Saturday, December 5, 2020

Android Security Advisory

2015/07/28 - 6:00PM PST   AWS is aware of the recently reported Android security issues described in: CVE-2015-1538, CVE-2015-1539, CVE-2015-3824, CVE-2015-3826, CVE-2015-3827, CVE-2015-3828, CVE-2015-3829. These issues present a risk to all data present on your Android device, which may...

HeartBleed Bug Concern

April 7, 2014 AWS is aware of the HeartBleed Bug (CVE-2014-0160) in OpenSSL and investigating any impact or required remediation. We will post back when we have more detail. April 8, 2014 Update: For the latest updates, please...

Morto Worm Spreading via Remote Desktop Protocol

August 31, 2011 A new Internet worm has been reported that spreads via Microsoft's Remote Desk Protocol (RDP). This worm scans an infected host's subnet for other hosts running RDP and attempts access to them using a pre-configured set...

MS15-078 Advisory

2015/07/21 - 12:35 PM PST - Update   AWS Elastic Beanstalk We have updated all Elastic Beanstalk Windows containers per MS15-JULY, as described at Steps to migrate your existing environment to the updated version: 1. Log in...

XSA Security Advisory CVE-2015-3456

2015/05/13 - 5:20 AM PDT   We are aware of the QEMU security issue assigned CVE-2015-3456, also known as "VENOM," which impacts various virtualized platforms. There is no risk to AWS customer data or instances. Information on the Xen-specific...

Xen Security Advisory (XSA-286)

Initial Publication Date: 2020/10/23 5:00PM PST ----- AWS is aware of Xen Security Advisories XSA-286 (, XSA-331 (, XSA-332 (, XSA-345 (, XSA-346 (, and XSA-347 ( released by the Xen Security team on October 20th 2020. Xen...

Xen Security Advisory 337 (XSA-337) (CVE-2020-25595)

Initial Publication Date: 2020/09/22 8:45AM PST CVE Identifier: CVE-2020-25595 AWS is aware of Xen Security Advisory 337 released by the Xen Security team on September 22nd 2020. Nitro based instances are not affected. The issue depends on PCI devices...

Xen Security Advisory 336 (XSA-336) (CVE-2020-25604)

Initial Publication Date: 2020/09/22 8:45AM PST CVE Identifier: CVE-2020-25604 AWS is aware of Xen Security Advisory 336 released by the Xen Security team on September 22nd 2020. Nitro based instances are not affected. Under rare circumstances, a guest may be able...

Container Networking Security Issue (CVE-2020-8558)

Last Updated: 2020/07/09 6:30PM PDT CVE Identifier: CVE-2020-8558 This is an update for this issue. AWS is aware of a security issue, recently disclosed by the Kubernetes community, affecting Linux container networking (CVE-2020-8558). This issue may allow containers running...

Windows CIFS Browser Protocol Heap Corruption Vulnerability

February 18, 2011   An anonymous reporter has publicly announced a previously undisclosed vulnerability affecting the BROWSER protocol on Windows systems. In addition, the reporter has released proof-of-concept exploit code. Use of the code can...

Minimum Version of TLS 1.2 Required for FIPS Endpoints by March 31, 2021

Initial Publication Date: 2020/03/31 11:15AM PDT AWS is updating all AWS Federal Information Processing Standard (FIPS) endpoints to a minimum Transport Layer Security (TLS) version of 1.2 across all AWS Regions by March 31, 2021. This update will...

Top 20 Predictions Of How AI Is Going To Improve Cybersecurity In 2021

What 20 Leading Cybersecurity Experts Are Predicting For 2021

Italy Says Two Arrested for Defense Data Theft

Two people have been arrested for stealing defense data from the Italian aerospace and electronics group Leonardo, the interior ministry said on Saturday. The company has a wide range of activities from naval electronics, network and protection systems, electronic warfare...

The US Used the Patriot Act to Justify Logging Website Users

Plus: Better Twitter two-factor, a Spotify hack, and more of the week’s top security news.

Ransomware hits helicopter maker Kopter

Data from Kopter's internal network has been published on the LockBit gang's blog, hosted on the dark web.

Ransomware gangs are now cold-calling victims if they restore from backups without paying

Tactic used since August by ransomware gangs like Sekhmet, Maze, Conti, and Ryuk.