Tag: Cloud Provider
-
How to visualize Amazon GuardDuty findings: serverless edition
Note: This blog provides an alternate solution to Visualizing Amazon GuardDuty Findings, in which the authors describe how to build an …
-
Tips for Patching CVE-2019-5736
CVE-2019-5736 is a recently disclosed serious vulnerability affecting RunC (the default container runtime for Docker), ContainerD, Podman, …
-
Attacking Containers and runC
This week a new vulnerability was published (CVE-2019-5736) that highlights everything bad and good about containers. Simply put, this …
-
AWS Issues Alert for Multiple Container Systems
A security issue that affects several open source container management systems, including Amazon Linux and Amazon Elastic Container …
-
2018 C5 attestation is now available
AWS has completed its 2018 assessment against the Cloud Computing Compliance Controls Catalog (C5) information security and compliance …
-
2018 C5 accreditation is now available
AWS has completed its 2018 assessment against the Cloud Computing Compliance Controls Catalog (C5) information security and compliance …
-
Amazon EKS Authentication and Authorization Process
Containers are one of the most important concepts in cloud computing. In fact, they have completely reshaped the way that many of us think …
-
Photos from gay dating app Jack’d exposed via misconfigured AWS instance
In yet another case of cloud storage misconfiguration, private pictures shared by users of gay dating app Jack’d have been found exposed …
-
Indecent disclosure: Gay dating app left “private” images, data exposed to web
Girolamo promised to share details about the situation by phone, but he then missed the interview call and went silent again—failing to …
-
Google doubles down on its Asylo confidential computing framework
Last May, Google introduced Asylo, an open source framework for confidential computing, a technique favored by many of the big cloud …
-
Guidelines for protecting your AWS account while using programmatic access
One of the most important things you can do as a customer to ensure the security of your resources is to maintain careful control over who …
-
New cryptocurrency malware SpeakUp hits Linux & Mac devices
SpeakUp is a new backdoor Trojan that is being distributed by cybercriminals through a malicious new campaign designed to target servers …
●●●