HackDig : Dig high-quality web security articles for hackers

Amazon Web Services Mitigated a 2.3 Tbps DDoS Attack

Amazon Web Services (AWS) said that it mitigated a distributed denial-of-service (DDoS) attack with a volume of 2.3 Tbps.In its “Threat Landscape Report – Q1 2020,” AWS Shield revealed that its team members had spent several days responding to this particular network volumetric DDoS attack.In Q1 2020, a known UDP reflection vector, CLDAP reflecti
Publish At:2020-06-18 08:14 | Read:261 | Comments:0 | Tags:IT Security and Data Protection Latest Security News AWS DDo

Using AWS Session Manager with Enhanced SSH and SCP Capability

Last year, Amazon Web Services announced new capabilities in the AWS Systems Manager Session Manager. Users are now capable of tunneling SSH (Secure Shell) and SCP (Secure Copy) connections directly from a local client without the need for the AWS management console.For years, users have relied on firewalls and bastion hosts in order to securely access cloud
Publish At:2020-06-08 06:25 | Read:199 | Comments:0 | Tags:Cloud Amazon Web Services AWS scp SSH

Improving the Prometheus exporter for Amazon CloudWatch

A Prometheus CloudWatch exporter is a key element for anyone wanting to monitor AWS CloudWatch. Exporting CloudWatch metrics to a Prometheus server allows leveraging of the power of PromQL queries, integrating AWS metrics with those from other applications or cloud providers, and creating advanced dashboards for digging down into problems. But, who wa
Publish At:2020-05-24 09:25 | Read:254 | Comments:0 | Tags:AWS Falco falco Monitoring PromCat Prometheus Sysdig Monitor

Falco Support on AWS Fargate

Today we’re very excited to announce a partnership with Amazon to support Fargate in Sysdig’s product line. We are also announcing that Falco, the world’s most popular runtime security tool for containers, will soon be able to work on Fargate. This is an important milestone. For the first time, Fargate users will enjoy the benefit of deep instrumentation.
Publish At:2020-04-08 18:40 | Read:610 | Comments:0 | Tags:AWS Falco falco

TROOPERS20 Training Teaser: Attack And Defence In AWS: Chaining Vulnerabilities To Go Beyond The OWASP Top 10

Attackers are everywhere. They are now on the cloud too! Attacking the most popular cloud provider – AWS, requires the knowledge of how different services are setup, what defences do we need to bypass, what service attributes can be abused, where can information be leaked, how do I escalate privileges, what about monitoring solutions that may be presen
Publish At:2020-02-27 17:57 | Read:559 | Comments:0 | Tags:Events AWS TROOPERS TROOPERS20

Business in the front, party in the back: backdoors in elastic servers expose private data

It seems like every day we read another article about a data breach or leak of cloud storage exposing millions of users’ data. The unfortunate truth is that the majority of these leaks require no actual “hacking” on the part of the attacker. Most of the time, this highly confidential data is just sitting in open databases, ripe for the
Publish At:2020-01-17 16:50 | Read:896 | Comments:0 | Tags:Threat spotlight aws AWS buckets cloud database cloud databa

Inline Image Scanning for AWS CodePipeline and AWS CodeBuild

In this blog post you’ll learn how to set up image vulnerability scanning for AWS CodePipeline and AWS CodeBuild using Sysdig Secure DevOps Platform. AWS provides several tools for DevOps teams: CodeCommit for version control, CodeBuild for building and testing code, and CodeDeploy for automatic code deployment. The block on top of all these tools is
Publish At:2019-11-26 11:50 | Read:1091 | Comments:0 | Tags:Uncategorized AWS Kubernetes Sysdig Secure

Multi-cluster security with Falco and AWS Firelens on EKS & ECS

In this blog post, we are going to teach you how to aggregate all Kubernetes security events across your AWS container services. We’ll be using AWS FireLens to route Falco notifications, centralizing all the security events, such as AWS CloudWatch, in one service. We will: Aggregate events from any AWS container platform (EKS, ECS, Kubernet
Publish At:2019-11-11 23:50 | Read:815 | Comments:0 | Tags:Falco AWS falco Kubernetes Openshift

Hacking with AWS: incorporating leaky buckets into your OSINT workflow

Penetration testing is often conducted by security researchers to help organizations identify holes in their security and fix them, before cybercriminals have the chance. While there’s no malicious intent for the researcher, part of his job is to think and act like a cybercriminal would when hacking, or attempting to breach, an enterprise network. T
Publish At:2019-09-20 11:20 | Read:1673 | Comments:0 | Tags:Researcher's corner amazon aws AWS buckets data hacking Inte

Hotel booking service Groupize allegedly exposed sensitive data contained in unsecured AWS storage bucket

Security researchers discovered that hotel booking service Groupize allegedly exposed sensitive data contained in unsecured AWS storage bucket Security experts continue to discover unsecured AWS storage bucket leaking sensitive data. Last discovery in order of time is an AWS storage related to the hotel booking service Groupize, it was discovered by Kromtech
Publish At:2017-08-23 05:05 | Read:4285 | Comments:0 | Tags:Breaking News Data Breach Amazon AWS data leak Groupize Maci

Datadog Resets Passwords Following Unauthorized Server Activity

SaaS-based monitoring and analytics platform Datadog has reset all stored passwords following unauthorized activity on some infrastructure servers.Chief Security Officer Andrew Becherer opened up to users about the incident over the weekend:“Last night we sent email notifications regarding a security incident that took place within our server infrastru
Publish At:2016-07-12 10:30 | Read:5530 | Comments:0 | Tags:Latest Security News AWS bcrypt Datadog password

eero: A Mesh WiFi Router Built for Security

User-friendly and secure. Hardly anyone would pick either word to describe the vast majority of wireless routers in use today. So naturally I was intrigued a year ago when I had the chance to pre-order a eero, a new WiFi system billed as easy-to-use, designed with security in mind, and able to dramatically extend the range of a wireless network without compr
Publish At:2016-03-11 07:20 | Read:5048 | Comments:0 | Tags:A Little Sunshine Security Tools Amazon AWS eero mesh wirele

Storing secret crypto keys in the Amazon cloud? New attack can steal them

Piercing a key selling point of commercial cloud computing services, computer scientists have devised a hack that allows an attacker using Amazon's EC2 platform to steal the secret cryptographic keys of other users.The proof-of-concept attack is significant because Amazon Web Services and many other cloud service providers already blocked a previous key-reco
Publish At:2015-09-29 05:15 | Read:3706 | Comments:0 | Tags:Risk Assessment Technology Lab Amazon AWS cloud cryptography

Understanding the VENOM Vulnerability

  Jason Geffner, a security researcher at Crowdstrike, has released information about a new, unchecked buffer vulnerability called VENOM affecting the open source QEMU virtualization platform which provides virtualization capabilities similar to VMWare or Microsoft’s Hyper-V. The initial reports indicate this is a serious vulnerability, and while the v
Publish At:2015-06-09 16:15 | Read:6172 | Comments:0 | Tags:Application Security Cyber Security Security Updates 0xicf A

Federating the AWS CLI

Modern organizations that depend on SaaS have been increasingly adopting Identity Providers or single sign-ons (SSOs) in order to federate authentication back to home directory services. Most SSOs support SAML or OAuth, and a growing number of SaaS companies are jumping on board to eliminate the liability of storing customer password hashes.Although an SSO-i
Publish At:2015-04-17 17:25 | Read:5404 | Comments:0 | Tags:Featured Articles Risk Management 2FA AWS bsides security


Share high-quality web security related articles with you:)