🔴 Safer and Multimodal: Responsible AI with Gemma
ShieldGemma 2 can detect harmful content in AI models' text and image inputs/outputs, built on Gemma 3 for safer AI development.
https://developers.googleblog.com/en/safer-and-multimodal-responsible-ai-with-gemma/
#gcp
ShieldGemma 2 can detect harmful content in AI models' text and image inputs/outputs, built on Gemma 3 for safer AI development.
https://developers.googleblog.com/en/safer-and-multimodal-responsible-ai-with-gemma/
#gcp
❤1👍1🔥1
🔴 Project Shield makes it easier to sign up, set up, automate DDoS protection
Project Shield employs Google Cloud Armor to defend against DDoS attacks with minimal user configuration.
https://cloud.google.com/blog/products/identity-security/project-shield-makes-it-easier-to-sign-up-set-up-automate-ddos-protection/
#gcp
Project Shield employs Google Cloud Armor to defend against DDoS attacks with minimal user configuration.
https://cloud.google.com/blog/products/identity-security/project-shield-makes-it-easier-to-sign-up-set-up-automate-ddos-protection/
#gcp
❤1👍1🔥1
🔶 Amazon EKS now envelope encrypts all Kubernetes API data by default
EKS enables default envelope encryption for all Kubernetes API data in EKS clusters running Kubernetes version 1.28 or higher.
https://aws.amazon.com/ru/about-aws/whats-new/2025/03/amazon-eks-envelope-encrypts-kubernetes-api-data-default/
(Use VPN to open from Russia)
#aws
EKS enables default envelope encryption for all Kubernetes API data in EKS clusters running Kubernetes version 1.28 or higher.
https://aws.amazon.com/ru/about-aws/whats-new/2025/03/amazon-eks-envelope-encrypts-kubernetes-api-data-default/
(Use VPN to open from Russia)
#aws
👍2❤1🔥1
Enumerate all secrets in all Azure Key Vaults and Logic Apps across all subnoscriptions.
https://github.com/Az-Skywalker/Az-Skywalker
#azure
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1👍1🔥1
This article aims to provide a deeper technical understanding of the Elevate Access mechanism, including its underlying implementation, the specific logs where activities are recorded, when you DON'T need Elevate Access to get the same permissions, and the practical techniques attackers use to leverage it.
https://permiso.io/blog/azures-apex-permissions-elevate-access-the-logs-security-teams-overlook
(Use VPN to open from Russia)
#azure
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1👍1🔥1
🔶👩💻 AWS CloudWatch log ingestion to Microsoft Sentinel
A solution using CloudWatch log subnoscription filters to stream logs to an S3 bucket via Kinesis Firehose.
https://medium.com/@paulschwarzenberger/aws-cloudwatch-log-ingestion-to-microsoft-sentinel-fa5084de41f9
(Use VPN to open from Russia)
#aws #azure
A solution using CloudWatch log subnoscription filters to stream logs to an S3 bucket via Kinesis Firehose.
https://medium.com/@paulschwarzenberger/aws-cloudwatch-log-ingestion-to-microsoft-sentinel-fa5084de41f9
(Use VPN to open from Russia)
#aws #azure
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1👍1🔥1
🔴 Streamlined Security: Introducing Network Security Integration
Network Security Integration can help you integrate third-party network appliance or service deployments with your Google Cloud workloads.
https://cloud.google.com/blog/products/networking/introducing-network-security-integration/
#gcp
Network Security Integration can help you integrate third-party network appliance or service deployments with your Google Cloud workloads.
https://cloud.google.com/blog/products/networking/introducing-network-security-integration/
#gcp
👍2❤1🔥1
🔴 Google Cloud - Managing Google's Unverified Authentication Library
In Google Cloud, Application Default Credentials (ADC) allows your code/applications to automatically find and use credentials.
https://akingscote.co.uk/posts/gcloud-unconfigured-third-party-apps/
#gcp
In Google Cloud, Application Default Credentials (ADC) allows your code/applications to automatically find and use credentials.
https://akingscote.co.uk/posts/gcloud-unconfigured-third-party-apps/
#gcp
👍2❤1🔥1
Imagine trying to disable a malicious user in your Azure environment, only to find it can't be modified! Datadog recently identified a timing-based bug in Entra ID's restricted administrative units (AUs) that could have allowed just this scenario to occur.
https://securitylabs.datadoghq.com/articles/creating-immutable-users-entra-id-administrative-units/
#azure
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1👍1🔥1
🔶 Interactive AWS NAT Gateway
An interactive blog post exploring how AWS NAT Gateway works.
https://malithr.com/aws/natgateway/
#aws
An interactive blog post exploring how AWS NAT Gateway works.
https://malithr.com/aws/natgateway/
#aws
👍2❤1🔥1
🔴 Introducing protection summary, a new Google Cloud Backup and DR feature
Google Cloud Backup and DR's protection summary offers a centralized view of data protection configuration, identifying gaps and improving resilience.
https://cloud.google.com/blog/products/storage-data-transfer/google-cloud-backup-and-dr-protection-summary/
#gcp
Google Cloud Backup and DR's protection summary offers a centralized view of data protection configuration, identifying gaps and improving resilience.
https://cloud.google.com/blog/products/storage-data-transfer/google-cloud-backup-and-dr-protection-summary/
#gcp
❤1👍1🔥1
🔶 Effectively implementing resource control policies in a multi-account environment
Post demonstrating how RCPs can help improve your security posture while allowing even more freedom to developers in managing their resources, thus reducing friction between central security and application teams.
https://aws.amazon.com/ru/blogs/security/effectively-implementing-resource-controls-policies-in-a-multi-account-environment/
(Use VPN to open from Russia)
#aws
Post demonstrating how RCPs can help improve your security posture while allowing even more freedom to developers in managing their resources, thus reducing friction between central security and application teams.
https://aws.amazon.com/ru/blogs/security/effectively-implementing-resource-controls-policies-in-a-multi-account-environment/
(Use VPN to open from Russia)
#aws
❤2👍1🔥1
🔶 How does Sendbird secure AWS?
How Sendbird matured its AWS security posture, empowering developers to deploy in a way that's both user-friendly and secure.
https://sendbird.com/blog/aws-security
#aws
How Sendbird matured its AWS security posture, empowering developers to deploy in a way that's both user-friendly and secure.
https://sendbird.com/blog/aws-security
#aws
❤2👍1🔥1
This media is not supported in your browser
VIEW IN TELEGRAM
🔴 ImageRunner: A Privilege Escalation Vulnerability Impacting GCP Cloud Run
The vulnerability could have allowed to abuse Google Cloud Run permissions in order to pull private Google Artifact Registry and Google Container Registry images in the same account.
https://www.tenable.com/blog/imagerunner-a-privilege-escalation-vulnerability-impacting-gcp-cloud-run
(Use VPN to open from Russia)
#gcp
The vulnerability could have allowed to abuse Google Cloud Run permissions in order to pull private Google Artifact Registry and Google Container Registry images in the same account.
https://www.tenable.com/blog/imagerunner-a-privilege-escalation-vulnerability-impacting-gcp-cloud-run
(Use VPN to open from Russia)
#gcp
❤1👍1🔥1
🔶 Invoking Misconfigured API Gateways from Any External AWS Accounts
Did you know a misconfigured private API Gateway can be invoked from any AWS account?
https://www.offensai.com/blog/invoking-misconfigured-api-gateways-from-external-aws-accounts
(Use VPN to open from Russia)
#aws
Did you know a misconfigured private API Gateway can be invoked from any AWS account?
https://www.offensai.com/blog/invoking-misconfigured-api-gateways-from-external-aws-accounts
(Use VPN to open from Russia)
#aws
❤1👍1🔥1
🔶 Planning for your IAM Roles Anywhere deployment
Before you start using IAM Roles Anywhere, it's important to plan how you'll integrate it with your PKI and with your applications running outside of AWS.
https://aws.amazon.com/ru/blogs/security/planning-for-your-iam-roles-anywhere-deployment/
(Use VPN to open from Russia)
#aws
Before you start using IAM Roles Anywhere, it's important to plan how you'll integrate it with your PKI and with your applications running outside of AWS.
https://aws.amazon.com/ru/blogs/security/planning-for-your-iam-roles-anywhere-deployment/
(Use VPN to open from Russia)
#aws
❤1👍1🔥1
🔶 Handling Network Throttling with AWS EC2 at Pinterest
Post discussing Pinterest's experiences in identifying the challenges associated with EC2 network throttling, as well as how they developed network performance monitoring for their EC2 fleet.
https://medium.com/@Pinterest_Engineering/handling-network-throttling-with-aws-ec2-at-pinterest-fda0efc21083
(Use VPN to open from Russia)
#aws
Post discussing Pinterest's experiences in identifying the challenges associated with EC2 network throttling, as well as how they developed network performance monitoring for their EC2 fleet.
https://medium.com/@Pinterest_Engineering/handling-network-throttling-with-aws-ec2-at-pinterest-fda0efc21083
(Use VPN to open from Russia)
#aws
👍2❤1🔥1
🔴 Introducing Google Unified Security
Google introduced Unified Security, a new security solution that combines Google Cloud's security products with Mandiant's expertise to provide a comprehensive approach to threat intelligence, security operations, cloud security, and secure enterprise browsing.
https://cloud.google.com/blog/products/identity-security/driving-secure-innovation-with-ai-google-unified-security-next25/
#gcp
Google introduced Unified Security, a new security solution that combines Google Cloud's security products with Mandiant's expertise to provide a comprehensive approach to threat intelligence, security operations, cloud security, and secure enterprise browsing.
https://cloud.google.com/blog/products/identity-security/driving-secure-innovation-with-ai-google-unified-security-next25/
#gcp
❤1👍1🔥1
🔴 Cloud WAN: Connect your global enterprise with a network built for the AI era
Cloud WAN is a fully managed, reliable, and secure enterprise backbone to transform enterprise wide area network (WAN) architectures.
https://cloud.google.com/blog/products/networking/connect-globally-with-cloud-wan-for-the-ai-era/
#gcp
Cloud WAN is a fully managed, reliable, and secure enterprise backbone to transform enterprise wide area network (WAN) architectures.
https://cloud.google.com/blog/products/networking/connect-globally-with-cloud-wan-for-the-ai-era/
#gcp
👍2❤1🔥1
🔶 Automating AWS Private CA audit reports and certificate expiration alerts
Guide through a custom automation workflow that harnesses AWS Private CA audit reports to monitor certificate expirations proactively.
https://aws.amazon.com/ru/blogs/security/automating-aws-private-ca-audit-reports-and-certificate-expiration-alerts/
(Use VPN to open from Russia)
#aws
Guide through a custom automation workflow that harnesses AWS Private CA audit reports to monitor certificate expirations proactively.
https://aws.amazon.com/ru/blogs/security/automating-aws-private-ca-audit-reports-and-certificate-expiration-alerts/
(Use VPN to open from Russia)
#aws
❤1👍1🔥1
🔶 How to use the new CloudTrail network activity events for AWS VPC Endpoints
How AWS VPC Endpoint CloudTrail logs can help you troubleshoot endpoint policies and strengthen your network's security against data exfiltration.
https://www.wiz.io/blog/aws-vpc-endpoint-cloudtrail
#aws
How AWS VPC Endpoint CloudTrail logs can help you troubleshoot endpoint policies and strengthen your network's security against data exfiltration.
https://www.wiz.io/blog/aws-vpc-endpoint-cloudtrail
#aws
❤1👍1🔥1