CloudSec Wine
2.13K subscribers
911 photos
18 files
1.26K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
🔷 Bypassing Azure AD home tenant MFA and CA

Because of the Azure AD authentication platform architecture, users can bypass home tenant MFA and CA policies when logging in directly to resource tenants.

https://aadinternals.com/post/ests

#azure
🔥2
🔶 An AWS account just for getting into other AWS accounts

This is the AWS account that makes having lots of AWS accounts efficient and safe. It's the most important account in your organization.

https://src-bin.com/an-aws-account-just-for-getting-into-other-aws-accounts

#aws
🔥2
🔶 FivexL's Reaction to the AWS Security Baseline for Startups

FivexL shares its outlook on AWS Security Guidelines for startups. Find out how to improve your AWS security efficiently.

https://fivexl.io/blog/fivexl-reaction

#aws
👍2
🔶 AWS Network Firewall Workshop

A workshop teaching how to deploy Network Firewall using infrastructure as code.

https://catalog.us-east-1.prod.workshops.aws/workshops/58df66b5-ffd5-42dc-9e2c-d5a8ebe360d8/en-US

#aws
🔥1
🔶 onemorepereira/aws-sso-reporter

A tool that uses the AWS SSO API to list all users, accounts, permission sets etc. and dumps it into a CSV file for additional parsing or viewing.

https://github.com/onemorepereira/aws-sso-reporter

#aws
👍1
🔷 Token tactics: How to prevent, detect, and respond to cloud token theft

As organizations increase their coverage of multifactor authentication (MFA), threat actors have begun to move to more sophisticated techniques to allow them to compromise corporate resources without needing to satisfy MFA. Recently, the Microsoft Detection and Response Team (DART) has seen an increase in attackers utilizing token theft for this purpose.

https://www.microsoft.com/en-us/security/blog/2022/11/16/token-tactics-how-to-prevent-detect-and-respond-to-cloud-token-theft

#azure
🔥2
🔶 Infosys leaked FullAdminAccess AWS keys on PyPi for over a year

They appear to issue AWS keys to developers that are not rotated for several years and store these keys in git. They also don't have a clear place to report security issues like this.

https://tomforb.es/infosys-leaked-fulladminaccess-aws-keys-on-pypi-for-over-a-year

#aws
👏2
🔷 Abusing tcp tunneling in Azure Bastion

How Azure Bastion Native Client support works, and how an adversary could abuse this feature to perform attacks against Azure VMs over private IP addresses, without having direct network connectivity to the VM.

https://codyburkard.com/blog/bastionabuse

#azure
🔥2
🔶 The Many Ways to Access RDS

An overview of RDS access management capabilities along with examples using Terraform.

https://blog.symops.com/2022/11/17/rds-access

#aws
🔥2
🔶 A Confused Deputy Vulnerability in AWS AppSync

A cross-tenant vulnerability in AWS AppSync, which allowed an attacker to access data in victims' accounts.

https://securitylabs.datadoghq.com/articles/appsync-vulnerability-disclosure

#aws
🔥1
🔷 A dive into Microsoft Defender for Identity

Synacktiv recently analyzed the detection capabilities of Microsoft Defender for Identity, a cloud-based security solution which is the successor of Microsoft Advanced Threat Analytics and part of Microsoft Defender 365.

https://www.synacktiv.com/publications/a-dive-into-microsoft-defender-for-identity.html

#azure
🔥1
🔶🔴 Email Graffiti: hacking old email

Hacking images in old Emails, by registering the buckets or domains they point to, allows to vandalize old emails.

https://trufflesecurity.com/blog/email-graffiti

#aws #gcp
👍3
🔶 AWS pre:Invent 2022

Chris Farris highlights AWS's interesting and impactful security announcements in the lead-up to AWS re:Invent.

https://steampipe.io/blog/pre-invent-2022

#aws
🔥1
🔶 reply-fr/sustainable-personal-accounts

Add custom maintenance windows for AWS accounts - purge and prepare resources automatically.

https://github.com/reply-fr/sustainable-personal-accounts

#aws
🔥1
🔷 Yet Another Azure VM Persistence Using Bastion Shareable Links

These links have no additional authentication and are publicly accessible.

https://blog.karims.cloud/2022/11/26/yet-another-azure-vm-persistence.html

#azure
🔥2
🔶 Amazon Security Lake

A purpose-built service that automatically centralizes an organization's security data from cloud and on-premises sources into a purpose-built data lake stored in your account.

https://aws.amazon.com/ru/blogs/aws/preview-amazon-security-lake-a-purpose-built-customer-owned-data-lake-service

#aws
🔥3👍1
🔷 Low-latency fraud detection with Cloud Bigtable

Explore the end to end flow of detecting fraudulent payments with a low-latency and horizontally scalable system powered by tools like Bigtable.

https://cloud.google.com/blog/products/databases/fraud-detection-with-cloud-bigtable

#azure
👍1👏1
🔶 Protect Sensitive Data with Amazon CloudWatch Logs

A new set of capabilities for Amazon CloudWatch Logs that leverage pattern matching and machine learning (ML) to detect and protect sensitive log data in transit.

https://aws.amazon.com/ru/blogs/aws/protect-sensitive-data-with-amazon-cloudwatch-logs

#aws
🔥3
🔷 Explore the new Learn Kubernetes with Google website

The new website Learn Kubernetes with Google brings together under one roof the guidance of Kubernetes experts, both from Google and across the industry, to communicate the latest trends in building your Kubernetes infrastructure.

https://opensource.googleblog.com/2022/11/explore-new-learn-kubernetes-with-google-website.html

#azure
🔥2👍1
🔶 Recap of AWS re:Invent 2022: An Honest Review

Properly assess whether all those announcements should mean anything to you; here's the ultimate AWS re:Invent 2022 recap you were looking for.

https://www.resmo.com/blog/aws-reinvent-2022-recap

#aws
🔥1