WhisperX tag archive

#Cloud-Security

This page collects WhisperX intelligence signals tagged #Cloud-Security. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (6)

The Lab · 2026-03-28 05:26:57 · GitHub Issues

1. Adobe AEM Cloud Staging Site Exposed: Critical bnd Library Vulnerability (CVE-2023-XXXXX) Requires Urgent Patch

A critical security vulnerability has been flagged on an Adobe Experience Manager (AEM) Cloud staging environment, exposing a potential entry point for attackers. The issue centers on the publish-p138954-e320524-cmstg.adobeaemcloud.com site, which is running an outdated and vulnerable version of the `biz.aQute.bnd` (bn...

The Lab · 2026-04-17 12:22:52 · GitHub Issues

2. Axios v1.15.0 Security Patch: Critical Prototype Pollution Chain Enables Cloud Metadata Exfiltration, RCE

A critical security vulnerability in the widely-used Axios HTTP client library has been patched, exposing a dangerous attack chain that could allow attackers to escalate a common flaw into full system compromise. The vulnerability, tracked as CVE-2026-40175, centers on a specific "Gadget" attack vector. This flaw enabl...

The Lab · 2026-05-06 22:31:37 · GitHub Issues

3. Server Action Exposes AWS and GCP Cloud Metadata via Unvalidated URL Fetch — Authentication Gate Fails to Block SSRF

A high-severity Server-Side Request Forgery vulnerability in the `fetchPageTitle` server action exposes cloud infrastructure to credential theft and internal network reconnaissance. The endpoint, located in `app/actions.ts` (lines 94–129), accepts arbitrary URLs from authenticated users and fetches them server-side wit...

The Lab · 2026-05-08 04:16:09 · The Hacker News

4. PCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud Systems

Cybersecurity researchers have uncovered a sophisticated credential theft framework targeting exposed cloud infrastructure, distinguishing itself by aggressively removing artifacts linked to a prior threat actor known as TeamPCP. The tool, dubbed PCPJack, employs a worm-like propagation mechanism to move laterally acro...

The Lab · 2026-05-08 11:24:46 · SecurityWeek RSS

5. PCPJack Worm Emerges: Removes Rival TeamPCP Malware, Targets AWS, Docker, Kubernetes Environments

Security researchers have identified a new credential-stealing worm framework, designated PCPJack, which demonstrates an unusual dual-function capability: removing rival malware infections while simultaneously harvesting sensitive authentication data from cloud infrastructure. The malicious framework specifically targ...

The Lab · 2026-05-09 20:01:44 · GitHub Issues

6. SSRF Defenses Bypassed via IPv6 Transition Prefixes, Multiple CVEs Linked to NAT64 Gaps

A defense-in-depth update has identified five IPv6 transition and reserved prefixes that can bypass traditional SSRF protections, including NAT64-wrapped routes to internal metadata services. The blocked ranges include 6to4, Teredo tunneling, NAT64 well-known and local-use prefixes, and a discard-only sinkhole prefix—e...