🔴 Introducing the Emerging Threats Center in Google Security Operations
Google introduces the Emerging Threats Center in Google Security Operations, powered by Gemini AI. It automates detection engineering by ingesting threat intelligence, generating synthetic events, testing coverage, and creating detection rules to help security teams rapidly assess exposure and defensive posture against emerging threats.
https://cloud.google.com/blog/products/identity-security/introducing-the-emerging-threats-center-in-google-security-operations/
#gcp
Google introduces the Emerging Threats Center in Google Security Operations, powered by Gemini AI. It automates detection engineering by ingesting threat intelligence, generating synthetic events, testing coverage, and creating detection rules to help security teams rapidly assess exposure and defensive posture against emerging threats.
https://cloud.google.com/blog/products/identity-security/introducing-the-emerging-threats-center-in-google-security-operations/
#gcp
❤1👍1🔥1
🔶 Simplify access to external services using AWS IAM Outbound Identity Federation
AWS IAM now enables outbound identity federation, allowing developers to securely authenticate AWS workloads with external services using short-lived JSON Web Tokens instead of storing long-term credentials like API keys and passwords.
https://aws.amazon.com/ru/blogs/aws/simplify-access-to-external-services-using-aws-iam-outbound-identity-federation/
(Use VPN to open from Russia)
#aws
AWS IAM now enables outbound identity federation, allowing developers to securely authenticate AWS workloads with external services using short-lived JSON Web Tokens instead of storing long-term credentials like API keys and passwords.
https://aws.amazon.com/ru/blogs/aws/simplify-access-to-external-services-using-aws-iam-outbound-identity-federation/
(Use VPN to open from Russia)
#aws
❤1👍1🔥1
🔶 Phishing for AWS Credentials via the New ‘aws login’ Flow
The new aws login command, designed to provide temporary credentials for local development, can be exploited by attackers for phishing, even bypassing phishing-resistant MFA.
https://medium.com/@adan.alvarez/phishing-for-aws-credentials-via-the-new-aws-login-flow-39f6969b4eae
(Use VPN to open from Russia)
#aws
The new aws login command, designed to provide temporary credentials for local development, can be exploited by attackers for phishing, even bypassing phishing-resistant MFA.
https://medium.com/@adan.alvarez/phishing-for-aws-credentials-via-the-new-aws-login-flow-39f6969b4eae
(Use VPN to open from Russia)
#aws
❤1👍1🔥1
🔶 Introducing guidelines for network scanning
AWS introduces network scanning guidelines for customer workloads to distinguish legitimate security scans from malicious activity.
https://aws.amazon.com/ru/blogs/security/introducing-guidelines-for-network-scanning/
(Use VPN to open from Russia)
#aws
AWS introduces network scanning guidelines for customer workloads to distinguish legitimate security scans from malicious activity.
https://aws.amazon.com/ru/blogs/security/introducing-guidelines-for-network-scanning/
(Use VPN to open from Russia)
#aws
❤1👍1🔥1
🔶 AWS Secrets Manager launches Managed External Secrets for Third-Party Credentials
AWS Secrets Manager introduces managed external secrets for third-party credentials like Salesforce, Snowflake, and BigID.
https://aws.amazon.com/ru/blogs/security/aws-secrets-manager-launches-managed-external-secrets-for-third-party-credentials/
(Use VPN to open from Russia)
#aws
AWS Secrets Manager introduces managed external secrets for third-party credentials like Salesforce, Snowflake, and BigID.
https://aws.amazon.com/ru/blogs/security/aws-secrets-manager-launches-managed-external-secrets-for-third-party-credentials/
(Use VPN to open from Russia)
#aws
❤1👍1🔥1
🔶 Introducing VPC encryption controls: Enforce encryption in transit within and across VPCs in a Region
AWS announces VPC encryption controls, a new capability that helps organizations audit and enforce encryption in transit for all traffic within and across VPCs in a Region, simplifying compliance with regulatory frameworks like HIPAA, PCI DSS, and FedRAMP through automated monitoring and enforcement modes.
https://aws.amazon.com/ru/blogs/aws/introducing-vpc-encryption-controls-enforce-encryption-in-transit-within-and-across-vpcs-in-a-region/
(Use VPN to open from Russia)
#aws
AWS announces VPC encryption controls, a new capability that helps organizations audit and enforce encryption in transit for all traffic within and across VPCs in a Region, simplifying compliance with regulatory frameworks like HIPAA, PCI DSS, and FedRAMP through automated monitoring and enforcement modes.
https://aws.amazon.com/ru/blogs/aws/introducing-vpc-encryption-controls-enforce-encryption-in-transit-within-and-across-vpcs-in-a-region/
(Use VPN to open from Russia)
#aws
❤2👍2🔥1
Azure API Management exposes managed identity certificates with private keys in plaintext through an undocumented configuration API used by self-hosted gateways. Attackers with gateway keys can extract these certificates for persistent backdoor access.
https://dazesecurity.io/blog/apimMIVuln
(Use VPN to open from Russia)
#azure
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1👍1🔥1
🔶 Amazon CloudFront mTLS with open-source serverless CA
A step-by-step guide on implementing mTLS for Amazon CloudFront using our open-source cloud CA.
https://medium.com/@paulschwarzenberger/amazon-cloudfront-mtls-with-open-source-serverless-ca-f49ce2bc9874
(Use VPN to open from Russia)
#aws
A step-by-step guide on implementing mTLS for Amazon CloudFront using our open-source cloud CA.
https://medium.com/@paulschwarzenberger/amazon-cloudfront-mtls-with-open-source-serverless-ca-f49ce2bc9874
(Use VPN to open from Russia)
#aws
❤1👍1🔥1
🔶 Introducing AWS Lambda Managed Instances: Serverless simplicity with EC2 flexibility
Run Lambda functions on EC2 compute while maintaining serverless simplicity—enabling access to specialized hardware and cost optimizations through EC2 pricing models, with AWS handling all infrastructure management.
https://aws.amazon.com/ru/blogs/aws/introducing-aws-lambda-managed-instances-serverless-simplicity-with-ec2-flexibility/
(Use VPN to open from Russia)
#aws
Run Lambda functions on EC2 compute while maintaining serverless simplicity—enabling access to specialized hardware and cost optimizations through EC2 pricing models, with AWS handling all infrastructure management.
https://aws.amazon.com/ru/blogs/aws/introducing-aws-lambda-managed-instances-serverless-simplicity-with-ec2-flexibility/
(Use VPN to open from Russia)
#aws
❤1👍1🔥1
🔶 Amazon CloudWatch introduces unified data management and analytics for operations, security, and compliance
CloudWatch can automatically normalize and process data to offer consistency across sources with built-in support for Open Cybersecurity Schema Framework (OCSF) and Open Telemetry (OTel) formats, so you can focus on analytics and insights.
https://aws.amazon.com/ru/blogs/aws/amazon-cloudwatch-introduces-unified-data-management-and-analytics-for-operations-security-and-compliance/
(Use VPN to open from Russia)
#aws
CloudWatch can automatically normalize and process data to offer consistency across sources with built-in support for Open Cybersecurity Schema Framework (OCSF) and Open Telemetry (OTel) formats, so you can focus on analytics and insights.
https://aws.amazon.com/ru/blogs/aws/amazon-cloudwatch-introduces-unified-data-management-and-analytics-for-operations-security-and-compliance/
(Use VPN to open from Russia)
#aws
❤1👍1🔥1
🔴 VPC Flow Logs for Cross-Cloud Network
With VPC Flow Logs, now you can monitor critical network traffic moving between your on-prem infrastructure, cross-cloud resources, and Google Cloud.
https://cloud.google.com/blog/products/networking/vpc-flow-logs-for-cross-cloud-network/
#gcp
With VPC Flow Logs, now you can monitor critical network traffic moving between your on-prem infrastructure, cross-cloud resources, and Google Cloud.
https://cloud.google.com/blog/products/networking/vpc-flow-logs-for-cross-cloud-network/
#gcp
❤1👍1🔥1