Release Date: 30/03/2025 | Issue: 281
CloudSecList is a newsletter for busy professionals who want to keep up to date with the cloud security industry. Hand-curated by Marco Lancini.
Sponsor

The True Cost of CVE Management
To gain a better understanding of how organizations handle vulnerability management in containers, Chainguard conducted interviews with security and engineering teams across various industries to see how many hours they’re spending on vulnerability management tasks β€” including scanning for, triaging, and remediating CVEs.

Download the report

This week's articles


Remote Code Execution Vulnerabilities in Ingress NGINX
Wiz Research uncovered RCE vulnerabilities (CVE-2025-1097, 1098, 24514, 1974) in Ingress NGINX for Kubernetes allowing cluster-wide secret access.   #attack   #kubernetes


CodeQLEAKED - Public Secrets Exposure Leads to Supply Chain Attack on GitHub CodeQL
A potential supply chain attack on GitHub CodeQL started simply: a publicly exposed secret, valid for 1.022 seconds at a time.   #attack   #ci/cd


New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents
This technique enables hackers to silently compromise AI-generated code by injecting hidden malicious instructions into seemingly innocent configuration files used by Cursor and GitHub Copilot.   #ai   #attack


MCP (Model Context Protocol): Simply explained in 5 minutes
What MCP is, how it can save you time, and how it works behind the scenes.   #ai   #explain


Interactive AWS NAT Gateway
An interactive blog post exploring how AWS NAT Gateway works.   #aws   #explain


Google Cloud - Managing Google's Unverified Authentication Library
In Google Cloud, Application Default Credentials (ADC) allows your code/applications to automatically find and use credentials.   #gcp   #iam


A Targeted Attack on Coinbase Expanded to the Widespread tj-actions/changed-files Incident
A compromise of the GitHub action tj-actions/changed-files highlights how attackers could exploit vulnerabilities in third-party actions to compromise supply chains.   #attack   #ci/cd   #supply-chain


Red Teaming with ServiceNow
How access to ServiceNow can be abused to perform a range of attacks, from Credential Retrieval to Code Execution.   #attack   #saas


CVE-2025-1767 - Another gitrepo issue
CVE-2025-1767 exists in the gitRepo volume type and can allow users who can create pods with gitRepo volumes to get access to any other git repository on the node where the pod is deployed.   #attack   #containers


Creating immutable users through a bug in Entra ID restricted administrative units
Imagine trying to disable a malicious user in your Azure environment, only to find it can't be modified! Datadog recently identified a timing-based bug in Entra ID's restricted administrative units (AUs) that could have allowed just this scenario to occur.   #attack   #azure

Tools


attest-build-provenance
Action for generating build provenance attestations for workflow artifacts.


opkssh
Opkssh is a tool which enables ssh to be used with OpenID Connect instead of long-lived SSH keys. You can also refer to the companion blog post.


go-ocsf
Convert data from any of your security tools to OCSF.


From the cloud providers


#AWS   Effectively implementing resource control policies in a multi-account environment
Post demonstrating how RCPs can help improve your security posture while allowing even more freedom to developers in managing their resources, thus reducing friction between central security and application teams.


#AWS   Master architecture decision records (ADRs): Best practices for effective decision-making
In this post, you'll learn how to implement Architecture Decision Records (ADRs) in your organization, based on best practices developed from experience with over 200 ADRs across multiple projects.


#GCP   The Director's Guide: IAM Security at Scale
Creating an IAM program that is automated is the reasonable way to handle IAM at an enterprise with scale.


#GCP   Introducing protection summary, a new Google Cloud Backup and DR feature
Google Cloud Backup and DR's protection summary offers a centralized view of data protection configuration, identifying gaps and improving resilience.


#GCP   Announcing BigQuery repositories: Git-based collaboration in BigQuery Studio
New repositories in BigQuery Studio help data teams collaborate on code stored in Git for better version control.


#AZURE   Microsoft unveils Microsoft Security Copilot agents and new protections for AI
Microsoft is expanding Security Copilot with six security agents built by Microsoft and five security agents built by their partners, available for preview in April 2025.

Thanks for reading!

If you found this newsletter helpful, I'd really appreciate if you could forward it to your friends and colleagues! πŸ‘Œ

If you have questions, comments, or feedback, let me know on Twitter (@lancinimarco / @CloudSecList), or at feedback.cloudseclist.com!

Thanks,
Marco
Forward Forward
Twitter Tweet
Share Share

How did you like this issue of CloudSecList?

1       2       3       4       5

Unsubscribe from CloudSecList
Archives View in browser Sponsorship
Β© 2019-present, CloudSecList by Marco Lancini.