Dat Pham TatforNight Wolf Teamblogs.night-wolf.io·May 13, 2024Automated Detection and Remediation of Public Resources in AWS1. Background Information As organizations increasingly use cloud computing and leverage services offered by Amazon Web Services AWS, ensuring the security and compliance of their AWS resource configuration becomes complex. Identifying and managing...DiscussAWS
Trinah Taabutacherih.hashnode.dev·Apr 30, 2024Cloud Choices on Labour Day: When Servers Take a Sick DayHey fellow Kenyans! It's Labour Day, a day to celebrate the hard work we put in all year round. But let's be honest, even servers need a break from the daily grind. Imagine this: You're at a Nyama Choma joint, sizzling meat on the grill, kachumbari o...Discuss#KenyaCloud
Sourav Chakrabortydevsecopssourav.hashnode.dev·Apr 27, 2024From Metadata to Mayhem: Protecting AWS account from SSRF Attacks via IMDSV2Server-Side Request Forgery (SSRF) is a critical security vulnerability that allows attackers to manipulate a server into making unintended requests to internal or external systems. In this article, we explore the relationship between SSRF and the AW...Discussssrf
Chandra Prakash Reddydevopstour.hashnode.dev·Apr 9, 2024Introduction to Cloud ComputingIntroduction Definition Cloud computing is a technology that allows users to access computing services, such as storage, processing power, and software, over the internet, without the need for owning physical infrastructure. Concept Remote Access : ...Discuss·28 readsAWS TourCloud
Lloyd Theophilus Osabutey-Anikonlloyd82.hashnode.dev·Mar 18, 2024Mastering AWS VPC Peering ConnectionsIn the realm of cloud computing, Virtual Private Clouds (VPCs) are essential components for organizing and isolating resources in a network. However, there are times when organizations need to connect multiple VPCs securely to facilitate communicatio...Discuss·34 readsDevops
Anjalipeachycloudsecurity.hashnode.dev·Mar 13, 2024Cloud Village CTF 2023 Write upLast week, my team participated in cloud CTF, Cloud Village 2023 @defcon31. It was an online event, opened for 3 days and had challenges on three cloud platform i.e. AWS, Azure and GCP. Here is a walkthrough of four challenges we were able to solve. ...Discusscloudvillage
Ambuz Ranjanambuzrnjn33.hashnode.dev·Mar 3, 2024Mastering Security in the Digital Age: A Comprehensive Guide to DevSecOpsIntroduction to DevSecOps What is DevSecOps? Definition and Evolution from DevOps: DevSecOps is an extension of DevOps principles, where security (Sec) is integrated into the development (Dev) and operations (Ops) process from the outset. This appr...DiscussDevops
Shahi ShreshthforTechLearn Indiablog.techlearnindia.com·Feb 25, 2024Demystifying Cloud Security: A Journey from Vulnerability to ResilienceThe cloud has revolutionized how businesses operate, offering scalability, agility, and cost-effectiveness. However, with this evolution comes the crucial need for robust security measures. This blog will guide you through the fundamental aspects of ...DiscussCloud Computing
ANSAR SHAIKansarshaik965.hashnode.dev·Feb 5, 2024Day 40-41: Setting up an Application Load Balancer with AWS EC2 🚀 ☁| Basic HTML WEB Page On Apache2 Server in EC2 Instance Using Ubuntu | Create Load Balancer Between Two EC2 Instance | Load balancer Between Two Hosted Apache Web-Severs | Load balancing is crucial for optimizing resource utilization and ensuring the...Discuss·31 readsWEBACL
Goodycybgoodycyb.hashnode.dev·Feb 4, 2024Threat detection🕵️♂️ in AWS using Amazon Athena ServiceI recommend starting with the article below before beginning the Hands-on lab.😉🕵️♂️ https://medium.com/@goodycyb/threat-detection-in-aws-using-amazon-athena-to-analyze-cloudtrail-logs-from-flaws-cloud-00a43348d18a Objective In this lab, you wil...Discuss·164 readsThreat Detection 💡🕵️♂️🕸️ThreatDetection