this post was submitted on 06 Feb 2026
89 points (96.8% liked)

Technology

80724 readers
3480 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
all 5 comments
sorted by: hot top controversial new old
[–] CallMeAnAI@lemmy.world 15 points 1 day ago* (last edited 1 day ago) (1 children)

Y'all obviously lead with AI and you're bad at propaganda.

The attackers initially gained access by stealing valid test credentials from public Amazon S3 buckets. The credentials belonged to an identity and access management (IAM) user with multiple read and write permissions on AWS Lambda and restricted permissions on AWS Bedrock

Run your shit against tenable once in a while.

[–] REDACTED@infosec.pub 4 points 1 day ago (1 children)

The point of the article is to show that with help of AI, attacks can be executed faster, which means higher success chance for getting more data/damage as you're essentially running against time.

How long would all this have taken without automation?

[–] CallMeAnAI@lemmy.world 2 points 1 day ago

According to you all shorter because AI is simultaneously garbage propping upa bubble, so my sarcastic answer is it's slower.

That being said I know I could detect and scan, with nessus/snyk/security hub and detect the issue inside of 5 minutes. Probably another half hour to hour for a proper pen tester to send an AWS exploit package at it and own the rest within an hour or two. 

How many people do you think catch exploits in the first day or even week or month of a hack? I've got some news for you, its only the companies who really need their shit together and have a strong opssec team. They ain't going deleting buckets. They sit on it for months and years in most post mortem.

This is just poor security. Not like in TV/Movies where an "AI" was found "breaking layers of firewalls and encryption" or whatever 🤣

Somebody fucked up. Plain and simple.