Persisting Unseen: Defending against Entra ID persistence

I recently presented “Persisting Unseen: Attacker Methods of Infesting Entra ID” at RSAC’s virtual Cloud Security seminar. This session introduced some methods attackers may use now or in the near future to maintain access to Entra ID (formerly Azure AD) once they’ve obtained a privileged foothold.

Katie Knowles
🚨 Lambda Watchdog CVE Report 🚨
Latest AWS Lambda image scan detected 22 CVEs across 25 images:
• 🔴 Critical: 0
• 🟠 High: 8
• 🟡 Medium: 13
• 🔵 Low: 1

Check the full report 👉 https://lambdawatchdog.com/
#AWS #Lambda #CVE #CloudSecurity #Serverless
Lambda Watchdog

AWS Lambda CVE dashboard

🚨 Lambda Watchdog CVE Report 🚨
Latest AWS Lambda image scan detected 21 CVEs across 25 images:
• 🔴 Critical: 0
• 🟠 High: 8
• 🟡 Medium: 12
• 🔵 Low: 1

Check the full report 👉 https://lambdawatchdog.com/
#AWS #Lambda #CVE #CloudSecurity #Serverless
Lambda Watchdog

AWS Lambda CVE dashboard

New Open-Source Tool Spotlight 🚨🚨🚨

gVisor: a user-space application kernel designed for container isolation. It mimics a Linux kernel interface while being written in Go for memory safety, running in user space. Ideal for sandboxing workloads in Docker or Kubernetes. #Containers #Sandbox

🔗 Project link on #GitHub 👉 https://github.com/google/gvisor

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

— ✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️

ICYMI: DomainTools Investigations released new research this week!

Skeleton Spider (aka FIN6) is leveraging trusted cloud services like AWS to deliver malware through fake job applications and resume-themed phishing campaigns.

🔍 Learn how this financially motivated group is:

🔹Exploiting cloud infrastructure to evade detection
🔹Using social engineering to lure victims
🔹Building resilient, scalable malware delivery systems

Read the full analysis here: https://dti.domaintools.com/skeleton-spider-trusted-cloud-malware-delivery/?utm_source=Mastodon&utm_medium=Social&utm_campaign=Skeleton-Spider

#CyberSecurity #ThreatIntelligence #Malware #CloudSecurity #Phishing #FIN6 #SkeletonSpider #InfoSec

Eggs in a Cloudy Basket: Skeleton Spider’s Trusted Cloud Malware Delivery - DomainTools Investigations | DTI

Discover how the FIN6 cybercrime group, also known as Skeleton Spider, leverages trusted cloud services like AWS to deliver stealthy malware through fake job applications and resume-themed phishing campaigns. Learn about their tactics, infrastructure, and how to defend against these evolving threats.

DomainTools Investigations | DTI
🚨 Lambda Watchdog CVE Report 🚨
Latest AWS Lambda image scan detected 20 CVEs across 25 images:
• 🔴 Critical: 0
• 🟠 High: 7
• 🟡 Medium: 12
• 🔵 Low: 1

Check the full report 👉 https://lambdawatchdog.com/
#AWS #Lambda #CVE #CloudSecurity #Serverless
Lambda Watchdog

AWS Lambda CVE dashboard

🚀 Position: Security Architect
📍 Location: Mumbai
🧠 Experience: 2-5 years

📩 Apply: resumes@overturerede.zohorecruitmail.in
📞 Contact: 9582224661

#SecurityArchitect #NetworkSecurity #CyberSecurityJobs #CloudSecurity #FirewallExpert #MumbaiJobs #HiringNow #OvertureRede

Mastering AWS Cloud: From Basics to Advance

18 – 19 June (Wed – Thu)
08:00 – 10:00 PM (IST)

Register here- https://infosectrain.com/events/mastering-aws-cloud-from-basics-to-advance/

#AWScloud #InfosecTrain #Learntorise #Cloudsecurity

"With millions of businesses relying on Microsoft 365 to manage their data and communication, the implementation of robust security measures is essential to protect sensitive information and maintain operational integrity." https://lttr.ai/AfQVZ

#Security #Infosec #CloudSecurity

Avoid These Pitfalls: 3 Microsoft 365 Security Mistakes Companies Make

Tweet   Securing cloud services like Microsoft 365 is more crucial than ever. With millions of businesses relying on Microsoft 365 to manage their data and communication, the implementation of robust security measures is essential to protect sensitive information and … Continue reading →

MSI :: State of Security

New Open-Source Tool Spotlight 🚨🚨🚨

Falcoctl streamlines Falco administration with commands for managing plugins, rules, and registries. From adding an artifact index to searching specific plugins like `cloudtrail`, it’s built for precision. Works with multiple backends (HTTP, S3, GCS). Config files simplify repeat usage. #Falco #DevSecOps

🔗 Project link on #GitHub 👉 https://github.com/falcosecurity/falcoctl

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

— ✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️