Tips + a Burp extension for finding access control issues, tools and reflections on supply chain security, an architecture for multi-account security logging in AWS.
Tips and best practices for securing your CI/CD pipeline, Electron tooling and dangerous APIs, what to focus on instead of virality to grow your userbase.
[tl;dr sec] #70 - Scaling Threat Modeling, Dependency Confusion
Valuable cloud security scenarios to think through, leveraging the Handlebars templating engine for local file read or RCE, check your GKE cluster against CIS.
How AWS secures Lambda, Daniel Miessler's overview of @TomNomNom's recon tools, how to demonstrate high impact when you can't see the SSRF response.
[tl;dr sec] #67 - Infra as Code, Cloud Auto-remediation
A tool to create IaC from an existing AWS environment, container defense-in-depth with user namespaces, rewriting things in Rust.
Scott Piper shares how he'd attack AWS, a survey of infra as code scanning tools, free workshop on server-side template injection.
Techniques for initital access, recon, lateral movement, and exfil of AWS accounts, along with defensive mitigations
[tl;dr sec] #64 - Kubernetes Guide, XSS for PDFs
New OWASP security testing guide and GraphQL cheat sheet, new fuzzing research, and a tool to ease administration of complex AWS environments.
A tool to sneakily enumerate all IAM users and roles in a target AWS account, recent events in AI, and how to attack server-side renderers.