2024-03-07 | Jesse La Grew | [Guest Diary] AWS Deployment Risks - Configuration and Credential File Targeting |
2023-12-13 | Guy Bruneau | T-shooting Terraform for DShield Honeypot in Azure [Guest Diary] |
2023-01-12 | Russ McRee | Prowler v3: AWS & Azure security assessments |
2022-06-15 | Johannes Ullrich | Terraforming Honeypots. Installing DShield Sensors in the Cloud |
2022-05-03 | Johannes Ullrich | Some Honeypot Updates |
2021-09-20 | Johannes Ullrich | #OMIGOD Exploits Captured in the Wild. Researchers responsible for half of scans for related ports. |
2021-06-18 | Daniel Wesemann | Network Forensics on Azure VMs (Part #2) |
2021-06-17 | Daniel Wesemann | Network Forensics on Azure VMs (Part #1) |
2021-05-07 | Daniel Wesemann | Exposed Azure Storage Containers |
2021-02-25 | Daniel Wesemann | Forensicating Azure VMs |
2020-11-12 | Daniel Wesemann | Exposed Blob Storage in Azure |
2020-11-12 | Daniel Wesemann | Preventing Exposed Azure Blob Storage |
2020-10-01 | Daniel Wesemann | Making sense of Azure AD (AAD) activity logs |
2020-05-05 | Russ McRee | Cloud Security Features Don't Replace the Need for Personnel Security Capabilities |