Thursday , March 13 2025
aws
Source: AWS

AWS Announced New Malware Detection Tool For S3 Buckets

AWS announced new security features at its re:Inforce conference, such as identity and malware protection services. The cloud giant added passkeys to the list of supported multi-factor authentication (MFA) mechanisms for root and Identity and Access Management (IAM) users.

The company also started enforcing MFA on root users, particularly AWS Organization management account users.

“You can use the built-in authenticators in your phones and laptops to unlock a cryptographically secured credential to your AWS sign-in experience,” AWS said. “And when using a cloud service to store the passkey (such as iCloud keychain, Google accounts, or 1Password), the passkey can be accessed from any of your devices connected to your passkey provider account. This helps you to recover your passkey in the unfortunate case of losing a device.”

IAM Access Analyzer now has custom policy checks to detect policies that allow access to important AWS resources or grant public access. AWS has also introduced guided revocation in IAM Access Analyzer. This feature helps users by providing guidance on how to revoke unnecessary permissions that grant access.

AWS announced that Amazon GuardDuty Malware Protection is now available for the Amazon S3 service. This feature allows users to detect malicious files in S3 buckets. Previously, GuardDuty Malware Protection only provided agentless scanning on Amazon EBS volumes attached to EC2 and container workloads.

The company introduced a new feature in AWS CloudTrail Lake. This feature uses gen-AI to help customers analyze CloudTrail logs for compliance, security, and operational needs.

Check Also

CYFIRMA

FinStealer Malware Targets Indian Bank’s Mobile Users, Stealing Credentials

CYFIRMA analysis reveals a sophisticated malware campaign that exploits a major Indian bank’s brand through …

Leave a Reply

Your email address will not be published. Required fields are marked *

Trending Threat Actor: Lockbit, Lazarus, Blackcat, Cybercriminals, SaltTyphoon, Scttered Spider, RedGolf, BlueBravo, North Korean Hackers, ...
Trending Malware: SocGholish, Colabtstrike, Linuxkernel, Plugx, Lockbit, Xmrig, REMCOM RAT, Play Ransomware, LummaC2, HijackLoader, BugSleep
Trending vulnerability:CVE: 2024-21887, CVE: 2024-6387, CVE: 2024-46805, CVE: 2017-11882, CVE: 2021-44228, CVE:2024-40348, CVE: 2024-38112
Techniques: T1059.001, T1082, T1486, T1190, T1083
Tactics: TA0007, TA0001, TA0005, TA0011
22:33