Cloudflare Workers and Tunnels are being exploited to host AiTM phishing pages and deliver malware like Xeno RAT and XWorm RAT, leveraging trusted domains to evade defenses and detection. #CredentialTheft #CloudAbuse #MalwareDelivery
Hackers Use Fake Resumes to Breach
Read More: buff.ly/GroDr2T
#FAUXELEVATE #ResumePhishing #FranceCyber #Infostealer #CryptoMiningMalware #CloudAbuse #EnterpriseSecurity #ThreatIntel
Google Stops UNC2814 Attacks Globally
Read More: buff.ly/vbGD6oa
#UNC2814 #ChinaCyber #CyberEspionage #GoogleSecurity #CloudAbuse #NationStateThreat #ThreatIntel #GlobalCyber
Cybercriminals are abusing Google Cloud email services to send trusted-looking phishing at scale. When legit infrastructure is weaponized, trust becomes the attack surface. 📧⚠️ #Phishing #CloudAbuse
China Group Abuses Windows Policy
Read More: buff.ly/yUlYuGH
#LongNosedGoblin #ChinaAPT #CyberEspionage #GroupPolicyAbuse #LivingOffTheLand #CloudAbuse #NationStateThreats #ThreatIntel
Campagna di spionaggio HazyBeacon: backdoor Windows usa AWS Lambda URL come C2, exfiltra dati governativi tramite servizi cloud legittimi e persiste grazie a DLL sideloading.
#AWSLambda #C2 #cloudabuse #HazyBeacon #supplychain
www.matricedigitale.it/2025/07/15/a...
⚡ “OneClik” attacks are abusing Microsoft ClickOnce & AWS to target the energy sector—blending trusted platforms with stealthy malware delivery.
#EnergyThreats #CloudAbuse 🛠️⚡
buff.ly/KVtWsvj
📅 APT41 is now using Google Calendar for stealthy C2 ops via new malware “TOUGHPROGRESS.” Spear-phishing + cloud abuse = next-gen espionage. Legit tools, malicious intent 🕵️♂️💻 #CloudAbuse #APT41
buff.ly/wOD8jmu