AWS

How to Build a Threat Hunting Capability in AWS

Introductions An infrastructure has been built, a patching plan has been developed, firewalls have been locked down and monitored, assets…

2 years ago

AWS Pentesting – Part – 1

Nowadays, we have experienced many data breaches exposing different vulnerabilities like s3 buckets, compromised AWS cloud environments, and many more…

4 years ago