The Deputy Is Confused About AWS Security Hub |
|
|
|
38TB of data accidentally exposed by Microsoft AI researchers |
|
|
|
Hijacking Someone Else’s DCSync |
|
|
|
SAMLjacking a poisoned tenant |
|
|
|
What the Function: Decrypting Azure Function App Keys |
|
|
|
No keys attached: Exploring GitHub-to-AWS keyless authentication flaws |
|
|
|
Hijacking Cloud CI/CD Systems for Fun and Profit |
|
|
|
Bad.Build: A Critical Privilege Escalation Design Flaw in Google Cloud Build Enables a Supply Chain Attack |
|
|
|
Absuing Amazon VPC CNI Plugin For Kubernetes |
|
|
|
AWS CodeBuild + S3 == Privilege Escalation |
|
|
|
Sometimes What Sounds Benign Can Bite You: An Unexpected Implication of Lambda Privileges |
|
|
|
How Abusing AWS CloudFormation Led to a Total Takeover of an AWS Environment |
|
|
|
Gaps in Azure Service Fabric’s Security Call for User Vigilance |
|
|
|
Spotted: How we discovered Privilege Escalation, missing CloudTrail data and a race condition in AWS Directory Service |
|
|
|
GCP CloudSQL Vulnerability Leads to Internal Container Access and Data Exposure |
|
|
|
Unintended Path to Exam Domination - AWS EC2 Meta-Data |
|
|
|
Tampering with Conditional Access Policies Using Azure AD Graph API |
|
|
|
From GitHub To Account Takeover: Misconfigured Actions Place GCP & AWS Accounts At Risk |
|
|
|
When Good APIs Go Bad: Uncovering 3 Azure API Management Vulnerabilities |
|
|
|
Exploiting misconfigured Google Cloud Service Accounts from GitHub Actions |
|
|
|
Securing Databricks cluster init scripts |
|
|
|
AWS Identity Center (formerly known as AWS SSO): A Guide to Privilege Escalation and Identity and Access Management |
|
|
|
GhostToken – Exploiting GCP application infrastructure to create invisible, unremovable trojan app on Google accounts |
|
|
|
#BrokenSesame: Accidental ‘write’ permissions to private registry allowed potential RCE to Alibaba Cloud Database Services |
|
|
|
From listKeys to Glory: How We Achieved a Subscription Privilege Escalation and RCE by Abusing Azure Storage Account Keys |
|
|
|