|
🔗 Stories, Tutorials & Articles |
|
|
|
How to secure API Gateway HTTP endpoints with JWT authorizer |
|
|
This blog post demonstrates how you can secure Amazon API Gateway HTTP endpoints with JSON web token (JWT) authorizers. Amazon API Gateway helps developers create, publish, and maintain secure APIs at any scale, helping manage thousands of API calls. There are no minimum fees, and you only pay for the API calls you receive. |
|
|
|
|
|
|
Why Do Amazon S3 Data Breaches Keep Happening? |
|
|
Misconfigurations in Amazon S3 keep happening. Here’s why and how to stop them. |
|
|
|
|
|
|
Exploiting Apache Cassandra User-Defined Functions for Remote Code Execution |
|
|
JFrog’s Security Research team recently disclosed an RCE (remote code execution) issue in Apache Cassandra, which has been assigned to CVE-2021-44521 (CVSS 8.4). This Apache security vulnerability is easy to exploit and has the potential to wreak havoc on systems, but luckily only manifests in non-default configurations of Cassandra. In this blogpost, we present the background on how we discovered the RCE security vulnerability, provide details on a PoC exploit, and share the suggested fix and mitigation options. |
|
|
|
|
|
|
Secure Google Cloud SQL Instances using Private IP: Gotchas & troubleshooting |
|
|
This blog is for you, if you are planning to deploy Cloud SQL instances using private IP and/or intend to know more about the caveats of configuring Cloud SQL instances using Private IP. The official documentation on configuring Private IP on Cloud SQL service precisely covers most aspects, however this blog explains different scenarios one must consider while planning to deploy the Cloud SQL instance either in one or across multiple regions using Private IP. This blog also helps to frame a proactive approach on the network design which is the critical foundation for any workload. |
|
|
|
|
|
|
|
A Seasoned Tester's Crystal Ball |
|
|
Security is important. But like with other aspects of quality, it is too important for specialists. And the ways we talk about it under one term "security" or "security testing", are in my experience harmful for our intentions of doing better in this space. |
|
|
|
|
|
|
How I Discovered Thousands of Open Databases on AWS ✅ |
|
|
My journey on finding and reporting databases with sensitive data about Fortune-500 companies, Hospitals, Crypto platforms, Startups during due diligence, and more. |
|
|
|
|
|
|
Gaining and Retaining Security Staff in The Age of the Great Resignation |
|
|
Jon Check, executive director of cyber protection solutions at Raytheon Intelligence & Space, shares insights into today’s cybersecurity staffing problems and solutions. |
|
|
|
|