Resource Center

Learn more about Cyngular
Tags filter // All

Publications

Blog Articles

Deception

Turning the Cloud Against the Attacker - Using Deception to Uncover and Disrupt Attackers

Deception in cybersecurity is no longer confined to legacy honeypots or internal traps. In modern cloud enviro
Amazon AWS
threat

The Threat You Didn’t See Coming - Data Exfiltration

Data exfiltration, the unauthorized transfer of sensitive information out of controlled environments, has beco
Amazon AWS
image

Cloud Enumeration: The Stealthy Discovery Process in AWS

In cloud security, enumeration refers to the process of gathering information about cloud environments, servic
s3 takeover

Unseen but Deadly: How Forgotten S3 Buckets Become Breach Gateways

One of the most dangerous threats is Bucket Takeover, where attackers claim the names of deleted S3 buckets an
Amazon AWS
Databricks Webhooks

Databricks Webhooks: A Silent Backdoor for Malicious Execution

Azure Databricks is a powerful data analytics and machine learning platform that enables organizations to proc
Microsoft Azure
Shadow Operations

Shadow Operations: Unraveling the Secrets of AWS SSM

Amazon Web Services (AWS) Systems Manager (SSM) offers management and insights to AWS resources, streamlining
Amazon AWS