Skip to content
Platform
Partners
Resources
Blog
Company
About Us
Careers
Menu
Platform
Partners
Resources
Blog
Company
About Us
Careers
Book a Demo
Resource tag:
Amazon AWS
Unseen but Deadly: How Forgotten S3 Buckets Become Breach Gateways
Shadow Operations: Unraveling the Secrets of AWS SSM
From Credentials to Control: Exploiting AWS RDS
Steering Through the Storm: Stopping ConfigMap Hackers in Their Tracks on Amazon EKS
The Silent Data Leak – Exfiltrating AWS Snapshots and Why It’s a Hacker’s Dream
Backdoor Resource Policies: The Dangerous Game of Manipulating Resource Policies
AWS User Data Scripts: A Security Nightmare?
Finding Your Way Through the AWS Tag Jungle: Simple Steps to Better Cloud Security
Platform
Partners
Resources
Blog
About Us
Careers
Request demo