The recent disclosure of yet another cloud security misconfiguration leading to…
As a technology company, the concept of not running or managing any servers may seem completely foreign at first. For network and operations professionals, who have built their entire careers around managing servers, it may seem downright ridiculous. However…
Privilege escalation, in the traditional sense, is “a type of network intrusion that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications.” [1]
Over the past several weeks, the security of AWS S3 buckets have come under increasing scrutiny…
At CloudSploit, we’re constantly thinking of ways that attackers can attempt to bypass or exploit security controls in AWS cloud environments through misconfigurations or “lazy” implementations (get it working first, then add security…
CloudSploit Events is a new product release from CloudSploit, enabling real-time security analysis of API activity across an entire AWS account environment.
To explain CloudSploit to potential users, we often ask them “how would you know if a…
CloudSploit runs almost all of its infrastructure on AWS Lambda. This post will explore how we use Lambda to handle workloads that can rapidly scale to hundreds of requests per second.
These were the top 10 stories published by CloudSploit; you can also dive into yearly archives: 2016, 2017, 2018, and 2019.