Run detections and view dashboards for your AWS CloudTrail logs to monitor and analyze activity across your AWS accounts using Powerpipe and Tailpipe.
JavaGhost exploits AWS misconfigurations to run phishing campaigns via SES and WorkMail, evading email protections ...
Some examples include: Configuring Amazon Glacier to notify you when a retrieval job is complete. Configuring AWS CloudTrail to notify you when a new log file has been written. Configuring Amazon ...
Misconfigured Amazon Web Services (AWS) environments are being abused to run phishing campaigns that can bypass email filters ...
Threat actors seen abusing AWS misconfigurations to gain access ... techniques that attempt to obfuscate identities in the CloudTrail logs. This tactic has historically been exploited by Scattered ...
After years of building software systems, one thing has become clear to me: Infrastructure can be both your foundation and ...