</a> and <a href="/OOTBconf/">Out Of The Box Security Conference</a> πŸ’œ

Your support empowers our talks, workshops, CTFs &amp; labs and
CloudBreach (@cloud_breach) 's Twitter Profile Photo

🚨 How to stop the next #CloudBreach? πŸ”‘ Least privilege + MFA πŸ” Secure secrets βš™οΈ Harden configs & IaC πŸ‘€ Monitor & alert πŸ•΅οΈ Red/Purple Team drills πŸŽ“ Train your team on real attack paths πŸ‘‰ Hands-on labs: cloudbreach.io/labs #CloudSecurity #BreachingAWS #BreachingAzure

🚨 How to stop the next #CloudBreach?
πŸ”‘ Least privilege + MFA
πŸ” Secure secrets
βš™οΈ Harden configs &amp; IaC
πŸ‘€ Monitor &amp; alert
πŸ•΅οΈ Red/Purple Team drills
πŸŽ“ Train your team on real attack paths
πŸ‘‰ Hands-on labs: cloudbreach.io/labs

#CloudSecurity #BreachingAWS #BreachingAzure
CloudBreach (@cloud_breach) 's Twitter Profile Photo

πŸ₯·β˜οΈAWS C2 alert: #AWS X-Ray β€” built for tracing β€” can be weaponized as a covert Command & Control channel. 🧩 Attackers encode commands/results in X-Ray annotations πŸ” Use legit SigV4 API calls β†’ blends with real telemetry πŸ‘€ Hard to spot via traditional network defenses βš™οΈ

πŸ₯·β˜οΈAWS C2 alert: #AWS X-Ray β€” built for tracing β€” can be weaponized as a covert Command &amp; Control channel.

🧩 Attackers encode commands/results in X-Ray annotations
πŸ” Use legit SigV4 API calls β†’ blends with real telemetry
πŸ‘€ Hard to spot via traditional network defenses
βš™οΈ
CloudBreach (@cloud_breach) 's Twitter Profile Photo

🚨 #Azure Outage Impact #Microsoft suffered a major Azure Front Door (AFD) disruption that knocked out access to Microsoft 365, Azure, and Entra admin portals β€” with users across Europe, Africa & the Middle East hit hardest. 🌍 🧩 The issue stemmed from capacity loss in AFD

🚨 #Azure Outage Impact
#Microsoft suffered a major Azure Front Door (AFD) disruption that knocked out access to Microsoft 365, Azure, and Entra admin portals β€” with users across Europe, Africa &amp; the Middle East hit hardest. 🌍
🧩 The issue stemmed from capacity loss in AFD
CloudBreach (@cloud_breach) 's Twitter Profile Photo

πŸ”₯ Breaching Azure Advanced - Coming Soon Think like a #hacker. Break it to learn how to secure it. 🧩 Hands-on labs, not slides β€” real scenarios that teach offensive tradecraft and defensive controls. 🌐 Subdomain Takeovers β€” find the forgotten edges and claim the namespace. πŸ’¬

πŸ”₯ Breaching Azure Advanced - Coming Soon
Think like a #hacker. Break it to learn how to secure it. 
🧩 Hands-on labs, not slides β€” real scenarios that teach offensive tradecraft and defensive controls.
🌐 Subdomain Takeovers β€” find the forgotten edges and claim the namespace.
πŸ’¬
CloudBreach (@cloud_breach) 's Twitter Profile Photo

☁️ Cloud under fire: #Microsoft’s 2025 Digital Defense Report shows a surge in cloud-focused #cyberattacks πŸ”₯ πŸ”₯ +87% rise in destructive campaigns on Azure 🧩 40% of ransomware now hybrid (cloud + on-prem) πŸ•΅οΈβ€β™‚οΈ OAuth & identity abuse increasing πŸ”‘ Non-human identities = new weak

☁️ Cloud under fire: #Microsoft’s 2025 Digital Defense Report shows a surge in cloud-focused #cyberattacks πŸ”₯
πŸ”₯ +87% rise in destructive campaigns on Azure
🧩 40% of ransomware now hybrid (cloud + on-prem)
πŸ•΅οΈβ€β™‚οΈ OAuth &amp; identity abuse increasing
πŸ”‘ Non-human identities = new weak
ALI TAJRAN (@alitajran) 's Twitter Profile Photo

ATTENTION: Phishing Attack Uses Azure Blob Storage to Impersonate Microsoft! Attackers have found a new method to trick end users into logging in to a malicious login page, intercepting tokens, and infiltrating the tenant. What makes this particularly sneaky is that they are

ATTENTION: Phishing Attack Uses Azure Blob Storage to Impersonate Microsoft!

Attackers have found a new method to trick end users into logging in to a malicious login page, intercepting tokens, and infiltrating the tenant.

What makes this particularly sneaky is that they are
CloudBreach (@cloud_breach) 's Twitter Profile Photo

🚨 Huge #AWS outage underway - major apps including Jiraβ€―Cloud, Signal, Fortnite, Roblox, Zoom and many more are offline or facing serious disruption. The cloud giant’s US-EAST-1 region is reporting β€œsignificant error rates for requests made to the Amazonβ€―DynamoDB APIs” and

🚨 Huge #AWS outage underway - major apps including Jiraβ€―Cloud, Signal, Fortnite, Roblox, Zoom and many more are offline or facing serious disruption.

The cloud giant’s US-EAST-1 region is reporting β€œsignificant error rates for requests made to the Amazonβ€―DynamoDB APIs” and
CloudBreach (@cloud_breach) 's Twitter Profile Photo

πŸ› οΈπŸ§° NoPrompt by NotSoSecure | Part of Claranet Cyber Security - #Azure CAP testing tool πŸ”Ž Checks for password-only access to Microsoft Entra ID / Azure AD (MFA gaps) 🌐 Simulates OAuth2 & web logins across multiple device user-agents 🧩 Tests Microsoft Graph, AAD Graph, and Service Management APIs βš–οΈ

πŸ› οΈπŸ§° NoPrompt by <a href="/NotSoSecure/">NotSoSecure | Part of Claranet Cyber Security</a> - #Azure CAP testing tool

πŸ”Ž Checks for password-only access to Microsoft Entra ID / Azure AD (MFA gaps)
🌐 Simulates OAuth2 &amp; web logins across multiple device user-agents
🧩 Tests Microsoft Graph, AAD Graph, and Service Management APIs
βš–οΈ
CloudBreach (@cloud_breach) 's Twitter Profile Photo

🚨 Microsoft Threat Intel Alert: Threat actors are actively targeting Azure Blob Storage! 🧩 Full MITRE ATT&CK chain observed: β€’ Recon: scanning for public containers β€’ Initial access: abusing misconfigs & SAS tokens β€’ Persistence: hijacking trusted workflows β€’ Credential

🚨 Microsoft Threat Intel Alert: Threat actors are actively targeting Azure Blob Storage!

🧩 Full MITRE ATT&amp;CK chain observed:
β€’ Recon: scanning for public containers
β€’ Initial access: abusing misconfigs &amp; SAS tokens
β€’ Persistence: hijacking trusted workflows
β€’ Credential
CloudBreach (@cloud_breach) 's Twitter Profile Photo

⚠️🌩️ Microsoft SharePoint Online attacks on the rise! 🎣 Adversaries abuse: πŸ”Έ Power Automate β†’ stealthy exfiltration πŸ”Έ OAuth & Graph β†’ persistence πŸ”Έ Guest links β†’ lateral movement πŸ›‘οΈ Defend by: 🚫 Disabling anonymous sharing πŸ”’ Reviewing Power Automate flows βœ… Auditing

⚠️🌩️ Microsoft SharePoint Online attacks on the rise!
🎣 Adversaries abuse:
πŸ”Έ Power Automate β†’ stealthy exfiltration
πŸ”Έ OAuth &amp; Graph β†’ persistence
πŸ”Έ Guest links β†’ lateral movement

πŸ›‘οΈ Defend by:
🚫 Disabling anonymous sharing
πŸ”’ Reviewing Power Automate flows
βœ… Auditing
CloudBreach (@cloud_breach) 's Twitter Profile Photo

πŸ”“πŸ’Ύ 4TB SQL backup exposed online by EY 😱 Even the Big Four β€” proof that no org is too big for a simple cloud misconfig to burn them πŸ‘€ Key takeaways: πŸ”Ž Discovered by NeoSecurity πŸ—„οΈ Full MSSQL .bak file publicly accessible πŸ“ Contained schema, customer, financial and

πŸ”“πŸ’Ύ 4TB SQL backup exposed online by EY 😱
Even the Big Four β€” proof that no org is too big for a simple cloud misconfig to burn them πŸ‘€
Key takeaways:
πŸ”Ž Discovered by <a href="/NeoSecurityNL/">NeoSecurity</a>
πŸ—„οΈ Full MSSQL .bak file publicly accessible
πŸ“ Contained schema, customer, financial and
CloudBreach (@cloud_breach) 's Twitter Profile Photo

🚨🌩️ Azure Change alert Implicit outbound internet access for VMs is being retired, no more β€œmystery egress” in Azure πŸ”§ What’s happening: β€’ #Azure VMs will no longer get default outbound Internet access β€’ New VNets β†’ private by default β€’ You must explicitly configure egress

🚨🌩️ Azure Change alert 
Implicit outbound internet access for VMs is being retired, no more β€œmystery egress” in Azure
πŸ”§ What’s happening:
β€’ #Azure VMs will no longer get default outbound Internet access
β€’ New VNets β†’ private by default
β€’ You must explicitly configure egress
CloudBreach (@cloud_breach) 's Twitter Profile Photo

πŸš€ Breaching Azure Advanced drops 21 Nov β€” built for defenders, red-teamers & cloud-security pros who want to operate at an adversarial level inside enterprise #Azure. βš”οΈπŸŒ©οΈ πŸ” What’s inside: πŸͺͺ Entra ID attacks πŸ”‘ SP/MSI lateral movement βš™οΈ ARM exploitation 🐳 AKS &

πŸš€ Breaching Azure Advanced drops 21 Nov β€” built for defenders, red-teamers &amp; cloud-security pros who want to operate at an adversarial level inside enterprise #Azure. βš”οΈπŸŒ©οΈ

πŸ” What’s inside:
  πŸͺͺ Entra ID attacks
  πŸ”‘ SP/MSI lateral movement
  βš™οΈ ARM exploitation
  🐳 AKS &amp;