Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts tagged with: AWS

Compromised Cloud Compute Credentials: Case Studies From the WildA pictorial representation of a cloud breach
46,186
people reacted

Compromised Cloud Compute Credentials: Case Studies From the Wild

  • By Dror Alon
  • December 8, 2022 at 3:00 PM

36

9 min. read

IAM-Deescalate: An Open Source Tool to Help Users Reduce the Risk of Privilege EscalationA conceptual image representing misconfigurations, such as the excessive permissions that IAM-Deescalate helps detect and remediate
54,301
people reacted

IAM-Deescalate: An Open Source Tool to Help Users Reduce the Risk of Privilege Escalation

  • By Jay Chen
  • July 25, 2022 at 6:00 AM

32

6 min. read

Trending

  • Machine Learning Versus Memory Resident Evil by Esmid Idrizovic
AWS's Log4Shell Hot Patch Vulnerable to Container Escape and Privilege EscalationA conceptual image representing a vulnerability in the AWS Log4Shell hot patch. It shows a java symbol inside a container with one door open.
68,697
people reacted

AWS's Log4Shell Hot Patch Vulnerable to Container Escape and Privilege Escalation

  • By Yuval Avrahami
  • April 19, 2022 at 3:00 PM

65

7 min. read

TeamTNT Actively Enumerating Cloud Environments to Infiltrate OrganizationsA conceptual image representing cloud misconfigurations, which can often be a vector for attackers such as TeamTNT to perform activities such as enumerating cloud environments.
47,812
people reacted

TeamTNT Actively Enumerating Cloud Environments to Infiltrate Organizations

  • By Nathaniel Quist
  • June 4, 2021 at 6:00 AM

16

13 min. read

Open Source Tool Release: Gaining Novel AWS Access With EBS Direct APIsThis conceptual image illustrates the concept of cloud providers.
29,601
people reacted

Open Source Tool Release: Gaining Novel AWS Access With EBS Direct APIs

  • By Michael Bailey
  • January 12, 2021 at 6:00 AM

18

6 min. read

IAMFinder: Open Source Tool to Identify Information Leaked from AWS IAM ReconnaissanceA conceptual image illustrating finding vulnerabilities on the web. IAMFinder is a custom open source tool that can help organizations identify information leakage in AWS accounts.
37,049
people reacted

IAMFinder: Open Source Tool to Identify Information Leaked from AWS IAM Reconnaissance

  • By Jay Chen
  • November 19, 2020 at 12:00 PM

30

6 min. read

Information Leakage in AWS Resource-Based Policy APIsThis conceptual image illustrates some of the security and configuration issues involved with the cloud, such as the issue with AWS resource-based policy APIs discussed here.
48,654
people reacted

Information Leakage in AWS Resource-Based Policy APIs

  • By Jay Chen
  • November 17, 2020 at 3:00 AM

18

6 min. read

Unit 42 Cloud Threat Report: Misconfigured IAM Roles Lead to Thousands of Compromised Cloud WorkloadsThe conceptual image illustrates the idea of the risks that misconfigured IAM roles can pose for cloud workloads.
38,054
people reacted

Unit 42 Cloud Threat Report: Misconfigured IAM Roles Lead to Thousands of Compromised Cloud Workloads

  • By Jay Chen
  • October 8, 2020 at 6:00 AM

19

15 min. read

Unit 42 Cloud Threat Report: CSP Findings on Logging, Encryption and Exposed ServicesThis conceptual image illustrates the role of Cloud Service Providers (CSPs) in cloud security.
30,283
people reacted

Unit 42 Cloud Threat Report: CSP Findings on Logging, Encryption and Exposed Services

  • By Nathaniel Quist
  • October 7, 2020 at 6:00 AM

6

7 min. read

Highlights from the Unit 42 Cloud Threat Report, 2H 2020This conceptual image illustrates the concept of misconfigurations in the cloud. IAM misconfigurations are a key concern outlined in the Unit 42 Cloud Threat Report, 2H 2020.
40,861
people reacted

Highlights from the Unit 42 Cloud Threat Report, 2H 2020

  • By Unit 42
  • October 6, 2020 at 3:00 AM

35

3 min. read

33,588
people reacted

Gaining Persistency on Vulnerable Lambdas

  • By Yuval Avrahami
  • September 2, 2019 at 6:08 AM

42

10 min. read

Hunting the Public Cloud for Exposed Hosts and Misconfigurations
59,830
people reacted

Hunting the Public Cloud for Exposed Hosts and Misconfigurations

  • By Jay Chen
  • August 12, 2019 at 6:00 AM

29

11 min. read

TCP SACK Panics Linux Servers
46,343
people reacted

TCP SACK Panics Linux Servers

  • By Unit 42
  • June 21, 2019 at 7:30 AM

11

5 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.