Automating AWS Infrastructure Creation with Crossplane and GitOps

Heading

A while back, I started migrating my CD to a full GitOps process.

Tactical Guide to Threat Hunting in Snowflake Environments

Heading

It was brought to our attention that a threat actor has been observed using stolen customer credentials to target organizations utilizing Snowflake databases.

Who Touched My GCP Project? Understanding the Principal Part in Cloud Audit Logs – Part 1

Heading

Google Cloud Platform (GCP) continues to expand its offerings and remains a top-tier cloud infrastructure service provider. It offers a wide range of services, including Compute Engine (VMs), Google Kubernetes Engine (GKE), BigQuery, Cloud Storage, and Cloud AI Platform. However, in recent years, several vulnerabilities have been reported in some of GCP's services, such as privilege escalation in GKE and CloudSQL.

Why Did AWS Replace My Role’s ARN with a Unique ID in My Policy?

Heading

Understand why AWS replaced your role's ARN with a unique ID in your policy and learn how it affects your IAM management and cloud security practices.

Microsoft Breach by Midnight Blizzard (APT29): What Happened?

Heading

Understand the Midnight Blizzard Microsoft breach by APT29, what happened, and key steps organizations should take to strengthen their defenses.

Understanding GitLab's Security Threats and Strengthening Your Preparedness

Heading

GitLab, a cloud-based, open-source Git repository used by over 38,000 companies around the globe, plays a pivotal role in modern software development. For the organizations that rely on it, it’s a vital collaboration tool and innovation enabler, allowing developers to swiftly test, monitor, and deploy code and housing the full CI/CD pipeline.

How AWS EKS Pod Identity Feature Enhances Credential Management

Heading

This past week at re:Invent, AWS announced a very cool new product feature: EKS Pod Identity. As an AWS user, and specifically an EKS (Elastic Kubernetes Service) user, I spend a great deal of time connecting my pods and workloads to other AWS services and clusters in other regions and accounts, so for me, this feature arrives just in time.

Ransomware Strikes Azure Storage: Are You Ready?

Heading

There’s been a recent surge in cloud ransomware attacks. Examples of such attacks were observed by Sophos X-Ops, which detected the ransomware group BlackCat/ALPHV using a new Sphinx encryptor variant to encrypt Azure storage accounts by employing stolen Azure Storage account keys. The BlackCat/ALPHV ransomware group is the same entity that claimed responsibility for infiltrating MGM’s infrastructure and encrypting more than 100 ESXi hypervisors.

Mitiga Security Advisory: Abusing the SSM Agent as a Remote Access Trojan

Heading

Mitiga's research discovered a significant new post-exploitation security concept: involving the use of Systems Manager (SSM) agent as a Remote Access Trojan (RAT) on Linux and Windows machines, controlling them using another AWS account. We shared our research with the AWS security team and included some of their feedback to this advisory.