
Deploying web applications with GitHub Actions
A guide on deploying your first (or second, or third or …) application from a code repository to a server via the awesome GitHub Actions workflow.
A guide on deploying your first (or second, or third or …) application from a code repository to a server via the awesome GitHub Actions workflow.
Developers may sometimes, accidentally or due to the lack of security knowledge, store secrets, keys or passwords within code repositories. These may then get leaked over the Internet, resulting in attackers taking over accounts or accessing sensitive information. This article describes how you can scan your Github org repos for secrets..
CloudTrail is a service offered by AWS to monitor and record all actions taken within an AWS account. This article describes how you can get started with AWS CloudTrail to monitor for security sensitive APIs.
A quick guide on detecting and fixing the recently discovered Pwnkit (CVE-2021-4034) Local Privilege Escalation vulnerability on standalone and cloud based virtual machines
A guide on how to perform an EC2 Vulnerability Scan using Amazon Inspector with the console and the CLI.
AWS EC2 is one of the most popular and widely used services from AWS. With a variety of options available to tailor the EC2 instances as per one’s requirements, it also poses a risk of introducing security gaps in the form of misconfigurations or insecure defaults. In this article we discuss some of the ways that can help configure our EC2 instances securely.