
How to perform a EC2 Vulnerability using Amazon Inspector
A guide on how to perform an EC2 Vulnerability Scan using Amazon Inspector with the console and the CLI.
A guide on how to perform an EC2 Vulnerability Scan using Amazon Inspector with the console and the CLI.
The knowledge of all public IP addresses across different services within AWS is a good way to get started with understanding what the attack footprint of an organisation looks like. This article describes fetching this information using both, the web console and the CLI.
CloudTrail is a service offered by AWS to monitor and record all actions taken within an AWS account. This article describes how you can get started with AWS CloudTrail to monitor for security sensitive APIs.
A guide to help you discover vulnerable Log4j packages across multiple Linux machines using scripting and the AWS SSM to run commands remotely.
EC2 misconfigurations leave your cloud accounts vulnerable to attacks. For businesses that haven't started automating cloud security yet, here is a list of things you can do manually, to begin with.
A walkthrough of the slides covered as part of our Star Wars Day special webinar on IAM policy misconfigurations that can lead to privilege escalations and a takeover of the target AWS account.