Harsha KoushikinKernel SpaceThe Dangers of ModifyInstanceAttributeInstance(s) takeover and Credential Exfiltration using ModifyInstanceAttributeApr 29Apr 29
Harsha KoushikinKernel SpaceInfrastructure Security: a Personal PerspectiveMy ways of Fortifying Modern Infrastructure — a high level overviewMay 11, 2023May 11, 2023
Harsha KoushikinKernel SpaceKubeShark: Wireshark for KubernetesA microscopic look into what’s happening in the clusterJan 19, 20236Jan 19, 20236
Harsha KoushikinDisney+ HotstarChatOps — Cloud Resource ExplorerCloud Resource Explorer using simple ChatOpsNov 1, 2022Nov 1, 2022
Harsha KoushikinKernel SpaceWhy you should keep monitoring your AWS Managed PoliciesSome of the Over Privileged AWS Managed IAM PoliciesMay 3, 2022May 3, 2022
Harsha KoushikinKernel SpaceWhy Steampipe over Boto3Exploring Steampipe as an alternative for QueryingMar 4, 20221Mar 4, 20221
Harsha KoushikinKernel SpaceWhy Perimeter Security in Cloud is not as simple as it SoundsExploring the ways of doing Perimeter Security in CloudNov 8, 2021Nov 8, 2021
Harsha KoushikinKernel SpaceResource Limits in Linux | limits.confA Comprehensive Guide to understand Limits.conf fileMay 31, 2021May 31, 2021
Harsha KoushikinKernel SpaceLinux Security: All about Fork BombSilent, yet very efficient bomb.May 31, 2021May 31, 2021