Published inKernel SpaceThe Dangers of ModifyInstanceAttributeInstance(s) takeover and Credential Exfiltration using ModifyInstanceAttributeApr 29Apr 29
Published inKernel SpaceInfrastructure Security: a Personal PerspectiveMy ways of Fortifying Modern Infrastructure — a high level overviewMay 11, 2023May 11, 2023
Published inKernel SpaceKubeShark: Wireshark for KubernetesA microscopic look into what’s happening in the clusterJan 19, 20236Jan 19, 20236
Published inDisney+ HotstarChatOps — Cloud Resource ExplorerCloud Resource Explorer using simple ChatOpsNov 1, 2022Nov 1, 2022
Published inKernel SpaceWhy you should keep monitoring your AWS Managed PoliciesSome of the Over Privileged AWS Managed IAM PoliciesMay 3, 2022May 3, 2022
Published inKernel SpaceWhy Steampipe over Boto3Exploring Steampipe as an alternative for QueryingMar 4, 20221Mar 4, 20221
Published inKernel SpaceWhy Perimeter Security in Cloud is not as simple as it SoundsExploring the ways of doing Perimeter Security in CloudNov 8, 2021Nov 8, 2021
Published inKernel SpaceResource Limits in Linux | limits.confA Comprehensive Guide to understand Limits.conf fileMay 31, 2021May 31, 2021
Published inKernel SpaceLinux Security: All about Fork BombSilent, yet very efficient bomb.May 31, 2021May 31, 2021