
Using log4jscanwin to identify Log4j vulnerabilities on Windows machines
A step-by-step guide on how to identify Log4j vulnerabilities on Windows machines using log4jscanwin
A step-by-step guide on how to identify Log4j vulnerabilities on Windows machines using log4jscanwin
A guide to help you discover vulnerable Log4j packages across multiple Linux machines using scripting and the AWS SSM to run commands remotely.
A walkthrough of the slides covered as part of our Star Wars Day special webinar on IAM policy misconfigurations that can lead to privilege escalations and a takeover of the target AWS account.
My journey and experience with how I approached the CKA exam, failed it, learnt from my failure and passed it in my second attempt. Tips and Tricks included!
This is the ninth and the last part of a series on the MITRE ATT&CK framework for Kubernetes, covering the Impact tactic with examples.
This is the eighth part of a nine part series on the MITRE ATT&CK framework for Kubernetes, covering the Lateral Movement tactic with examples.