🔴 Migrating to Google Workspace: Solving Email Routing Challenges
My firsthand experience with migrating from Cloudflare Email Routing to Google Workspace.
https://blog.marcolancini.it/2023/blog-migrate-to-google-workspace/
#gcp
My firsthand experience with migrating from Cloudflare Email Routing to Google Workspace.
https://blog.marcolancini.it/2023/blog-migrate-to-google-workspace/
#gcp
👍3❤1🔥1
🔶🔴 ApatchMe - Authenticated Stored XSS Vulnerability in AWS and GCP Apache Airflow Services
Unpatched Apache Airflow instances used in AWS and GCP allow an exploitable stored XSS through the task instance details page.
https://www.tenable.com/blog/apatchme-authenticated-stored-xss-vulnerability-in-aws-and-gcp-apache-airflow-services
(Use VPN to open from Russia)
#aws #gcp
Unpatched Apache Airflow instances used in AWS and GCP allow an exploitable stored XSS through the task instance details page.
https://www.tenable.com/blog/apatchme-authenticated-stored-xss-vulnerability-in-aws-and-gcp-apache-airflow-services
(Use VPN to open from Russia)
#aws #gcp
❤4👍1🔥1
🔶 Announcing the EKS Cluster Games
Wiz released "The EKS Cluster Games", a cloud security Capture The Flag (CTF) event. The mission? To identify and learn about common Amazon EKS security issues.
https://www.wiz.io/blog/announcing-the-eks-cluster-games
#aws
Wiz released "The EKS Cluster Games", a cloud security Capture The Flag (CTF) event. The mission? To identify and learn about common Amazon EKS security issues.
https://www.wiz.io/blog/announcing-the-eks-cluster-games
#aws
🔥3👍2❤1
🔷 Weather Forecast: Money Is Going to Rain from the Cloud
SafeBreach researchers discovered and exploited a billing flaw in Azure Automation Service, enabling free, hidden, and unstoppable cryptocurrency mining using Python noscripts and Runbooks.
https://www.safebreach.com/blog/cryptocurrency-miner-microsoft-azure
#azure
SafeBreach researchers discovered and exploited a billing flaw in Azure Automation Service, enabling free, hidden, and unstoppable cryptocurrency mining using Python noscripts and Runbooks.
https://www.safebreach.com/blog/cryptocurrency-miner-microsoft-azure
#azure
🔥3❤1👍1
🔷 Spoofing Microsoft Entra ID Verified Publisher Status
It was possible to manipulate the consenting process of a legitimate verified publisher application to implant malicious unverified applications within a Microsoft Entra ID tenant.
https://www.secureworks.com/research/spoofing-microsoft-entra-id-verified-publisher-status
#azure
It was possible to manipulate the consenting process of a legitimate verified publisher application to implant malicious unverified applications within a Microsoft Entra ID tenant.
https://www.secureworks.com/research/spoofing-microsoft-entra-id-verified-publisher-status
#azure
👍2❤1🔥1
🔷 The Triforce of Initial Access
The article emphasizes that the success of Red Teaming often hinges on the quality of information (loot) gathered and the effectiveness of the tools used, such as Evilginx, ROADtools, and TeamFiltration, complemented by the Bobber noscript.
https://trustedsec.com/blog/the-triforce-of-initial-access
#azure
The article emphasizes that the success of Red Teaming often hinges on the quality of information (loot) gathered and the effectiveness of the tools used, such as Evilginx, ROADtools, and TeamFiltration, complemented by the Bobber noscript.
https://trustedsec.com/blog/the-triforce-of-initial-access
#azure
👍2🔥2❤1
🔶 How to create an AMI hardening pipeline and automate updates to your ECS instance fleet
How to create a workflow to enhance Amazon ECS-optimized AMIs by using the CIS Docker Benchmark and automatically updating your EC2 instances in your ECS cluster with the newly created AMIs.
https://aws.amazon.com/ru/blogs/security/how-to-create-an-ami-hardening-pipeline-and-automate-updates-to-your-ecs-instance-fleet/
#aws
How to create a workflow to enhance Amazon ECS-optimized AMIs by using the CIS Docker Benchmark and automatically updating your EC2 instances in your ECS cluster with the newly created AMIs.
https://aws.amazon.com/ru/blogs/security/how-to-create-an-ami-hardening-pipeline-and-automate-updates-to-your-ecs-instance-fleet/
#aws
👍3🔥1😱1
🔴 Introducing Advanced Vulnerability Insights for GKE
Artifact Analysis in partnership with Google Kubernetes Engine has introduced a new vulnerability scanning offering called Advanced Vulnerability Insights.
https://cloud.google.com/blog/products/identity-security/introducing-advanced-vulnerability-insights-for-gke
#gcp
Artifact Analysis in partnership with Google Kubernetes Engine has introduced a new vulnerability scanning offering called Advanced Vulnerability Insights.
https://cloud.google.com/blog/products/identity-security/introducing-advanced-vulnerability-insights-for-gke
#gcp
👍4🔥1😱1
🔷 Mistaken Identity: Extracting Managed Identity Credentials from Azure Function Apps
The article discusses a security vulnerability in Azure Function Apps, where Linux containers use an encrypted startup context file that can be decrypted to expose sensitive data, including Managed Identity certificates.
https://www.netspi.com/blog/technical/cloud-penetration-testing/mistaken-identity-azure-function-apps
#azure
The article discusses a security vulnerability in Azure Function Apps, where Linux containers use an encrypted startup context file that can be decrypted to expose sensitive data, including Managed Identity certificates.
https://www.netspi.com/blog/technical/cloud-penetration-testing/mistaken-identity-azure-function-apps
#azure
👍3🔥1😱1
🔶🔷🔴 State of Cloud Security
Datadog analyzed data from thousands of organizations to understand the latest trends in cloud security posture.
https://www.datadoghq.com/state-of-cloud-security/
#aws #azure #gcp
Datadog analyzed data from thousands of organizations to understand the latest trends in cloud security posture.
https://www.datadoghq.com/state-of-cloud-security/
#aws #azure #gcp
👍5🔥2❤1
🔶 Lambda Extensions: Exploring Misuse Scenarios and Stratus Red Team Module Development
Post analyzing a well-known attack vector and then showing how to build a module for Stratus Red Team, a self-contained binary we can use to detonate offensive attack techniques against a live cloud environment easily.
https://awstip.com/lambda-extensions-exploring-misuse-scenarios-and-stratus-red-team-module-development-b63c5a73491a
(Use VPN to open from Russia)
#aws
Post analyzing a well-known attack vector and then showing how to build a module for Stratus Red Team, a self-contained binary we can use to detonate offensive attack techniques against a live cloud environment easily.
https://awstip.com/lambda-extensions-exploring-misuse-scenarios-and-stratus-red-team-module-development-b63c5a73491a
(Use VPN to open from Russia)
#aws
👍3❤1🔥1
🔷 Public preview: Confidential containers on Azure Kubernetes Service (AKS)
AKS now lets you run individual pods in their own trusted execution environment (TEE).
https://techcommunity.microsoft.com/t5/apps-on-azure-blog/public-preview-confidential-containers-on-aks/ba-p/3980871
#azure
AKS now lets you run individual pods in their own trusted execution environment (TEE).
https://techcommunity.microsoft.com/t5/apps-on-azure-blog/public-preview-confidential-containers-on-aks/ba-p/3980871
#azure
❤2👍2🔥2
🔶 Building sensitive data remediation workflows in multi-account AWS environments
A solution that provides you with visibility into sensitive data residing across a fleet of AWS accounts through a ChatOps-style notification mechanism using Microsoft Teams, which also provides contextual information needed to conduct security investigations.
https://aws.amazon.com/ru/blogs/security/building-sensitive-data-remediation-workflows-in-multi-account-aws-environments/
#aws
A solution that provides you with visibility into sensitive data residing across a fleet of AWS accounts through a ChatOps-style notification mechanism using Microsoft Teams, which also provides contextual information needed to conduct security investigations.
https://aws.amazon.com/ru/blogs/security/building-sensitive-data-remediation-workflows-in-multi-account-aws-environments/
#aws
👍3❤2🔥1
🔷 (Ab)using the Microsoft Identity Platform: Exploring Azure AD Token Caching
Presentation examining how JSON Web Token (JWT) caching works in corporate settings with Azure Active Directory (Azure AD) integration, including Azure AD Joined and Hybrid environments.
https://github.com/FuzzySecurity/SANS-HackFest-2023/blob/main/SANS_HackFest23-Abusing_The-Microsoft-Identity-Platform.pdf
#azure
Presentation examining how JSON Web Token (JWT) caching works in corporate settings with Azure Active Directory (Azure AD) integration, including Azure AD Joined and Hybrid environments.
https://github.com/FuzzySecurity/SANS-HackFest-2023/blob/main/SANS_HackFest23-Abusing_The-Microsoft-Identity-Platform.pdf
#azure
👍5❤1🔥1
🔶 Reversing AWS IAM unique IDs
How to identify the ARN of a user/role from AWS IAM unique IDs, often seen in CloudTrail logs.
https://awsteele.com/blog/2023/11/19/reversing-aws-iam-unique-ids.html
#aws
How to identify the ARN of a user/role from AWS IAM unique IDs, often seen in CloudTrail logs.
https://awsteele.com/blog/2023/11/19/reversing-aws-iam-unique-ids.html
#aws
👍5❤1🔥1
🔶 Establishing a data perimeter on AWS: Require services to be created only within expected networks
How to use preventative controls to help ensure that your resources are deployed within your VPC, so that you can effectively enforce the network perimeter controls.
https://aws.amazon.com/ru/blogs/security/establishing-a-data-perimeter-on-aws-require-services-to-be-created-only-within-expected-networks/
#aws
How to use preventative controls to help ensure that your resources are deployed within your VPC, so that you can effectively enforce the network perimeter controls.
https://aws.amazon.com/ru/blogs/security/establishing-a-data-perimeter-on-aws-require-services-to-be-created-only-within-expected-networks/
#aws
👍4🔥2❤1
🔴 Enhancing Cybersecurity with Security Command Center's Attack Path Simulations and Attack Exposure Scoring
Security Command Center (SCC) recently introduced two new features: Attack Path Simulation (APS) and Attack Exposure Scoring (AES).
https://medium.com/google-cloud/enhancing-cybersecurity-with-security-command-centers-attack-path-simulation-and-attack-path-46c527cd4927
(Use VPN to open from Russia)
#gcp
Security Command Center (SCC) recently introduced two new features: Attack Path Simulation (APS) and Attack Exposure Scoring (AES).
https://medium.com/google-cloud/enhancing-cybersecurity-with-security-command-centers-attack-path-simulation-and-attack-path-46c527cd4927
(Use VPN to open from Russia)
#gcp
👍5❤1🔥1
🔶 How to use multiple instances of AWS IAM Identity Center
You can now have two types of IAM Identity Center instances: organization instances and account instances.
https://aws.amazon.com/ru/blogs/security/how-to-use-multiple-instances-of-aws-iam-identity-center/
#aws
You can now have two types of IAM Identity Center instances: organization instances and account instances.
https://aws.amazon.com/ru/blogs/security/how-to-use-multiple-instances-of-aws-iam-identity-center/
#aws
👍4🔥2❤1
🔷 All the Small Things: Azure CLI Leakage and Problematic Usage Patterns
Post discussing the unintentional leakage of Azure Application Variables in GitHub build logs due to Azure CLI's default behavior.
https://www.paloaltonetworks.com/blog/prisma-cloud/secrets-leakage-user-error-azure-cli/
#azure
Post discussing the unintentional leakage of Azure Application Variables in GitHub build logs due to Azure CLI's default behavior.
https://www.paloaltonetworks.com/blog/prisma-cloud/secrets-leakage-user-error-azure-cli/
#azure
👍2🔥1😱1
🔶 Preventing Accidental Internet-Exposure of AWS Resources
Many AWS customers have suffered breaches due to exposing resources to the Internet by accident. This three-part series walks through different ways to mitigate that risk.
https://kevinhock.github.io/2023/11/26/preventing-accidental-internet-exposure-of-aws-resources-part-1-vpc.html
#aws
Many AWS customers have suffered breaches due to exposing resources to the Internet by accident. This three-part series walks through different ways to mitigate that risk.
https://kevinhock.github.io/2023/11/26/preventing-accidental-internet-exposure-of-aws-resources-part-1-vpc.html
#aws
👍4❤1🔥1