
How to perform a EC2 Vulnerability using Amazon Inspector
A guide on how to perform an EC2 Vulnerability Scan using Amazon Inspector with the console and the CLI.
Facebook/Meta Data Protection Assessment (DPA) plan for DigitalOcean Cloud. Start Here
A guide on how to perform an EC2 Vulnerability Scan using Amazon Inspector with the console and the CLI.
The knowledge of all public IP addresses across different services within AWS is a good way to get started with understanding what the attack footprint of an organisation looks like. This article describes fetching this information using both, the web console and the CLI.
A guide to help you discover vulnerable Log4j packages across multiple Linux machines using scripting and the AWS SSM to run commands remotely.
A walkthrough of the slides covered as part of our Star Wars Day special webinar on IAM policy misconfigurations that can lead to privilege escalations and a takeover of the target AWS account.
My journey and experience with how I approached the CKA exam, failed it, learnt from my failure and passed it in my second attempt. Tips and Tricks included!
This is the ninth and the last part of a series on the MITRE ATT&CK framework for Kubernetes, covering the Impact tactic with examples.