Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts tagged with: AWS

Compromised Cloud Compute Credentials: Case Studies From the WildA pictorial representation of a cloud breach
54,163
people reacted

Compromised Cloud Compute Credentials: Case Studies From the Wild

  • By Dror Alon
  • December 8, 2022 at 3:00 PM

45

9 min. read

IAM-Deescalate: An Open Source Tool to Help Users Reduce the Risk of Privilege EscalationA conceptual image representing misconfigurations, such as the excessive permissions that IAM-Deescalate helps detect and remediate
57,666
people reacted

IAM-Deescalate: An Open Source Tool to Help Users Reduce the Risk of Privilege Escalation

  • By Jay Chen
  • July 25, 2022 at 6:00 AM

34

6 min. read

Trending

  • Unit 42 Attack Surface Threat Research: Constant Change in Cloud Contributes to 45% of New High/Critical Exposures Per Month by Unit 42
  • Threat Group Assessment: Muddled Libra (Updated) by Unit 42
  • Wireshark Tutorial: Display Filter Expressions by Brad Duncan
  • Wireshark Tutorial: Changing Your Column Display by Brad Duncan
  • Threat Group Assessment: Turla (aka Pensive Ursa) by Unit 42
AWS's Log4Shell Hot Patch Vulnerable to Container Escape and Privilege EscalationA conceptual image representing a vulnerability in the AWS Log4Shell hot patch. It shows a java symbol inside a container with one door open.
77,210
people reacted

AWS's Log4Shell Hot Patch Vulnerable to Container Escape and Privilege Escalation

  • By Yuval Avrahami
  • April 19, 2022 at 3:00 PM

71

7 min. read

TeamTNT Actively Enumerating Cloud Environments to Infiltrate OrganizationsA conceptual image representing cloud misconfigurations, which can often be a vector for attackers such as TeamTNT to perform activities such as enumerating cloud environments.
55,652
people reacted

TeamTNT Actively Enumerating Cloud Environments to Infiltrate Organizations

  • By Nathaniel Quist
  • June 4, 2021 at 6:00 AM

17

13 min. read

Open Source Tool Release: Gaining Novel AWS Access With EBS Direct APIsThis conceptual image illustrates the concept of cloud providers.
31,373
people reacted

Open Source Tool Release: Gaining Novel AWS Access With EBS Direct APIs

  • By Michael Bailey
  • January 12, 2021 at 6:00 AM

19

6 min. read

IAMFinder: Open Source Tool to Identify Information Leaked from AWS IAM ReconnaissanceA conceptual image illustrating finding vulnerabilities on the web. IAMFinder is a custom open source tool that can help organizations identify information leakage in AWS accounts.
39,111
people reacted

IAMFinder: Open Source Tool to Identify Information Leaked from AWS IAM Reconnaissance

  • By Jay Chen
  • November 19, 2020 at 12:00 PM

32

6 min. read

Information Leakage in AWS Resource-Based Policy APIsThis conceptual image illustrates some of the security and configuration issues involved with the cloud, such as the issue with AWS resource-based policy APIs discussed here.
51,125
people reacted

Information Leakage in AWS Resource-Based Policy APIs

  • By Jay Chen
  • November 17, 2020 at 3:00 AM

21

6 min. read

Unit 42 Cloud Threat Report: Misconfigured IAM Roles Lead to Thousands of Compromised Cloud WorkloadsThe conceptual image illustrates the idea of the risks that misconfigured IAM roles can pose for cloud workloads.
40,920
people reacted

Unit 42 Cloud Threat Report: Misconfigured IAM Roles Lead to Thousands of Compromised Cloud Workloads

  • By Jay Chen
  • October 8, 2020 at 6:00 AM

19

15 min. read

Unit 42 Cloud Threat Report: CSP Findings on Logging, Encryption and Exposed ServicesThis conceptual image illustrates the role of Cloud Service Providers (CSPs) in cloud security.
32,418
people reacted

Unit 42 Cloud Threat Report: CSP Findings on Logging, Encryption and Exposed Services

  • By Nathaniel Quist
  • October 7, 2020 at 6:00 AM

6

7 min. read

Highlights from the Unit 42 Cloud Threat Report, 2H 2020This conceptual image illustrates the concept of misconfigurations in the cloud. IAM misconfigurations are a key concern outlined in the Unit 42 Cloud Threat Report, 2H 2020.
43,528
people reacted

Highlights from the Unit 42 Cloud Threat Report, 2H 2020

  • By Unit 42
  • October 6, 2020 at 3:00 AM

35

3 min. read

38,686
people reacted

Gaining Persistency on Vulnerable Lambdas

  • By Yuval Avrahami
  • September 2, 2019 at 6:08 AM

42

10 min. read

Hunting the Public Cloud for Exposed Hosts and Misconfigurations
61,615
people reacted

Hunting the Public Cloud for Exposed Hosts and Misconfigurations

  • By Jay Chen
  • August 12, 2019 at 6:00 AM

29

11 min. read

TCP SACK Panics Linux Servers
48,158
people reacted

TCP SACK Panics Linux Servers

  • By Unit 42
  • June 21, 2019 at 7:30 AM

11

5 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.