Pinned~ goodyHighlights and Lessons from the CrowdStrike Global Outage (BSOD🥶☠️)DisclaimerJul 21Jul 21
Pinned~ goodyPractical Steps to Starting a Career in Cloud Security — 2024 (RoadMap)The Quest of most companies over the years especially now in 2024 would be to adapt to the evolving digital landscape by leveraging Cloud…Jan 54Jan 54
Pinned~ goodyAWS Cloud Detection Lab 1️⃣🪢🖇️: Cloud Pen-testing with Stratus Red Team toolAdvanced Persistent Threat (APT) actors are known for their sophisticated and continuous cyber-attacks targeting specific organizations…May 221May 221
Pinned~ goodyThreat detection in AWS using Amazon Athena to Analyze Cloudtrail logs from flaws.cloudProject ObjectiveFeb 6Feb 6
~ goodyAWS Cloud Detection Lab II: Emulation of APT attacks with Stratus Red Team toolIn the previous blog post, ‘Cloud Pen-testing with Stratus Red Team tool,’ we discussed the concept and installation guide for the Stratus…May 31May 31
~ goodyContent Engineering in CybersecurityHave you heard of the new evolving role in cybersecurity, “Content Engineering"?🤔 . . same here.💨Oct 17, 20231Oct 17, 20231
~ goodyUnlocking the Power of AWS Organizations: A Comprehensive Guide to Creation and Authentication…Let Connect: LinkedIn | Twitter | GitHub | Hashnode (Practical Labs)Aug 8, 2023Aug 8, 2023
~ goodyLevel -1:- Enumerating Flaws.cloud Domain (AWS)For Level 1, we are tasked to find the first sub-domain associated with flaws.cloudJun 19, 2023Jun 19, 2023
~ goodyAll-in-One “DO YOU KNOW CLOUDY SEC SERIES”Introducing Cloudy Sec: Do You Know Cloud Security?Jun 12, 2023Jun 12, 2023