AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation – The Hacker News

Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web Services that could open the door for attackers to escalate privileges, manipulate other AWS services, and, in some cases, even fully compromise AWS accounts.
“These roles, often created automatically or recommended during setup, grant overly broad permissions, such as full S3 –
Read More – The Hacker News