π· Low-latency fraud detection with Cloud Bigtable
Explore the end to end flow of detecting fraudulent payments with a low-latency and horizontally scalable system powered by tools like Bigtable.
https://cloud.google.com/blog/products/databases/fraud-detection-with-cloud-bigtable
#azure
Explore the end to end flow of detecting fraudulent payments with a low-latency and horizontally scalable system powered by tools like Bigtable.
https://cloud.google.com/blog/products/databases/fraud-detection-with-cloud-bigtable
#azure
π1π1
πΆ Protect Sensitive Data with Amazon CloudWatch Logs
A new set of capabilities for Amazon CloudWatch Logs that leverage pattern matching and machine learning (ML) to detect and protect sensitive log data in transit.
https://aws.amazon.com/ru/blogs/aws/protect-sensitive-data-with-amazon-cloudwatch-logs
#aws
A new set of capabilities for Amazon CloudWatch Logs that leverage pattern matching and machine learning (ML) to detect and protect sensitive log data in transit.
https://aws.amazon.com/ru/blogs/aws/protect-sensitive-data-with-amazon-cloudwatch-logs
#aws
π₯3
π· Explore the new Learn Kubernetes with Google website
The new website Learn Kubernetes with Google brings together under one roof the guidance of Kubernetes experts, both from Google and across the industry, to communicate the latest trends in building your Kubernetes infrastructure.
https://opensource.googleblog.com/2022/11/explore-new-learn-kubernetes-with-google-website.html
#azure
The new website Learn Kubernetes with Google brings together under one roof the guidance of Kubernetes experts, both from Google and across the industry, to communicate the latest trends in building your Kubernetes infrastructure.
https://opensource.googleblog.com/2022/11/explore-new-learn-kubernetes-with-google-website.html
#azure
π₯2π1
πΆ Recap of AWS re:Invent 2022: An Honest Review
Properly assess whether all those announcements should mean anything to you; here's the ultimate AWS re:Invent 2022 recap you were looking for.
https://www.resmo.com/blog/aws-reinvent-2022-recap
#aws
Properly assess whether all those announcements should mean anything to you; here's the ultimate AWS re:Invent 2022 recap you were looking for.
https://www.resmo.com/blog/aws-reinvent-2022-recap
#aws
π₯1
π· Palantir's FIDO2 secure implementation rollout
The second in a series by Palantir InfoSec on their journey enforcing FIDO2 authentication via hardware authenticators (YubiKeys) across all of Palantir.
https://blog.palantir.com/technical-controls-rollout-and-edge-cases-passwordless-authentication-series-2-c9b6dcd349e
#azure
The second in a series by Palantir InfoSec on their journey enforcing FIDO2 authentication via hardware authenticators (YubiKeys) across all of Palantir.
https://blog.palantir.com/technical-controls-rollout-and-edge-cases-passwordless-authentication-series-2-c9b6dcd349e
#azure
π₯1
πΆπ΄ Compromised Cloud Compute Credentials: Case Studies From the Wild
A walk-through of attacks in the wild that abuse stolen cloud compute credentials in cloud environments.
https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials
#aws #gcp
A walk-through of attacks in the wild that abuse stolen cloud compute credentials in cloud environments.
https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials
#aws #gcp
π₯1
πΆπ·π΄ Visualizing Multi Cloud IAM Concepts
Some diagrams to understand key AWS, Azure and GCP IAM concepts and terminology.
https://julian-wieg.medium.com/visualizing-multi-cloud-iam-concepts-63525967c0a7
#aws #azure #gcp
Some diagrams to understand key AWS, Azure and GCP IAM concepts and terminology.
https://julian-wieg.medium.com/visualizing-multi-cloud-iam-concepts-63525967c0a7
#aws #azure #gcp
β€1π₯1
π΄ ine-labs/GCPGoat
A vulnerable by design infrastructure on GCP featuring the latest released OWASP Top 10 web application security risks (2021) and other misconfiguration based on services such as IAM, Storage Bucket, Cloud Functions and Compute Engine.
https://github.com/ine-labs/GCPGoat
#gcp
A vulnerable by design infrastructure on GCP featuring the latest released OWASP Top 10 web application security risks (2021) and other misconfiguration based on services such as IAM, Storage Bucket, Cloud Functions and Compute Engine.
https://github.com/ine-labs/GCPGoat
#gcp
π₯3
πΆ AWS ECR Public Vulnerability
A vulnerability that allowed external actors to delete, update, and create ECR Public images, layers, and tags in registries and repositories that belong to other AWS Accounts, by abusing undocumented internal ECR Public API actions.
https://blog.lightspin.io/aws-ecr-public-vulnerability
#aws
A vulnerability that allowed external actors to delete, update, and create ECR Public images, layers, and tags in registries and repositories that belong to other AWS Accounts, by abusing undocumented internal ECR Public API actions.
https://blog.lightspin.io/aws-ecr-public-vulnerability
#aws
π₯4
πΆ Redshift Security: Attack Surface Explained
Understand how an attacker can leverage Redshift default permissions to perform lateral movement and privilege escalation.
https://www.dig.security/post/redshift-security-attack-surface-explained
#aws
Understand how an attacker can leverage Redshift default permissions to perform lateral movement and privilege escalation.
https://www.dig.security/post/redshift-security-attack-surface-explained
#aws
π₯3
πΆ Unusual Cache Poisoning between Akamai and S3 buckets
A post presenting an unusual way of Cache Poisoning which happens between Akamai and Amazon S3 Buckets.
https://spyclub.tech/2022/12/14/unusual-cache-poisoning-akamai-s3
#aws
A post presenting an unusual way of Cache Poisoning which happens between Akamai and Amazon S3 Buckets.
https://spyclub.tech/2022/12/14/unusual-cache-poisoning-akamai-s3
#aws
π₯3
πΆ How DoorDash Secures Data Transfer Between Cloud and On-Premise Data Centers
How DoorDash built a secure data transfer to a new payment processing vendor by establishing a private network link using AWS Direct Connect.
https://doordash.engineering/2022/11/29/how-doordash-secures-data-transfer-between-cloud-and-on-premise-data-centers
#aws
How DoorDash built a secure data transfer to a new payment processing vendor by establishing a private network link using AWS Direct Connect.
https://doordash.engineering/2022/11/29/how-doordash-secures-data-transfer-between-cloud-and-on-premise-data-centers
#aws
π₯3
πΆπ·π΄ Detecting Cloud Account Takeover Attacks
The Splunk Threat Research Team shares a closer look at the telemetry available in Azure, AWS and GCP and the options teams have to ingest this data into Splunk.
https://www.splunk.com/en_us/blog/security/detecting-cloud-account-takeover-attacks-threat-research-release-october-2022.html
#aws #azure #gcp
The Splunk Threat Research Team shares a closer look at the telemetry available in Azure, AWS and GCP and the options teams have to ingest this data into Splunk.
https://www.splunk.com/en_us/blog/security/detecting-cloud-account-takeover-attacks-threat-research-release-october-2022.html
#aws #azure #gcp
π₯3
π΄ Google Cloud infrastructure reliability guide
Introduces the building blocks of reliability in Google Cloud, and provides architectural recommendations to design reliable infrastructure for your cloud workloads.
https://cloud.google.com/architecture/infra-reliability-guide
#gcp
Introduces the building blocks of reliability in Google Cloud, and provides architectural recommendations to design reliable infrastructure for your cloud workloads.
https://cloud.google.com/architecture/infra-reliability-guide
#gcp
π₯1
πΆ Configuration driven dynamic multi-account CI/CD solution on AWS
Post presenting a configuration driven dynamic CI/CD solution per repository.
https://aws.amazon.com/ru/blogs/devops/configuration-driven-dynamic-multi-account-ci-cd-solution-on-aws
#aws
Post presenting a configuration driven dynamic CI/CD solution per repository.
https://aws.amazon.com/ru/blogs/devops/configuration-driven-dynamic-multi-account-ci-cd-solution-on-aws
#aws
π₯2
π΄ How we validated the security controls of our new Confidential Space
A whitepaper demonstrating the level of security review and threat modelling any Google product goes through.
https://cloud.google.com/blog/products/identity-security/how-to-build-a-secure-confidential-space
#gcp
A whitepaper demonstrating the level of security review and threat modelling any Google product goes through.
https://cloud.google.com/blog/products/identity-security/how-to-build-a-secure-confidential-space
#gcp
π₯1
πΆ Prepare for consolidated controls view and consolidated control findings in AWS Security Hub
Security Hub is aiming to release two new features in the first quarter of 2023 that will decouple controls from standards and streamline how you view and receive control findings.
https://aws.amazon.com/ru/blogs/security/prepare-for-consolidated-controls-view-and-consolidated-control-findings-in-aws-security-hub
#aws
Security Hub is aiming to release two new features in the first quarter of 2023 that will decouple controls from standards and streamline how you view and receive control findings.
https://aws.amazon.com/ru/blogs/security/prepare-for-consolidated-controls-view-and-consolidated-control-findings-in-aws-security-hub
#aws
π1π₯1
πΆ Advanced Notice: Amazon S3 will automatically enable S3 Block Public Access and disable access control lists for all new buckets starting in April 2023
Starting in April 2023, S3 will introduce two new default bucket security settings by automatically enabling S3 Block Public Access and disabling S3 access control lists (ACLs) for all new S3 buckets. There is no change for existing buckets.
https://aws.amazon.com/ru/about-aws/whats-new/2022/12/amazon-s3-automatically-enable-block-public-access-disable-access-control-lists-buckets-april-2023
#aws
Starting in April 2023, S3 will introduce two new default bucket security settings by automatically enabling S3 Block Public Access and disabling S3 access control lists (ACLs) for all new S3 buckets. There is no change for existing buckets.
https://aws.amazon.com/ru/about-aws/whats-new/2022/12/amazon-s3-automatically-enable-block-public-access-disable-access-control-lists-buckets-april-2023
#aws
π₯3
π Dear friends,
Happy New Year 2023! π
We wish you success in your personal and career achievements! Stay with us. This year we will continue to delight you with only high-quality content!
#HappyNewYear
Happy New Year 2023! π
We wish you success in your personal and career achievements! Stay with us. This year we will continue to delight you with only high-quality content!
#HappyNewYear
π₯5
π· Cross-tenant network bypass in Azure Cognitive Search
How enabling a single vulnerable feature removed the entire network and identity perimeter around internet-isolated Azure Cognitive Search instances.
https://www.mnemonic.io/resources/blog/acsessed-cross-tenant-network-bypass-in-azure-cognitive-search
#azure
How enabling a single vulnerable feature removed the entire network and identity perimeter around internet-isolated Azure Cognitive Search instances.
https://www.mnemonic.io/resources/blog/acsessed-cross-tenant-network-bypass-in-azure-cognitive-search
#azure
π₯3π2
πΆ Cloud Cred Harvesting Campaign
A credential harvesting campaign targeting cloud infrastructure. The majority of the victim system were running public facing Juptyer Notebooks.
https://permiso.io/blog/s/christmas-cloud-cred-harvesting-campaign
#aws
A credential harvesting campaign targeting cloud infrastructure. The majority of the victim system were running public facing Juptyer Notebooks.
https://permiso.io/blog/s/christmas-cloud-cred-harvesting-campaign
#aws
π₯2