🔷 Layers Of Cloud Azure And The Mis Storage Of Secrets
Ever wondered how storing secrets in the cloud can go wrong? This talk by Katie Knowles at BSides Toronto 2022 looks at common ways passwords should be stored.
https://youtu.be/SmxEvVg6Fe8
#azure
Ever wondered how storing secrets in the cloud can go wrong? This talk by Katie Knowles at BSides Toronto 2022 looks at common ways passwords should be stored.
https://youtu.be/SmxEvVg6Fe8
#azure
YouTube
Layers Of Cloud Azure And The Mis Storage Of Secrets by Katie Knowles at BSides Toronto 2022
Presented on October 8 2022.
Where are secrets stored in Azure? Is it even safe to put secrets in the cloud to begin with? There's so many services in Azure that this isn't easy to answer. We'll start by taking a look at common ways passwords should be stored…
Where are secrets stored in Azure? Is it even safe to put secrets in the cloud to begin with? There's so many services in Azure that this isn't easy to answer. We'll start by taking a look at common ways passwords should be stored…
🔥1
🔶 A Confused Deputy Vulnerability in AWS AppSync
A cross-tenant vulnerability in AWS AppSync, which allowed an attacker to access data in victims' accounts.
https://securitylabs.datadoghq.com/articles/appsync-vulnerability-disclosure
#aws
A cross-tenant vulnerability in AWS AppSync, which allowed an attacker to access data in victims' accounts.
https://securitylabs.datadoghq.com/articles/appsync-vulnerability-disclosure
#aws
🔥1
🔷 A dive into Microsoft Defender for Identity
Synacktiv recently analyzed the detection capabilities of Microsoft Defender for Identity, a cloud-based security solution which is the successor of Microsoft Advanced Threat Analytics and part of Microsoft Defender 365.
https://www.synacktiv.com/publications/a-dive-into-microsoft-defender-for-identity.html
#azure
Synacktiv recently analyzed the detection capabilities of Microsoft Defender for Identity, a cloud-based security solution which is the successor of Microsoft Advanced Threat Analytics and part of Microsoft Defender 365.
https://www.synacktiv.com/publications/a-dive-into-microsoft-defender-for-identity.html
#azure
🔥1
🔶🔴 Email Graffiti: hacking old email
Hacking images in old Emails, by registering the buckets or domains they point to, allows to vandalize old emails.
https://trufflesecurity.com/blog/email-graffiti
#aws #gcp
Hacking images in old Emails, by registering the buckets or domains they point to, allows to vandalize old emails.
https://trufflesecurity.com/blog/email-graffiti
#aws #gcp
👍3
🔶 AWS pre:Invent 2022
Chris Farris highlights AWS's interesting and impactful security announcements in the lead-up to AWS re:Invent.
https://steampipe.io/blog/pre-invent-2022
#aws
Chris Farris highlights AWS's interesting and impactful security announcements in the lead-up to AWS re:Invent.
https://steampipe.io/blog/pre-invent-2022
#aws
🔥1
🔶 reply-fr/sustainable-personal-accounts
Add custom maintenance windows for AWS accounts - purge and prepare resources automatically.
https://github.com/reply-fr/sustainable-personal-accounts
#aws
Add custom maintenance windows for AWS accounts - purge and prepare resources automatically.
https://github.com/reply-fr/sustainable-personal-accounts
#aws
🔥1
🔷 Yet Another Azure VM Persistence Using Bastion Shareable Links
These links have no additional authentication and are publicly accessible.
https://blog.karims.cloud/2022/11/26/yet-another-azure-vm-persistence.html
#azure
These links have no additional authentication and are publicly accessible.
https://blog.karims.cloud/2022/11/26/yet-another-azure-vm-persistence.html
#azure
🔥2
🔶 Amazon Security Lake
A purpose-built service that automatically centralizes an organization's security data from cloud and on-premises sources into a purpose-built data lake stored in your account.
https://aws.amazon.com/ru/blogs/aws/preview-amazon-security-lake-a-purpose-built-customer-owned-data-lake-service
#aws
A purpose-built service that automatically centralizes an organization's security data from cloud and on-premises sources into a purpose-built data lake stored in your account.
https://aws.amazon.com/ru/blogs/aws/preview-amazon-security-lake-a-purpose-built-customer-owned-data-lake-service
#aws
🔥3👍1
🔷 Low-latency fraud detection with Cloud Bigtable
Explore the end to end flow of detecting fraudulent payments with a low-latency and horizontally scalable system powered by tools like Bigtable.
https://cloud.google.com/blog/products/databases/fraud-detection-with-cloud-bigtable
#azure
Explore the end to end flow of detecting fraudulent payments with a low-latency and horizontally scalable system powered by tools like Bigtable.
https://cloud.google.com/blog/products/databases/fraud-detection-with-cloud-bigtable
#azure
👍1👏1
🔶 Protect Sensitive Data with Amazon CloudWatch Logs
A new set of capabilities for Amazon CloudWatch Logs that leverage pattern matching and machine learning (ML) to detect and protect sensitive log data in transit.
https://aws.amazon.com/ru/blogs/aws/protect-sensitive-data-with-amazon-cloudwatch-logs
#aws
A new set of capabilities for Amazon CloudWatch Logs that leverage pattern matching and machine learning (ML) to detect and protect sensitive log data in transit.
https://aws.amazon.com/ru/blogs/aws/protect-sensitive-data-with-amazon-cloudwatch-logs
#aws
🔥3
🔷 Explore the new Learn Kubernetes with Google website
The new website Learn Kubernetes with Google brings together under one roof the guidance of Kubernetes experts, both from Google and across the industry, to communicate the latest trends in building your Kubernetes infrastructure.
https://opensource.googleblog.com/2022/11/explore-new-learn-kubernetes-with-google-website.html
#azure
The new website Learn Kubernetes with Google brings together under one roof the guidance of Kubernetes experts, both from Google and across the industry, to communicate the latest trends in building your Kubernetes infrastructure.
https://opensource.googleblog.com/2022/11/explore-new-learn-kubernetes-with-google-website.html
#azure
🔥2👍1
🔶 Recap of AWS re:Invent 2022: An Honest Review
Properly assess whether all those announcements should mean anything to you; here's the ultimate AWS re:Invent 2022 recap you were looking for.
https://www.resmo.com/blog/aws-reinvent-2022-recap
#aws
Properly assess whether all those announcements should mean anything to you; here's the ultimate AWS re:Invent 2022 recap you were looking for.
https://www.resmo.com/blog/aws-reinvent-2022-recap
#aws
🔥1
🔷 Palantir's FIDO2 secure implementation rollout
The second in a series by Palantir InfoSec on their journey enforcing FIDO2 authentication via hardware authenticators (YubiKeys) across all of Palantir.
https://blog.palantir.com/technical-controls-rollout-and-edge-cases-passwordless-authentication-series-2-c9b6dcd349e
#azure
The second in a series by Palantir InfoSec on their journey enforcing FIDO2 authentication via hardware authenticators (YubiKeys) across all of Palantir.
https://blog.palantir.com/technical-controls-rollout-and-edge-cases-passwordless-authentication-series-2-c9b6dcd349e
#azure
🔥1
🔶🔴 Compromised Cloud Compute Credentials: Case Studies From the Wild
A walk-through of attacks in the wild that abuse stolen cloud compute credentials in cloud environments.
https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials
#aws #gcp
A walk-through of attacks in the wild that abuse stolen cloud compute credentials in cloud environments.
https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials
#aws #gcp
🔥1
🔶🔷🔴 Visualizing Multi Cloud IAM Concepts
Some diagrams to understand key AWS, Azure and GCP IAM concepts and terminology.
https://julian-wieg.medium.com/visualizing-multi-cloud-iam-concepts-63525967c0a7
#aws #azure #gcp
Some diagrams to understand key AWS, Azure and GCP IAM concepts and terminology.
https://julian-wieg.medium.com/visualizing-multi-cloud-iam-concepts-63525967c0a7
#aws #azure #gcp
❤1🔥1
🔴 ine-labs/GCPGoat
A vulnerable by design infrastructure on GCP featuring the latest released OWASP Top 10 web application security risks (2021) and other misconfiguration based on services such as IAM, Storage Bucket, Cloud Functions and Compute Engine.
https://github.com/ine-labs/GCPGoat
#gcp
A vulnerable by design infrastructure on GCP featuring the latest released OWASP Top 10 web application security risks (2021) and other misconfiguration based on services such as IAM, Storage Bucket, Cloud Functions and Compute Engine.
https://github.com/ine-labs/GCPGoat
#gcp
🔥3
🔶 AWS ECR Public Vulnerability
A vulnerability that allowed external actors to delete, update, and create ECR Public images, layers, and tags in registries and repositories that belong to other AWS Accounts, by abusing undocumented internal ECR Public API actions.
https://blog.lightspin.io/aws-ecr-public-vulnerability
#aws
A vulnerability that allowed external actors to delete, update, and create ECR Public images, layers, and tags in registries and repositories that belong to other AWS Accounts, by abusing undocumented internal ECR Public API actions.
https://blog.lightspin.io/aws-ecr-public-vulnerability
#aws
🔥4
🔶 Redshift Security: Attack Surface Explained
Understand how an attacker can leverage Redshift default permissions to perform lateral movement and privilege escalation.
https://www.dig.security/post/redshift-security-attack-surface-explained
#aws
Understand how an attacker can leverage Redshift default permissions to perform lateral movement and privilege escalation.
https://www.dig.security/post/redshift-security-attack-surface-explained
#aws
🔥3
🔶 Unusual Cache Poisoning between Akamai and S3 buckets
A post presenting an unusual way of Cache Poisoning which happens between Akamai and Amazon S3 Buckets.
https://spyclub.tech/2022/12/14/unusual-cache-poisoning-akamai-s3
#aws
A post presenting an unusual way of Cache Poisoning which happens between Akamai and Amazon S3 Buckets.
https://spyclub.tech/2022/12/14/unusual-cache-poisoning-akamai-s3
#aws
🔥3
🔶 How DoorDash Secures Data Transfer Between Cloud and On-Premise Data Centers
How DoorDash built a secure data transfer to a new payment processing vendor by establishing a private network link using AWS Direct Connect.
https://doordash.engineering/2022/11/29/how-doordash-secures-data-transfer-between-cloud-and-on-premise-data-centers
#aws
How DoorDash built a secure data transfer to a new payment processing vendor by establishing a private network link using AWS Direct Connect.
https://doordash.engineering/2022/11/29/how-doordash-secures-data-transfer-between-cloud-and-on-premise-data-centers
#aws
🔥3
🔶🔷🔴 Detecting Cloud Account Takeover Attacks
The Splunk Threat Research Team shares a closer look at the telemetry available in Azure, AWS and GCP and the options teams have to ingest this data into Splunk.
https://www.splunk.com/en_us/blog/security/detecting-cloud-account-takeover-attacks-threat-research-release-october-2022.html
#aws #azure #gcp
The Splunk Threat Research Team shares a closer look at the telemetry available in Azure, AWS and GCP and the options teams have to ingest this data into Splunk.
https://www.splunk.com/en_us/blog/security/detecting-cloud-account-takeover-attacks-threat-research-release-october-2022.html
#aws #azure #gcp
🔥3