Announcing our latest course: AWS Lambda Security Labs
Earlier this year we launched some awesome AWS Lambda CTFs that have received great feedback. But unless you already have experience with finding Lambda vulnerabilities,…
Intermediate-level Courses
Earlier this year we launched some awesome AWS Lambda CTFs that have received great feedback. But unless you already have experience with finding Lambda vulnerabilities,…
In the prior post, we learned how to configure Prowler to run serverless in CodeBuild and to push findings to Security Hub, and we mentioned…
When you are running multiple accounts through AWS Organizations, there are times when you may need to perform root-level actions in your member accounts. It…
Studying for the AWS Certified Security Specialty (SCS-02) certification exam? Practice and challenge your readiness with our free practice exam questions. We’ll be adding a…
How can I find security misconfigurations in my AWS accounts within minutes? How can I do that without spending weeks setting up data pipelines, or…
Our live presentation on Attacking & Defending Amazon EKS sparked interesting questions and conversations regarding the biggest threats to Amazon EKS (and Kubernetes in general). A…
It wasn’t that long ago when long-term access keys were one of the primary methods for accessing AWS resources and environments. You would create an…
Please confirm you want to block this member.
You will no longer be able to:
Please allow a few minutes for this process to complete.