The Gratitude Challenge’s twenty-eighth topic is “Technology”. Oh yeah, technology. One person’s love, another person’s nightmare. Bringing us closer together … More Gratitude Challenge – #28 Technology
Edit 09/04/2021: Clarified installation instructions by adding explanation on how to install the YAML module. Edit 13/03/2021: Corrected reference for … More Script to check VirusTotal for many files and folders
Imagine one of your contractors usually does not need access to your AWS S3 buckets (or only access to buckets … More Use AWS Security Token Service (STS) to let low-privileged user temporarily assume privileged role in other account
An “interesting” part when working with APIs or runtime environments like containers is of course credential management. Somehow you have … More “Stealing the environment” – Insecure password injection in scripts and containers via environment variables
A network engineer recently asked me why VLAN hopping via a double tagging attack is considered dangerous – after all, … More Making a unidirectional double tagging VLAN hopping attack bidirectional
Yes, cloud computing is not a new thing. Yes, it has been written many times before if the cloud is … More Is “the cloud” secure?
In one of my last posts, I wrote about attribution in cybersecurity, i.e. ways to find out who was behind … More Finding & Attributing Malicious Command & Control Servers
I recently had a look at the security assessments of different well-known cloud providers and found some interesting discrepancies. It … More Differences in cloud security (Alibaba, Amazon, Google, IBM, Microsoft)
While we are getting used to hearing news on a daily basis about hacking attacks, much less do we read … More Who the hæck?Attribution in cybersecurity
As I wrote in my last post on lateral movement, using AppLocker or Software Restriction Policies (SRPs) to avoid the … More SRPs block malware, but what if things stop working?