• Tools
  • ATOMs
  • About Us

Posts tagged with: AWS

This conceptual image illustrates the concept of cloud providers.
22,545
people reacted

Open Source Tool Release: Gaining Novel AWS Access With EBS Direct APIs

  • By Michael Bailey
  • January 12, 2021 at 6:00 AM

9

6 min. read

A conceptual image illustrating finding vulnerabilities on the web. IAMFinder is a custom open source tool that can help organizations identify information leakage in AWS accounts.
27,813
people reacted

IAMFinder: Open Source Tool to Identify Information Leaked from AWS IAM Reconnaissance

  • By Jay Chen
  • November 19, 2020 at 12:00 PM

21

6 min. read

Trending

  • Threat Assessment: Active Exploitation of Four Zero-Day Vulnerabilities in Microsoft Exchange Server
  • Ransomware Threat Assessments: A Companion to the 2021 Unit 42 Ransomware Threat Report
  • Satori: Mirai Botnet Variant Targeting Vantage Velocity Field Unit RCE Vulnerability
  • Winter 2020 Network Attack Trends: Internet of Threats
  • Highlights from the 2021 Unit 42 Ransomware Threat Report
This conceptual image illustrates some of the security and configuration issues involved with the cloud, such as the issue with AWS resource-based policy APIs discussed here.
35,857
people reacted

Information Leakage in AWS Resource-Based Policy APIs

  • By Jay Chen
  • November 17, 2020 at 3:00 AM

14

6 min. read

The conceptual image illustrates the idea of the risks that misconfigured IAM roles can pose for cloud workloads.
25,816
people reacted

Unit 42 Cloud Threat Report: Misconfigured IAM Roles Lead to Thousands of Compromised Cloud Workloads

  • By Jay Chen
  • October 8, 2020 at 6:00 AM

14

15 min. read

This conceptual image illustrates the role of Cloud Service Providers (CSPs) in cloud security.
21,860
people reacted

Unit 42 Cloud Threat Report: CSP Findings on Logging, Encryption and Exposed Services

  • By Nathaniel Quist
  • October 7, 2020 at 6:00 AM

3

7 min. read

This conceptual image illustrates the concept of misconfigurations in the cloud. IAM misconfigurations are a key concern outlined in the Unit 42 Cloud Threat Report, 2H 2020.
28,109
people reacted

Highlights from the Unit 42 Cloud Threat Report, 2H 2020

  • By Unit 42
  • October 6, 2020 at 3:00 AM

26

3 min. read

17,040
people reacted

Gaining Persistency on Vulnerable Lambdas

  • By Yuval Avrahami
  • September 2, 2019 at 6:08 AM

23

10 min. read

50,908
people reacted

Hunting the Public Cloud for Exposed Hosts and Misconfigurations

  • By Jay Chen
  • August 12, 2019 at 6:00 AM

27

11 min. read

39,050
people reacted

TCP SACK Panics Linux Servers

  • By Unit 42
  • June 21, 2019 at 7:30 AM

7

5 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2021 Palo Alto Networks, Inc. All rights reserved.