Geek Culture
Published in

Geek Culture

5 Basic Steps to Shield Your AWS Account From Unauthorized Access

How I got hacked

Many years ago, we got to know our AWS bill has gone up. We started digging and realize on 2 days in a month the EC2 cost spiked. Our analysis concluded that somehow my machine was hacked and hackers got my Access Keys.

I was a power user of AWS access keys. I used to love the command-line interface…

--

--

--

A new tech publication by Start it up (https://medium.com/swlh).

Recommended from Medium

Log Poisoning to Remote Code Execution | LFI | cUrl|

Tutorial on how to claim your IDO KALA tokens

Recasting the role of crypto

{UPDATE} 100 PICS Sopa de letras Hack Free Resources Generator

Daily links of Fernand0 — Enlaces diarios de Fernand0 — Issue #354

How I hacked a bitcoin casino

OpenWRT Mesh 802.11s

MITRE ATT&CK framework and MSSP

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Amrit Pal Singh

Amrit Pal Singh

Cloud Software Engineer | Product Development | I write about Tech and Travel | Profile https://bit.ly/3dNxaiK | Become a member https://bit.ly/3lZTw50

More from Medium

TOP 10 NEWS OF AWS

Harden Your Website With Traefik And Security Headers

Photo by Peter Conrad on Unsplash

Using Puppeteer in AWS EC2 (Capture website! 📸)

How to Prevent Code Insertion Software Supply Chain Attacks