#cloud_security 検索結果

I’m happy to share that I’ve obtained a new certification: Advent of Cyber 2024 from @RealTryHackMe! #ctf #soc #cloud_security #dfir #thm

sakibulalikhan's tweet image. I’m happy to share that I’ve obtained a new certification: Advent of Cyber 2024 from @RealTryHackMe! 

#ctf #soc #cloud_security #dfir #thm

#Cloud_Security 1. One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens (CVE-2025-55241) dirkjanm.io/obtaining-glob… 2. AWS Infrastructure Canarytoken blog.thinkst.com/2025/09/introd… // new feature allowing quick deployment of decoy AWS resources (S3,…


#Cloud_Security 1. Decoding UserAuthenticationMethod in Microsoft 365 audit logs: the bitfield mapping blog.sekoia.io/userauthentica… // The "UserAuthenticationMethod" in MS 365 logs is an undocumented bitfield representing primary authentication methods, decoded through community…


#tools #Cloud_Security "ORCA: Unveiling Obscure Containers In The Wild", 2025. ]-> Container image scanning tool - github.com/kube-security/… // Obscuration-Resilient Container Analyzer


#Cloud_Security 1. ModeLeak: Privilege Escalation to LLM Model Exfiltration in Vertex AI unit42.paloaltonetworks.com/privilege-esca… 2. Dirty DAG: New Vulnerabilities in Azure Data Factory’s Apache Airflow Integration unit42.paloaltonetworks.com/azure-data-fac… ]-> Automation and Hardening of Kubernetes Cluster -…


Being in the cloud doesn’t mean you’re automatically secure ⛔️   Cloud security is a shared responsibility, and the right partner ensures protection is part of the design, not an afterthought.   With the right partner, #cloud_security becomes built-in not bolted on 🤝🏼 #NourNet

NourNetICT's tweet image. Being in the cloud doesn’t mean you’re automatically secure ⛔️
 
Cloud security is a shared responsibility, and the right partner ensures protection is part of the design, not an afterthought.
 
With the right partner, #cloud_security becomes built-in not bolted on 🤝🏼

#NourNet

#Cloud_Security Demand Drives Better #Cyber-Firm #Valuations — and Deals vapt.me/CloudValue

omvapt's tweet image. #Cloud_Security Demand Drives Better #Cyber-Firm #Valuations — and Deals
vapt.me/CloudValue

#Cloud_Security #Offensive_security 1. Escalating to Entra ID's Global Admin with a first-party app securitylabs.datadoghq.com/articles/i-spy… 2. Abusing Default Machine Joining to Domain Permissions to Attack AWS Managed Active Directory permiso.io/blog/abusing-d…


#Cloud_Security 1. Decoding UserAuthenticationMethod in Microsoft 365 audit logs: the bitfield mapping blog.sekoia.io/userauthentica… // The "UserAuthenticationMethod" in MS 365 logs is an undocumented bitfield representing primary authentication methods, decoded through community…


The future of #cloud_security will be shaped by advances in #artificial_intelligence (AI) and #machine_learning (ML), which will help organizations detect and respond to #threats more quickly and efficiently. telecomreviewafrica.com/articles/featu…

TelecomReviewAF's tweet image. The future of #cloud_security will be shaped by advances in #artificial_intelligence (AI) and #machine_learning (ML), which will help organizations detect and respond to #threats more quickly and efficiently.

telecomreviewafrica.com/articles/featu…

#tools #Cloud_Security 1. Am I Isolated - security posture benchmarking tool for container environment github.com/edera-dev/am-i… 2. ScoutSuite - Multi-Cloud Security Auditing Tool (AWS/Azure/GCP/Aliyun/OCI) github.com/nccgroup/Scout… 3. Halberd - Multi-Cloud Security Testing Tool…


#Tech_book #Cloud_Security "Spring Security: Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures", 4th Edition, 2024. ]-> Code: github.com/PacktPublishin…


#Cloud_Security 1. Decoding UserAuthenticationMethod in Microsoft 365 audit logs: the bitfield mapping blog.sekoia.io/userauthentica… // The "UserAuthenticationMethod" in MS 365 logs is an undocumented bitfield representing primary authentication methods, decoded through community…


#Cloud_Security #Threat_Research #Blue_Team_Techniques "Learning to Triage Taint Flows Reported by Dynamic Program Analysis in Node.js Packages", 2025. ]-> Tool and Dataset - zenodo.org/records/167582… // Program analysis tools often produce large volumes of candidate vulnerability…


#Cloud_Security 1. Decoding UserAuthenticationMethod in Microsoft 365 audit logs: the bitfield mapping blog.sekoia.io/userauthentica… // The "UserAuthenticationMethod" in MS 365 logs is an undocumented bitfield representing primary authentication methods, decoded through community…


#Cloud_Security 1. One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens (CVE-2025-55241) dirkjanm.io/obtaining-glob… 2. AWS Infrastructure Canarytoken blog.thinkst.com/2025/09/introd… // new feature allowing quick deployment of decoy AWS resources (S3,…


#tools #Cloud_Security "ORCA: Unveiling Obscure Containers In The Wild", 2025. ]-> Container image scanning tool - github.com/kube-security/… // Obscuration-Resilient Container Analyzer


Being in the cloud doesn’t mean you’re automatically secure ⛔️   Cloud security is a shared responsibility, and the right partner ensures protection is part of the design, not an afterthought.   With the right partner, #cloud_security becomes built-in not bolted on 🤝🏼 #NourNet

NourNetICT's tweet image. Being in the cloud doesn’t mean you’re automatically secure ⛔️
 
Cloud security is a shared responsibility, and the right partner ensures protection is part of the design, not an afterthought.
 
With the right partner, #cloud_security becomes built-in not bolted on 🤝🏼

#NourNet

#Tech_book #Cloud_Security #Blue_Team_Techniques "Ultimate Splunk for Cybersecurity", ]-> Repo - github.com/ava-orange-edu… // Practical Strategies for SIEM Using Splunk’s Enterprise Security for Threat Detection, Forensic Investigation, and Cloud Security


#Cloud_Security #Offensive_security 1. Escalating to Entra ID's Global Admin with a first-party app securitylabs.datadoghq.com/articles/i-spy… 2. Abusing Default Machine Joining to Domain Permissions to Attack AWS Managed Active Directory permiso.io/blog/abusing-d…


#AppSec #Cloud_Security 1. Attacking JWT using X.509 Certificates trustedsec.com/blog/attacking… 2. Code execution from web browser using URL schemes handled by KDE's KTelnetService and Konsole (CVE-2025-49091) proofnet.de/publikationen/… 3. A vulnerability in Real User Monitoring feature…


#Cloud_Security #Offensive_security Initial Access Attack in Azure - Understanding and Executing the Illicit Consent Grant Attack in 2025 alteredsecurity.com/post/initial-a… ]-> 365-Stealer - Phishing Simualtion Tool - github.com/AlteredSecurit… ]-> Detect and Remediate Illicit Consent Grants -…


#MLSecOps #Whitepaper #Cloud_Security "Agentic AI Red Teaming Guide", CSA, 2025. ]-> A Dynamic Environment to Evaluate Prompt Injection Attacks and Defenses for LLM Agents - arxiv.org/pdf/2406.13352 ]-> Repo - github.com/ethz-spylab/ag… ]-> A Standardized Evaluation Framework…


#tools #Research #Cloud_Security "Quantifying Azure RBAC Wildcard Overreach", 2025. ]-> CLI tool for analyzing Azure RBAC actions - github.com/labyrinthinese… ]-> An Azure SPN access minimizer - github.com/labyrinthinese…


The impact of the outage can range from minor disruptions to complete service unavailability, affecting businesses and users worldwide. Google's engineers were actively working on full recovery, but no specific timeline was provided. 🤝 #cloud_security


#Tech_book #Cloud_Security "Spring Security: Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures", 4th Edition, 2024. ]-> Code: github.com/PacktPublishin…


The future of #cloud_security will be shaped by advances in #artificial_intelligence (AI) and #machine_learning (ML), which will help organizations detect and respond to #threats more quickly and efficiently. telecomreviewafrica.com/articles/featu…

TelecomReviewAF's tweet image. The future of #cloud_security will be shaped by advances in #artificial_intelligence (AI) and #machine_learning (ML), which will help organizations detect and respond to #threats more quickly and efficiently.

telecomreviewafrica.com/articles/featu…

Eight #Cloud_Security Best Practice Fundamentals for #Microsoft #Azure vapt.me/Azure-Sec

omvapt's tweet image. Eight #Cloud_Security Best Practice Fundamentals for #Microsoft #Azure 
vapt.me/Azure-Sec

تمتع بأفضل الخدمات و #الحلول_السحابية الأكثر أماناً في المملكة! للمزيد 👈 cloud.sahara.com #cloud_security #cloud

SaharaNet's tweet image. تمتع بأفضل الخدمات و #الحلول_السحابية الأكثر أماناً في المملكة! 
للمزيد 👈 cloud.sahara.com

#cloud_security
#cloud

Enjoy the most secure #cloud services and solutions in KSA! Learn more 👉 cloud.sahara.com #cloud_security

SaharaNet's tweet image. Enjoy the most secure #cloud services and solutions in KSA! 
Learn more 👉 cloud.sahara.com 

#cloud_security

فيصل اليوسف، مدير أمن المعلومات في صحارى نت يصعد الآن للتحدث حول أهمية Cloud Cyber Security! #GO_CLOUD_2 #cloud_security #الحوسبة_السحابية

SaharaNet's tweet image. فيصل اليوسف، مدير أمن المعلومات في صحارى نت يصعد الآن للتحدث حول أهمية Cloud Cyber Security!

#GO_CLOUD_2
#cloud_security
#الحوسبة_السحابية
SaharaNet's tweet image. فيصل اليوسف، مدير أمن المعلومات في صحارى نت يصعد الآن للتحدث حول أهمية Cloud Cyber Security!

#GO_CLOUD_2
#cloud_security
#الحوسبة_السحابية

Faisal Al-Yousef, Cyber Security Manager at Sahara Net talking now about Cloud Cyber Security! #cloud_security #cloud_computing #GO_CLOUD_2

SaharaNet's tweet image. Faisal Al-Yousef, Cyber Security Manager at Sahara Net talking now about Cloud Cyber Security!

#cloud_security
#cloud_computing
#GO_CLOUD_2
SaharaNet's tweet image. Faisal Al-Yousef, Cyber Security Manager at Sahara Net talking now about Cloud Cyber Security!

#cloud_security
#cloud_computing
#GO_CLOUD_2

Researchers Question Security in AMDs Upcoming Zen Chips #Cloud_Security #Cryptography threatpost.com/researchers-qu… #R

residualbitcoin's tweet image. Researchers Question Security in AMDs Upcoming Zen Chips #Cloud_Security #Cryptography threatpost.com/researchers-qu…  #R…

Organizations are uncovering a #cloud_security paradox news.sofiaitc.com/PmfFGv

PoseidonTPA's tweet image. Organizations are uncovering a #cloud_security paradox news.sofiaitc.com/PmfFGv

Google reCaptcha Bypass Technique Uses Googles Own Tools #Cloud_Security #Cryptography threatpost.com/google-recaptc…

bitcoinagile's tweet image. Google reCaptcha Bypass Technique Uses Googles Own Tools #Cloud_Security #Cryptography threatpost.com/google-recaptc…

Loading...

Something went wrong.


Something went wrong.


United States Trends