ccastrapel@infosec.pub • 1 year agoTrack AWS IAM changes in Git with CloudTrail Attributionplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkTrack AWS IAM changes in Git with CloudTrail Attributionplus-squareccastrapel@infosec.pub • 1 year agomessage-square0 Commentsfedilink
diyrebel@lemmy.dbzer0.com • 1 year agoPawning your users to Cloudflare is not how you offer your users security; fedi admins must realize this.plus-squaremessage-squaremessage-square0 fedilinkarrow-up11
arrow-up11message-squarePawning your users to Cloudflare is not how you offer your users security; fedi admins must realize this.plus-squarediyrebel@lemmy.dbzer0.com • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pubM • 1 year agoBad.Build: A Critical Privilege Escalation Design Flaw in Google Cloud Build Enables a Supply Chain Attackplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkBad.Build: A Critical Privilege Escalation Design Flaw in Google Cloud Build Enables a Supply Chain Attackplus-square0xCBE@infosec.pubM • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pubM • 1 year agoALFA: Automated Audit Log Forensic Analysis for Google Workspaceplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkALFA: Automated Audit Log Forensic Analysis for Google Workspaceplus-square0xCBE@infosec.pubM • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pubM • 1 year agoBuilding Chainguard's container image registryplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkBuilding Chainguard's container image registryplus-square0xCBE@infosec.pubM • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pubM • 1 year agoKubernetes Security Basics Series Part I - Deployment and Container Orchestrationplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkKubernetes Security Basics Series Part I - Deployment and Container Orchestrationplus-square0xCBE@infosec.pubM • 1 year agomessage-square0 Commentsfedilink
Capt. AIn@infosec.pub • 1 year agoBeyond the AWS Security Maturity Roadmapplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkBeyond the AWS Security Maturity Roadmapplus-squareCapt. AIn@infosec.pub • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pubM • 1 year agoKubernetes Grey Zone: Risks in Managed Cluster Middlewareplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkKubernetes Grey Zone: Risks in Managed Cluster Middlewareplus-square0xCBE@infosec.pubM • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pubM • 1 year agoMy AWS Pentest Methodologyplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkMy AWS Pentest Methodologyplus-square0xCBE@infosec.pubM • 1 year agomessage-square0 Commentsfedilink
Capt. AIn@infosec.pub • 1 year agoCrying Out Cloud: a magical podcast for cloud security enthusiastsplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkCrying Out Cloud: a magical podcast for cloud security enthusiastsplus-squareCapt. AIn@infosec.pub • 1 year agomessage-square0 Commentsfedilink
Capt. AIn@infosec.pub • 1 year agoWriteup: AWS API Gateway header smuggling and cache confusionplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkWriteup: AWS API Gateway header smuggling and cache confusionplus-squareCapt. AIn@infosec.pub • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pubM • 1 year agoGCP Pentesting Guideplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkGCP Pentesting Guideplus-square0xCBE@infosec.pubM • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pubM • 1 year agoExploring Firecracker MicroVMs for Multi-Tenant Dagger CI/CD Pipelinesplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkExploring Firecracker MicroVMs for Multi-Tenant Dagger CI/CD Pipelinesplus-square0xCBE@infosec.pubM • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pubM • 1 year agoSecuring the EC2 Instance Metadata Serviceplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkSecuring the EC2 Instance Metadata Serviceplus-square0xCBE@infosec.pubM • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pubM • 1 year agoToyota admits to yet another cloud leakplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkToyota admits to yet another cloud leakplus-square0xCBE@infosec.pubM • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pubM • 1 year agoContainer security fundamentals seriesplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkContainer security fundamentals seriesplus-square0xCBE@infosec.pubM • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pubM • 1 year agoPublic Cloud Security Breachesplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkPublic Cloud Security Breachesplus-square0xCBE@infosec.pubM • 1 year agomessage-square0 Commentsfedilink
0xCBE@infosec.pubM • 1 year agoHow to get rid of AWS access keys- Part 1: The easy winsplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkHow to get rid of AWS access keys- Part 1: The easy winsplus-square0xCBE@infosec.pubM • 1 year agomessage-square0 Commentsfedilink
Capt. AIn@infosec.pub • 1 year agofwd:cloudsec live streamplus-squareexternal-linkmessage-square0 fedilinkarrow-up11
arrow-up11external-linkfwd:cloudsec live streamplus-squareCapt. AIn@infosec.pub • 1 year agomessage-square0 Commentsfedilink
arrow-up11message-squarewelcomeplus-square0xCBE@infosec.pubM • 1 year agomessage-square0 Commentsfedilink