Click any tag below to further narrow down your results
Links
AirFrance-KLM transformed its automation platform using Terraform, Vault, and Ansible to enhance security, compliance, and efficiency. The shift from compliance-by-construction to compliance-by-guardrails streamlined their processes, reducing provisioning time and errors while maintaining governance.
Infisical is an open-source tool for managing secrets and application configurations. It allows teams to sync secrets across various platforms, maintain version control, and prevent leaks. The platform also supports features like secret rotation, dynamic secrets, and integration with Kubernetes.
Sweet Security offers a comprehensive solution for cloud defense, leveraging AI to identify and prioritize vulnerabilities. It provides real-time visibility and rapid response to threats, helping organizations secure their environments without frequent scans. The platform also simplifies compliance and governance processes.
HashiCorp's Consul 1.22 introduces significant improvements in security, telemetry, and user experience. Key features include an AI-driven MCP server for easier management and enhanced OIDC authentication with private key JWT. The update also streamlines backup processes on Azure using managed identities.
This article outlines how a financial services organization shifted from annual pentesting to weekly security validations. This change allowed them to rapidly identify and remediate vulnerabilities, improving overall security posture and visibility into real-world risks.
Hackers are exploiting misconfigured web applications used for security testing to breach Fortune 500 companies. An investigation revealed that over 1,900 vulnerable applications were exposed, allowing attackers to deploy crypto miners and webshells. Many of these apps used default credentials and lacked proper security measures.
GEICO significantly reduced its $300 million cloud spending by overhauling its security model. The company shifted from a network-centric approach to an identity-first strategy, allowing for better management of secrets and policies across its hybrid cloud environments.
The article details a developer's experience transitioning from a traditional SSH model to a zero-trust connectivity solution using Tailscale. Initially facing issues with SSH key management and server abuse, the team implemented Tailscale for seamless server access, enhancing security and simplifying user setup. Future plans include allowing users to manage their own tailnets for better control.
This article details the Quiet Riot tool for enumerating AWS, Azure, and GCP principals without authentication. It explains setup requirements, command usage, and performance insights based on extensive testing. The tool facilitates automated scanning for various account IDs and user details across cloud services.
This article offers a checklist to help platform engineers and SREs secure cloud and container workloads. It emphasizes the need for updated strategies in light of expanding attack surfaces and the integration of AI. The checklist covers asset inventory, vulnerability assessment, and compliance monitoring.
Researchers found a sophisticated malware framework called VoidLink that targets Linux machines, particularly in cloud environments. It has over 30 customizable modules for reconnaissance, privilege escalation, and stealth, indicating a shift towards targeting Linux systems by professional threat actors.
This article highlights Datadog's milestone of over 1,000 integrations in 2025, detailing key additions in AI observability, security, hybrid cloud, and data analytics. It emphasizes new partnerships and tools that enhance visibility and performance monitoring across various technology sectors.
This article discusses two critical vulnerabilities found in Chainlit, an open-source framework for chatbots. These flaws could allow attackers to access sensitive files and take over cloud accounts, highlighting the distinct security risks of interconnected AI systems.
Amazon's Threat Intelligence team has halted operations by Russian GRU hackers targeting cloud infrastructure, particularly in the energy sector. The attackers shifted from exploiting software vulnerabilities to leveraging misconfigured network devices for access, prompting Amazon to take protective measures for affected customers and recommend security audits.
This article outlines common misconfigurations in AWS that can expose cloud resources to unauthorized access. It focuses on two main issues: service exposure and access by design, highlighting specific services like Lambda, EC2, and ECR that can create vulnerabilities. Understanding these risks is essential for effective cloud security management.
This article discusses new architecture patterns for implementing zero-trust data access in AI training, applicable to both cloud and on-premises workloads. It highlights the importance of securing data access to improve AI model training while minimizing risks. The author shares insights from their experience in designing secure systems.
Manus Sandbox is a cloud-based virtual machine that runs isolated tasks for AI models. It securely stores files and executes operations without affecting local resources. Users can manage their tasks and collaborate while maintaining control over sensitive data.
This article outlines the features and capabilities of FortiGate-VM, a next-generation firewall and VPN solution for AWS environments. It highlights its integration with AWS services, automated security management, and advanced threat protection functionalities. User experiences and pricing details are also discussed.
This article introduces Azure, a cloud platform that helps businesses build intelligent applications using various tools and services. It emphasizes the platform's ability to streamline technology management and enhance innovation while ensuring security.
VoidLink is a sophisticated malware framework targeting Linux systems, designed for stealthy, long-term access in cloud environments. It features a flexible architecture with over 30 plugins, capable of adapting its behavior based on the detected environment and employing various evasion techniques. The framework is linked to Chinese-affiliated developers and shows signs of rapid evolution.
This article discusses Nudge Security's approach to managing SaaS security, emphasizing the need for visibility into software use and risks. It highlights feedback from various IT leaders who appreciate the tool's ability to streamline processes and improve security posture amid growing SaaS adoption.
HashiCorp reflects on 2025, highlighting the challenges of cloud complexity faced by organizations across various sectors. Key themes include the need for unified automation, addressing identity sprawl, and leveraging AI to enhance infrastructure management and security.
This article outlines how attackers can exploit self-hosted GitLab environments, particularly through instance runners. It details the steps to gain access, including hijacking runners and extracting sensitive information from repositories. The post also offers defensive measures to mitigate these risks.
This article discusses the risks associated with using static credentials in cloud environments and offers alternatives for managing identities securely. It emphasizes the importance of temporary credentials and modern identity solutions to reduce vulnerabilities and improve security.
Red Hat has released OpenShift 4.20, enhancing security and virtualization for hybrid cloud environments. The update focuses on supporting AI workloads, improving platform security, and providing tools for better identity management and cost efficiency. New features aim to streamline the deployment of applications and AI projects.
The Cloud Privilege Escalation Awesome Script Suite provides tools for enumerating permissions across major cloud platforms like Azure, GCP, and AWS, helping users identify potential privilege escalation pathways and sensitive information access. It includes specific modules such as AzurePEAS for Azure environments and GCPPEAS for Google Cloud, utilizing advanced techniques for thorough permission analysis without altering any resources. Users can run these tools with various authentication methods and options for enhanced enumeration.
AWS has launched three new enhanced security services to help organizations manage emerging threats in the generative AI era, introduced at the AWS re:Inforce conference. Notable features include AWS Security Hub for centralized threat management, AWS Shield for proactive network security, and Amazon GuardDuty's Extended Threat Detection for container-based applications. These tools aim to simplify security management and enhance protection for cloud environments.
AWS Identity and Access Management (IAM) Roles Anywhere allows external workloads to authenticate to AWS using digital certificates, enhancing security by eliminating the need for long-term credentials. However, organizations must carefully configure access permissions to avoid vulnerabilities, as the default settings can be overly permissive, potentially exposing cloud environments to risks. Implementing additional restrictions and adhering to the principle of least privilege is crucial for secure deployment.
Google Cloud is enhancing its commitment to federal compliance through the innovative FedRAMP 20x pilot program, which streamlines the authorization process by automating compliance management with the new Compliance Manager tool. This approach aims to reduce the time and resources needed for federal agencies to achieve FedRAMP authorization, facilitating faster access to secure cloud technologies. Additionally, independent validation from Coalfire supports the effectiveness of this automated path for agencies.
Confluent Platform 8.0 introduces significant enhancements aimed at improving data streaming capabilities, including improved performance, enhanced security features, and expanded compatibility with cloud environments. The update focuses on making it easier for organizations to manage and scale their data-driven applications.
Strengthening cloud security requires more than just IAM Allow policies; implementing IAM Deny policies allows organizations to explicitly restrict actions that principals can take, enhancing overall security. By defining clear restrictions and utilizing complementary tools, IAM Deny helps prevent unauthorized access and misconfigurations in Google Cloud environments.
NetFoundry offers a universal zero trust networking solution that simplifies secure connections across various environments, including IT, OT, IoT, and AI. With built-in identity management and end-to-end encryption, it eliminates traditional VPNs and enhances security for cloud, hybrid, and on-premises deployments. The platform supports a range of devices and is designed for high reliability and compliance with various regulations.
The article discusses the implications of a leak involving Azure Active Directory client secrets, highlighting the potential security risks and the importance of securing cloud applications. It emphasizes best practices for managing client secrets to prevent unauthorized access and data breaches in cloud environments.
The SASE Expert, Level 1 course offers the only path to obtaining SASE Certification, targeting IT professionals, network administrators, and security architects. With a commitment of 2-3 hours, participants will learn about SASE fundamentals and its importance in modern network security. Achieving certification not only validates expertise but also aligns with industry trends predicting significant SASE adoption by enterprises.
Amazon Q now features AI-powered self-destruct capabilities, allowing users to enhance security by automatically deleting sensitive data after a specified time. This innovation aims to streamline data management while ensuring compliance with privacy regulations. The integration of helpful AI tools further positions Amazon Q as a leader in cloud solutions.
findmytakeover is a tool designed to detect dangling DNS records in multi-cloud environments, identifying potential subdomain takeovers by scanning DNS zones and cloud infrastructures. It requires specific permissions depending on the cloud provider and offers a configuration file for setup, though it does not guarantee complete protection against all types of subdomain vulnerabilities. Contributions to the project are encouraged.
Woodpecker is a modular red teaming tool designed for identifying security vulnerabilities in AI and cloud applications through experimentation. It features a command-line interface that allows users to run and verify experiments, as well as manage components that enhance experiment functionality. Users can customize experiments using specific YAML files and can install or uninstall additional components as needed.
Uber has developed a centralized Multi-Cloud Secrets Management Platform to address the challenges of secrets sprawl and enhance security across its extensive microservices architecture. By consolidating secret vaults and implementing automated scanning and remediation strategies, Uber aims to prevent credential leaks while ensuring efficient secret management and governance across multiple cloud environments.
MCPTotal has launched a new platform aimed at enhancing secure enterprise MCP (Managed Cloud Platform) workflows. This initiative is designed to streamline operations while ensuring robust security measures are integrated into the process, catering to the needs of organizations seeking efficiency and protection in their cloud operations.
The blog post discusses the concept of AWS honey tokens, which are deceptive tools used to detect unauthorized access or data breaches. It evaluates their effectiveness, potential drawbacks, and the best practices for implementation in cloud security strategies. The article emphasizes the importance of maintaining vigilance against insider threats and the usefulness of honey tokens in identifying vulnerabilities.
The research conducted on AWS ARN formats reveals a comprehensive list of 1,929 different ARNs supported by AWS IAM, highlighting discrepancies with AWS's Policy Generator which only supports 397 ARNs. The findings include details on unique ARNs, the absence of Account IDs in certain cases, and guidance on crafting IAM policies for least privilege security.
Cato Networks has been recognized as a Leader in the 2025 Gartner Magic Quadrant for SASE Platforms, highlighting its commitment to delivering a reliable and innovative SASE solution that meets the needs of IT teams. The company's SASE Cloud Platform aims to enhance security, performance, and customer experience for enterprises worldwide.