
How to perform a EC2 Vulnerability using Amazon Inspector
A guide on how to perform an EC2 Vulnerability Scan using Amazon Inspector with the console and the CLI.
A guide on how to perform an EC2 Vulnerability Scan using Amazon Inspector with the console and the CLI.
A security audit allows you to collect information about a system which can then be analysed to identify if there are security weaknesses. This article describes how you can perform a security audit of your Mongo Cloud account.
The knowledge of all public IP addresses across different services within AWS is a good way to get started with understanding what the attack footprint of an organisation looks like. This article describes fetching this information using both, the web console and the CLI.
CloudTrail is a service offered by AWS to monitor and record all actions taken within an AWS account. This article describes how you can get started with AWS CloudTrail to monitor for security sensitive APIs.
A step-by-step guide on how to identify Log4j vulnerabilities on Windows machines using log4jscanwin
Developers may sometimes, accidentally or due to the lack of security knowledge, store secrets, keys or passwords within code repositories. These may then get leaked over the Internet, resulting in attackers taking over accounts or accessing sensitive information. This article describes how you can scan your Github org repos for secrets.