CloudSec Wine (@cloud_sec) is a Telegram channel focused on cloud security. It covers the latest news, discussions, and tutorials about AWS, Azure, and GCP. The channel is managed by @AMark0f and @dvyakimov, with additional contributions from @sec_devops. It provides a platform for cloud security professionals to stay informed about the latest threats, best practices, and emerging trends in cloud security.
cloud security professionals
news, discussion, tutorials
daily news, active 24/7 discussion
neutral
Думаю в первую очередь стоит поделиться презентацией с Zeronights Web Village 2019 о AWS секьюрити. Особено рекомендую заглянуть в конец презентации в секцию ссылок на полезные материалы, чуть позже н…
🔸The Ten Riskiest AWS Misconfigurations #aws
🔸Retrieving AWS security credentials from the AWS console How to retrieve AWS security credentials (AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY and AWS_SESSION_TOKEN) when authenticated in the AWS Cons…
No reviews yet
Be the first to share your experience with this channel.
| Day | Week | Month | Year | All time | |
|---|---|---|---|---|---|
| Subscribers | — | — | — | — | #23771of 39.7K |
| Mentions | — | — | — | — | #1426of 16.9K |
🔶 Introducing account regional namespaces for Amazon S3 general purpose bucket AWS launches a new feature of Amazon S3 that lets you create general purpose buckets in your own account regional names…
🔶 Behind the console: Active phishing campaign targeting AWS console credentials Datadog Security Research identified an active adversary-in-the-middle (AiTM) phishing campaign targeting AWS Console…
🔶 Bucketsquatting is (Finally) Dead AWS introduced account-regional namespaces for S3 (<prefix> - <accountid> - <region> - an) to eliminate bucketsquatting, where attackers claim deleted bucket name…
🤖 How AI Agents Automate CVE Vulnerability Research A technical deep-dive into Praetorian's multi-agent CVE research pipeline, exploring how orchestrated AI agents transform vulnerability data into…
🤖 The Reach Pattern The "Reach" pattern is a personal CLI that hijacks existing browser sessions to query SaaS APIs (Slack, Jira, Confluence, etc.) on your behalf, feeding structured organizational…