AwsSecDigest Profile Banner
AWS Security Digest Profile
AWS Security Digest

@AwsSecDigest

Followers
1K
Following
51
Media
236
Statuses
590

📥 Stay Up-to-Date on the latest AWS Security News with our Weekly Digest.

💌 👉🏻
Joined March 2022
Don't wanna be here? Send us removal request.
@AwsSecDigest
AWS Security Digest
13 hours
🛎️ AWS Security Digest 235 is out! 1️⃣ Weaponizing the AWS CLI for Persistence by Hector Ruiz Ruiz 2️⃣ CloudFormation change set privilege escalation by Lucian Patian 3️⃣ Hacking India’s largest automaker: Tata Motors by Eaton Zveare https://t.co/yox23IPTeP
0
0
1
@AwsSecDigest
AWS Security Digest
2 days
Setting Up a Cloud Security Roadmap for Your Startup By: Chandrapal Badshah Startups often sprint to ship product—but what about securing the cloud infrastructure that powers it? Chandrapal Badshah delivers a clear, phased roadmap that helps founders and engineering leads build
0
2
6
@AwsSecDigest
AWS Security Digest
3 days
CloudFront Prefix List Bypass 🔍 Federico Lucini Federico Lucini breaks down a subtle but impactful misconfiguration scenario affecting AWS CloudFront that can silently weaken your network perimeter controls. His research revisits CDN-based allowlisting and shows how trusting
0
0
1
@AwsSecDigest
AWS Security Digest
4 days
Journey for Writing a Second Edition of My Book: Cloud Security Handbook ✍️ Eyal Estrin Writing a technical book isn’t just about content—it’s about staying relevant in a fast-moving ecosystem. Eyal Estrin walks through what it really takes to update a cloud security book in
1
4
9
@AwsSecDigest
AWS Security Digest
5 days
Using the AWS CLI and Securing CloudShell ✍️ Rich Mogull If you're using AWS CloudShell, are you sure it's secure? Rich Mogull breaks down the often-overlooked security nuances of AWS CloudShell—AWS's browser-based command-line environment—and how to harden it for real-world
0
2
3
@AwsSecDigest
AWS Security Digest
6 days
Cloudy with a Chance of Hijacking: Forgotten DNS Records Enable Scam Actor By Jacques Portal & Renée Burton Over 1,000 hijacked subdomains. One persistent threat actor. Zero alerts from the original owners. Jacques Portal and Renée Burton uncover how a malicious campaign
0
1
6
@AwsSecDigest
AWS Security Digest
8 days
🛎️ AWS Security Digest 234 is out! 1️⃣ The Silent Attackers: Exploiting VPC Endpoints to Expose AWS Accounts of S3 Buckets Without a Trace by Maya Parizer 2️⃣ Bedrock'n'role: Annoying trust relationships in Bedrock service roles by Daniel Grzelak 3️⃣ Datadog threat roundup: Top
0
1
7
@AwsSecDigest
AWS Security Digest
9 days
Cloud Pentesting or Just Scanning? Let’s Talk. ✍️ Sena Yakut Is your “cloud pentest” really just a glorified vulnerability scan? Sena Yakut breaks down the critical difference between manual cloud penetration testing and automated scanners—and why it matters. 🔍 Scanners can
0
0
9
@AwsSecDigest
AWS Security Digest
10 days
Building Uber’s Multi-Cloud Secrets Management Platform to Enhance Security By: Matt Mathew, Ludi Li, Chen Xi, Yiting Fan Managing secrets across AWS, GCP, and on-prem is no small feat—Uber’s Security Engineering team shares how they tackled it by building a scalable,
0
2
4
@AwsSecDigest
AWS Security Digest
11 days
Tales from the Cloud Trenches: The Attacker doth persist too much, methinks By Martin McCloskey How do you respond when an attacker just won’t go away? This detailed incident analysis from Datadog Security Labs exposes a persistent threat actor who repeatedly regained access to
0
0
3
@AwsSecDigest
AWS Security Digest
12 days
China-Nexus APTs Exploit SAP Flaw to Target Critical Infrastructure By Arda Büyükkaya Chinese nation-state actors are actively exploiting a newly disclosed SAP NetWeaver vulnerability (CVE-2025-31324) to infiltrate high-value critical infrastructure networks—and they’re using
0
0
2
@AwsSecDigest
AWS Security Digest
13 days
🧞 CloudTrail wish: almost granted By Aidan Steele You asked AWS for more control over CloudTrail visibility. They delivered—almost. Aidan Steele dives into the newly introduced includeManagementEvents filter for CloudTrail Lake—and why it’s a big step, but not the complete fix
0
2
2
@AwsSecDigest
AWS Security Digest
15 days
🛎️ AWS Security Digest 233 is out! 1️⃣ My AWS Account Got Hacked - Here Is What Happened by Zvi Wexlstein 2️⃣ ECS on EC2: Covering Gaps in IMDS Hardening by Latacora 3️⃣ Querying Terraform state with AWS Athena by Aidan Steele https://t.co/ky4fBgpldi
3
1
6
@AwsSecDigest
AWS Security Digest
16 days
🛡️ Cloud Incident Readiness: Critical Infrastructure for Cloud Incident Response By Invictus Incident Response Is your cloud environment actually ready for incident response—or just hoping for the best? This article breaks down the often-overlooked foundational steps that
0
4
11
@AwsSecDigest
AWS Security Digest
17 days
🎯 Amazon S3 Bucket Name Squatting By Costas Kourmpoglou What happens when AWS customers delete S3 buckets without considering name reuse? Costas Kourmpoglou dives into S3 bucket name squatting—a subtle but potent threat vector that can lead to data leaks, broken apps, and even
0
4
11
@AwsSecDigest
AWS Security Digest
18 days
🔒 EKS vs. GKE — Security By Jason Umiker How do Amazon EKS and Google GKE really compare on security? Jason Umiker offers a no-nonsense, side-by-side breakdown of key security features, gaps, and usability tradeoffs between the two managed Kubernetes platforms. 📌 Highlights
0
0
4
@AwsSecDigest
AWS Security Digest
19 days
🔐 PEP and PDP for Secure Authorization with AVP and ABAC By Jimmy Dahlqvist How do you securely manage fine-grained access control in modern cloud-native systems? Jimmy Dahlqvist breaks down how to implement robust authorization using Policy Enforcement Points (PEP) and Policy
0
1
5
@AwsSecDigest
AWS Security Digest
20 days
🔍 What Analyzing Hundreds of Thousands of Cloud Environments Taught Us About Data Exposure By Wiz Research Team Wiz analyzed over 200,000 cloud environments—and the findings are eye-opening. The team reveals just how often sensitive data is left exposed and how attackers can
0
3
8
@AwsSecDigest
AWS Security Digest
22 days
🛎️ AWS Security Digest 232 is out! 1️⃣ Ransomware protection with immutable AWS Backup - it's complicated ... by Paul Schwarzenberger & Kurtis Mash 2️⃣ Mistrusted Advisor: When AWS Tooling Leaves Public S3 Buckets Undetected by Jason Kao 3️⃣ Sweet Deception: Mastering AWS Honey
0
0
2
@AwsSecDigest
AWS Security Digest
23 days
🕵️ Shadow Roles: AWS Defaults Can Open the Door to Service Takeover By Yakir Kadkoda & Ofek Itach What happens when default IAM configurations collide with poorly scoped service roles? You get “Shadow Roles”—a subtle but dangerous path to AWS service takeover. This AquaSec deep
0
2
4