Sophos Cloud Optix breakthrough IAM visualization is here

Credit to Author: Rich Beckett| Date: Mon, 17 Feb 2020 15:46:55 +0000

Easily visualize the relationships between IAM roles, IAM users, and services, and much more with the latest Sophos Cloud Optix release.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/W2wW5OLmqeQ” height=”1″ width=”1″ alt=””/>

Read more

Business in the front, party in the back: backdoors in elastic servers expose private data

Credit to Author: Vasilios Hioureas| Date: Fri, 17 Jan 2020 18:58:47 +0000

It’s all too easy to discover data leaks online, especially in cloud services. We take a look at misconfigurations in elastic servers that lead to exposed data on the Internet.

Categories:

Tags:

(Read more…)

The post Business in the front, party in the back: backdoors in elastic servers expose private data appeared first on Malwarebytes Labs.

Read more

Sophos e AWS collaborano per fornire una risposta rapida alle minacce cloud

Credit to Author: Sophos Italia| Date: Fri, 06 Dec 2019 07:41:34 +0000

Siamo lieti di sostenere le ultime novità in fatto di sicurezza del cloud pubblico con la presentazione di Amazon Detective e AWS Identity and Access Management Access Analyzer all’evento AWS re:Invent 2019<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/r9H3T8-ScHA” height=”1″ width=”1″ alt=””/>

Read more

Sophos and AWS collaborate to provide rapid response to cloud threats

Credit to Author: Rich Beckett| Date: Tue, 03 Dec 2019 20:03:27 +0000

We’re excited to support the latest advances in public cloud security with the launch of Amazon Detective and AWS Identity and Access Management Access Analyzer at AWS re:Invent 2019.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/BMU-grXPTso” height=”1″ width=”1″ alt=””/>

Read more

Travel database exposed PII on US government employees

Credit to Author: Danny Bradbury| Date: Wed, 23 Oct 2019 10:32:40 +0000

A property management company owned by hotel chain Best Western has exposed 179 GB of sensitive travel information on thousands of travelers.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/ya-mCNqAOjw” height=”1″ width=”1″ alt=””/>

Read more

Hacking with AWS: incorporating leaky buckets into your OSINT workflow

Credit to Author: Vasilios Hioureas| Date: Fri, 13 Sep 2019 20:44:52 +0000

When penetration testing for an organization, what OSINT tactics can researchers employ? We discuss how hacking with AWS buckets can provide more recon data and uncover any leaks.

Categories:

Tags:

(Read more…)

The post Hacking with AWS: incorporating leaky buckets into your OSINT workflow appeared first on Malwarebytes Labs.

Read more