๐ Stories, Tutorials & Articles

bulletproof.co.uk
This blog will help you understand the importance of data retention, as well as how long personal data should be stored and the consequences of holding onto data for longer than necessary.

networkcomputing.com
In an increasingly perilous world, zero trust for network user verification is more than just a good ideaโit's essential.

lightspin.io
Lightspin obtains credentials to an internal AWS service by exploiting a local file read vulnerability on the RDS EC2 instance using the log_fdw extension.

amazon.com
In this post, you will see how easy it is to secure your VGS Inbound and Outbound Connections using the VGS software-as-a-service (SaaS) solution, which enables you to collect, protect, and exchange any type of sensitive information.

csoonline.com
Sigma rules allow you to detect anomalies in log events and identify suspicious activity.

geekflare.com
MITM attacks allow perpetrators to eavesdrop on the communication between a user and an application while making it look as though the communication is proceeding as it should.

cyble.com
Cyble analyzes the instances of misconfigured Kubernetes clusters and how they could potentially be exploited by Threat Actors.

earthly.dev
Cuelang is an extension of YAML and a command-line tool to validate your YAMl file . It is a static type system for configuration . It can be used to detect problems before they happens.
โ๏ธ Tools, Apps & Software

github.com
Run individual controls or full compliance benchmarks for CIS, PCI, NIST, HIPAA and more across all of your AWS accounts using Steampipe.

github.com
Find credentials all over the place

github.com
An open project to list all publicly known cloud vulnerabilities and CSP security issues

github.com
Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.