The AWS CIRT has updated its Threat Technique Catalog for March 2026, adding entries on Cognito refresh token abuse, AMI image deletion, and additional cloud roles to help developers mitigate security risks in their AWS environments. This update highlights subtle techniques threat actors use to bypass detection, underscoring the need for enhanced monitoring of legitimate actions in suspicious contexts.
Read the full article at AWS Security Blog
Want to create content about this topic? Use Nemati AI tools to generate articles, social posts, and more.

![[AINews] The Unreasonable Effectiveness of Closing the Loop](/_next/image?url=https%3A%2F%2Fmedia.nemati.ai%2Fmedia%2Fblog%2Fimages%2Farticles%2F600e22851bc7453b.webp&w=3840&q=75)



