Muddled Libra’s Evolution to the Cloud 4,876 people reacted Muddled Libra’s Evolution to the Cloud By Margaret Zimmermann April 9, 2024 at 11:00 AM 16 10 min. read
Navigating the Cloud: Exploring Lateral Movement Techniques 7,816 people reacted Navigating the Cloud: Exploring Lateral Movement Techniques By Eden Elazar February 28, 2024 at 3:00 AM 28 12 min. read
CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys 7,964 people reacted CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys By William Gamazo and Nathaniel Quist October 30, 2023 at 4:40 AM 23 15 min. read
Compromised Cloud Compute Credentials: Case Studies From the Wild 55,679 people reacted Compromised Cloud Compute Credentials: Case Studies From the Wild By Dror Alon December 8, 2022 at 3:00 PM 48 9 min. read
IAM-Deescalate: An Open Source Tool to Help Users Reduce the Risk of Privilege Escalation 58,343 people reacted IAM-Deescalate: An Open Source Tool to Help Users Reduce the Risk of Privilege Escalation By Jay Chen July 25, 2022 at 6:00 AM 36 6 min. read
AWS's Log4Shell Hot Patch Vulnerable to Container Escape and Privilege Escalation 78,054 people reacted AWS's Log4Shell Hot Patch Vulnerable to Container Escape and Privilege Escalation By Yuval Avrahami April 19, 2022 at 3:00 PM 72 7 min. read
TeamTNT Actively Enumerating Cloud Environments to Infiltrate Organizations 56,517 people reacted TeamTNT Actively Enumerating Cloud Environments to Infiltrate Organizations By Nathaniel Quist June 4, 2021 at 6:00 AM 18 13 min. read
Open Source Tool Release: Gaining Novel AWS Access With EBS Direct APIs 31,892 people reacted Open Source Tool Release: Gaining Novel AWS Access With EBS Direct APIs By Michael Bailey January 12, 2021 at 6:00 AM 19 6 min. read
IAMFinder: Open Source Tool to Identify Information Leaked from AWS IAM Reconnaissance 39,716 people reacted IAMFinder: Open Source Tool to Identify Information Leaked from AWS IAM Reconnaissance By Jay Chen November 19, 2020 at 12:00 PM 32 6 min. read
Information Leakage in AWS Resource-Based Policy APIs 51,811 people reacted Information Leakage in AWS Resource-Based Policy APIs By Jay Chen November 17, 2020 at 3:00 AM 21 6 min. read
Unit 42 Cloud Threat Report: Misconfigured IAM Roles Lead to Thousands of Compromised Cloud Workloads 42,015 people reacted Unit 42 Cloud Threat Report: Misconfigured IAM Roles Lead to Thousands of Compromised Cloud Workloads By Jay Chen October 8, 2020 at 6:00 AM 19 15 min. read
Unit 42 Cloud Threat Report: CSP Findings on Logging, Encryption and Exposed Services 32,970 people reacted Unit 42 Cloud Threat Report: CSP Findings on Logging, Encryption and Exposed Services By Nathaniel Quist October 7, 2020 at 6:00 AM 6 7 min. read
Highlights from the Unit 42 Cloud Threat Report, 2H 2020 44,247 people reacted Highlights from the Unit 42 Cloud Threat Report, 2H 2020 By Unit 42 October 6, 2020 at 3:00 AM 35 3 min. read
39,708 people reacted Gaining Persistency on Vulnerable Lambdas By Yuval Avrahami September 2, 2019 at 6:08 AM 43 10 min. read
Hunting the Public Cloud for Exposed Hosts and Misconfigurations 62,170 people reacted Hunting the Public Cloud for Exposed Hosts and Misconfigurations By Jay Chen August 12, 2019 at 6:00 AM 30 11 min. read