CloudSec Wine – Telegram
CloudSec Wine
2.14K subscribers
919 photos
18 files
1.26K links
All about cloud security

Contacts:
@AMark0f
@dvyakimov

About DevSecOps:
@sec_devops
Download Telegram
🔶 AWS Tightens the Reins: New AWS SaaS Marketplace Rules Will Impact Your Commitments

AWS has announced new rules for its SaaS Marketplace that will significantly affect how customers meet their spend commitments.

https://www.duckbillgroup.com/blog/new-aws-marketplace-rules/

#aws
2🔥1👏1
🔶 Announcing ASCP integration with Pod Identity: Enhanced security for secrets management in Amazon EKS

The integration of ASCP with Pod Identity marks a significant step forward in secrets management for Amazon EKS. It offers enhanced security, simplified configuration, and improved operations.

https://aws.amazon.com/ru/blogs/security/announcing-ascp-integration-with-pod-identity-enhanced-security-for-secrets-management-in-amazon-eks/

(Use VPN to open from Russia)

#aws
1👍1🔥1
🔴 jit-groups

JIT Groups is an open source application that lets you implement secure, self-service access management for Google Cloud using groups.

https://github.com/GoogleCloudPlatform/jit-groups

#gcp
👍21🔥1
🔶 The Cat Flap - How to really Purrsist in AWS Accounts

A playful guide to creating covert backdoors in AWS accounts, specifically using the AWSControlTowerExecution role.

https://rootcat.de/blog/thecatflap/

#aws
1👍1🔥1
🔶 Abusing AWS Serverless Image Handler

The AWS solution "Dynamic Image Transformation for Amazon CloudFront", previously known as "AWS Serverless Image Handler", contains a configuration weakness where the role associated with the Lambda does not constrain which buckets can be accessed. The environment variable can be set to a wildcard allowing access to any bucket.

https://www.o3c.no/knowledge/abusing-aws-serverless-image-handler

#aws
1👍1🔥1
🔶 Emulating AWS S3 SSE-C Ransom for Threat Detection

Article exploring how threat actors leverage Amazon S3's Server-Side Encryption with Customer-Provided Keys (SSE-C) for ransom/extortion operations.

https://www.elastic.co/security-labs/emulating-aws-s3-sse-c

#aws
1👍1🔥1
👩‍💻 How Did Singapore Bypass Your US-Only Conditional Access?

Microsoft's geolocation service misidentified the Singapore logins as originating from the Eastern Seaboard (New York, New Jersey, Virginia).

https://petrasecurity.substack.com/p/how-did-singapore-bypass-your-us

#azure
Please open Telegram to view this post
VIEW IN TELEGRAM
😱2👍1🔥1
🔶 The Risk You Can't Afford to Ignore: AWS SES and Email Spoofing

This article discusses AWS SES email spoofing vulnerabilities, potentially enabling phishing attacks.

https://badshah.io/aws-ses-and-email-spoofing/

#aws
1🔥1😱1
🔴 Finding Malware: Detecting Fake Browser Updates Attacks with Google Security Operations

This post dive into Fake Browser Update Attacks, the payloads they deliver, and detection opportunities within the Google SecOps platform.

https://www.googlecloudcommunity.com/gc/Community-Blog/Finding-Malware-Detecting-Fake-Browser-Updates-Attacks-with/ba-p/876307

#gcp
👍21🔥1
🔴 Inter-VPC connectivity architecture patterns in Cross-Cloud Network

How to use Cross-Cloud Network to design inter-network communication architectures with Network Connectivity Center or VPC peering.

https://cloud.google.com/blog/products/networking/inter-network-communication-design-with-ncc-vpc-peering/

#gcp
👍31🔥1
🔶 Connect your on-premises Kubernetes cluster to AWS APIs using IAM Roles Anywhere

IAM Roles Anywhere enables workloads outside of AWS to access AWS resources by exchanging X.509 bound identities for temporary AWS credentials.

https://aws.amazon.com/ru/blogs/security/connect-your-on-premises-kubernetes-cluster-to-aws-apis-using-iam-roles-anywhere/

(Use VPN to open from Russia)

#aws
👍21🔥1
🔶 From log analysis to rule creation: How AWS Network Firewall automates domain-based security for outbound traffic

Post guiding you through the implementation of the AWS Network Firewall automated domain list feature, providing a detailed overview, step-by-step instructions, and best practices to optimize your network security.

https://aws.amazon.com/ru/blogs/security/from-log-analysis-to-rule-creation-how-aws-network-firewall-automates-domain-based-security-for-outbound-traffic/

(Use VPN to open from Russia)

#aws
👍21🔥1
👩‍💻 VaultRecon: An Azure Control Plane/Data Plane Isolation Flaw

A vulnerability in Microsoft Azure that allows users with Reader access to expose sensitive metadata about secrets stored in Azure Key Vaults.

https://cirriustech.co.uk/blog/azure-vault-recon/

#azure
Please open Telegram to view this post
VIEW IN TELEGRAM
1👍1🔥1
🔶 Evaluating AWS Native Approaches for Detecting Suspicious API Calls

Three primary approaches: 1) EventBridge → SNS → Email, 2) CloudTrail → S3 → Lambda → SNS → Email, and 3) CloudTrail → CloudWatch → MetricFilter → MetricAlert → SNS → Email.

https://medium.com/@adan.alvarez/diy-evaluating-aws-native-approaches-for-detecting-suspicious-api-calls-c6e05de97a49

(Use VPN to open from Russia)

#aws
1👍1🔥1
🔴 Introducing AI Protection: Security for the AI era

Google Cloud's new AI Protection safeguards AI workloads and data across clouds and models, no matter the platform.

https://cloud.google.com/blog/products/identity-security/introducing-ai-protection-security-for-the-ai-era/

#gcp
👍21🔥1
👩‍💻 Disrupting a global cybercrime network abusing generative AI

Microsoft is actively fighting against a global cybercrime network known as Storm-2139, which exploits generative AI technologies.

https://blogs.microsoft.com/on-the-issues/2025/02/27/disrupting-cybercrime-abusing-gen-ai/

#azure
Please open Telegram to view this post
VIEW IN TELEGRAM
1👍1🔥1
🔴 gcp-landing-zone

This repository contains the Terraform code necessary to set up a Landing Zone using the Google Cloud Platform (GCP).

https://github.com/ollionorg/gcp-landing-zone

#gcp
1👍1🔥1
👩‍💻 MistakenVMtity: Another cloud image confusion attack

Post discussing vulnerabilities in Azure's CLI related to cloud image confusion attacks, similar to those identified last month in AWS.

https://onecloudplease.com/blog/mistakenvmtity-another-cloud-image-confusion-attack

#azure
Please open Telegram to view this post
VIEW IN TELEGRAM
1👍1🔥1
🔴 Safer and Multimodal: Responsible AI with Gemma

ShieldGemma 2 can detect harmful content in AI models' text and image inputs/outputs, built on Gemma 3 for safer AI development.

https://developers.googleblog.com/en/safer-and-multimodal-responsible-ai-with-gemma/

#gcp
1👍1🔥1
🔴 Project Shield makes it easier to sign up, set up, automate DDoS protection

Project Shield employs Google Cloud Armor to defend against DDoS attacks with minimal user configuration.

https://cloud.google.com/blog/products/identity-security/project-shield-makes-it-easier-to-sign-up-set-up-automate-ddos-protection/

#gcp
1👍1🔥1
🔶 Amazon EKS now envelope encrypts all Kubernetes API data by default

EKS enables default envelope encryption for all Kubernetes API data in EKS clusters running Kubernetes version 1.28 or higher.

https://aws.amazon.com/ru/about-aws/whats-new/2025/03/amazon-eks-envelope-encrypts-kubernetes-api-data-default/

(Use VPN to open from Russia)

#aws
👍21🔥1