Business in the front, party in the back: backdoors in elastic servers expose private data

It’s all too easy to discover data leaks online, especially in cloud services. We take a look at misconfigurations in elastic servers that lead to exposed data on the Internet.

Read more

Hacking with AWS: incorporating leaky buckets into your OSINT workflow

When penetration testing for an organization, what OSINT tactics can researchers employ? We discuss how hacking with AWS buckets can provide more recon data and uncover any leaks.

Read more

Magecart skimmers found on Amazon CloudFront CDN

Not all breaches on Content Delivery Networks (CDNs) result in supply-chain attacks, yet, they are often a forgotten entry point for attackers to slip in malicious code, such as web skimmers.

Read more

Select your language