0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoBad.Build: A Critical Privilege Escalation Design Flaw in Google Cloud Build Enables a Supply Chain Attackplus-squareorca.securityexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBad.Build: A Critical Privilege Escalation Design Flaw in Google Cloud Build Enables a Supply Chain Attackplus-squareorca.security0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoALFA: Automated Audit Log Forensic Analysis for Google Workspaceplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkALFA: Automated Audit Log Forensic Analysis for Google Workspaceplus-squaregithub.com0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoBuilding Chainguard's container image registryplus-squarewww.chainguard.devexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkBuilding Chainguard's container image registryplus-squarewww.chainguard.dev0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoKubernetes Security Basics Series Part I - Deployment and Container Orchestrationplus-squareksoc.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkKubernetes Security Basics Series Part I - Deployment and Container Orchestrationplus-squareksoc.com0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoKubernetes Grey Zone: Risks in Managed Cluster Middlewareplus-squarewww.wiz.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkKubernetes Grey Zone: Risks in Managed Cluster Middlewareplus-squarewww.wiz.io0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoMy AWS Pentest Methodologyplus-squaremedium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMy AWS Pentest Methodologyplus-squaremedium.com0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoGCP Pentesting Guideplus-squareslashparity.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGCP Pentesting Guideplus-squareslashparity.com0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoExploring Firecracker MicroVMs for Multi-Tenant Dagger CI/CD Pipelinesplus-squarewww.felipecruz.esexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkExploring Firecracker MicroVMs for Multi-Tenant Dagger CI/CD Pipelinesplus-squarewww.felipecruz.es0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoSecuring the EC2 Instance Metadata Serviceplus-squaresecuritylabs.datadoghq.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSecuring the EC2 Instance Metadata Serviceplus-squaresecuritylabs.datadoghq.com0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoToyota admits to yet another cloud leakplus-squarewww.theregister.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkToyota admits to yet another cloud leakplus-squarewww.theregister.com0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoContainer security fundamentals seriesplus-squaresecuritylabs.datadoghq.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkContainer security fundamentals seriesplus-squaresecuritylabs.datadoghq.com0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoPublic Cloud Security Breachesplus-squarewww.breaches.cloudexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkPublic Cloud Security Breachesplus-squarewww.breaches.cloud0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agoHow to get rid of AWS access keys- Part 1: The easy winsplus-squarewww.wiz.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkHow to get rid of AWS access keys- Part 1: The easy winsplus-squarewww.wiz.io0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink
0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agowelcomeplus-squarepinmessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-squarewelcomeplus-squarepin0xCBE@infosec.pubM to Cloud Security@infosec.pubEnglish · 2 years agomessage-square0fedilink