-
academyHow to find vulnerable log4j instances across your AWS EC2 instances
Riyaz Walikar • -
academyAuthentication Bypass in Apache Airflow - CVE-2020-17526 and AWS Cloud Platform compromise
Riyaz Walikar • -
academyIAM Bad: Privilege Escalation using Misconfigured Policies in AWS IAM (Webinar)
Riyaz Walikar • -
academyRogue One: A Certified Kubernetes Administrator (CKA) Exam Story
Riyaz Walikar • -
academyPart 9 - Mapping the MITRE ATT&CK framework to your Kubernetes cluster: Impact on the Cluster
Riyaz Walikar • -
academyPart 8 - Mapping the MITRE ATT&CK framework to your Kubernetes cluster: Lateral Movement
Riyaz Walikar •