2068
All about cloud security Contacts: @AMark0f @dvyakimov About DevSecOps: @sec_devops
⚙️ Kubernetes v1.35: A Better Way to Pass Service Account Tokens to CSI Drivers
Kubernetes 1.35 introduces beta support for CSI drivers to receive service account tokens via the "secrets" field instead of "volume_context", preventing accidental token logging.
https://kubernetes.io/blog/2026/01/07/kubernetes-v1-35-csi-sa-tokens-secrets-field-beta/
#kubernetes
⚙ A Brief Deep-Dive into Attacking and Defending Kubernetes
This article covers Kubernetes attack and defense techniques. Explores Kubernetes components (API Server, ETCD, kubelet), attack vectors including unauthenticated API access, RBAC misconfigurations, ServiceAccount token abuse, malicious admission controllers, CoreDNS poisoning, writable volume mounts, ETCD compromise, and certificate authority exploitation.
https://heilancoos.github.io/research/2025/12/16/kubernetes.html
#kubernetes
🔶 pathfinding cloud
An AWS IAM Privilege Escalation Path Library. You can also refer to the companion blog post.
https://github.com/DataDog/pathfinding.cloud
#aws
👩💻 Azure Seamless SSO: When Cookie Theft Doesn’t Cut It
The cookie crumbled when it expired, but the attack path didn't. Learn how BloodHound graph analysis and Azure Seamless SSO enabled pivoting into the cloud.
https://specterops.io/blog/2025/12/11/azure-seamless-sso-when-cookie-theft-doesnt-cut-it/
#azure
🔶 What is EC2 Instance Attestation
EC2 Instance Attestation extends attestable scope from Nitro Enclaves' container environment to entire EC2 instances, enabling greater capabilities like GPU access. However, it requires proactive hardening versus Enclaves' secure-by-default design and more complex deployment through Attestable AMIs.
https://blog.richardfan.xyz/2025/12/18/what-is-ec2-instance-attestation.html
#aws
🔶 boto3-refresh-session
A simple Python package for refreshing AWS temporary credentials in boto3 automatically
https://github.com/michaelthomasletts/boto3-refresh-session
#aws
Что загадывает DevOps на Новый год?
⏺чтобы кластер обновлялся без ночных алертов
⏺сеть работала стабильно и предсказуемо
⏺апгрейд кластера не превращался в вечер с release notes
Разработчики Managed Kubernetes в облаке MWS Cloud Platform ⬜ знают все ваши тайные желания и готовы упростить вашу DevOps-рутину.
С Managed Kubernetes вы получаете:
⏺готовый кластер за несколько минут без сложной настройки
⏺управление жизненным циклом кластера и нод
⏺ автоматическое масштабирование под нагрузку
⏺ нативную работу с сетью и storage через CCM / CSI
⏺ централизованное управление доступами через IAM
🔶🔷🔴 tokenex
A Go library that securely exchanges identity tokens for temporary cloud credentials, with built-in support for AWS, GCP, Azure, OCI, Kubernetes, and OAuth2. You can also refer to the companion blog post.
https://github.com/riptideslabs/tokenex
#aws #azure #gcp
🔶 yams
A Go library, server, and CLI providing foundational capabilities to simulate access for AWS IAM policies.
https://github.com/nsiow/yams
#aws
🔶 AWS Builder Center
A portal collecting hands-on workshops crafted by AWS experts to gain practical experience and solve real business challenges.
https://builder.aws.com/build/workshops
(Use VPN to open from Russia)
#aws
🔶 All Paths Lead to Your Cloud: A Mapping of Initial Access Vectors to Your AWS Environment
Post which analyzes AWS initial access vectors through identity-driven misconfigurations, categorizing them into service exposure (Lambda, EC2, ECR, DataSync) and access by design (IAM/STS, IoT, Cognito) vulnerabilities that compromise cloud perimeter security.
https://www.paloaltonetworks.com/blog/cloud-security/aws-initial-access-cloud-perimeter-security/
(Use VPN to open from Russia)
#aws
👩💻 Investigating an adversary-in-the-middle phishing campaign targeting Microsoft 365 and Okta users
Datadog identified an active adversary-in-the-middle phishing campaign targeting Microsoft 365 and Okta users. The campaign uses lookalike domains, proxies legitimate authentication pages, injects JavaScript to steal credentials and session tokens, and can bypass non-phishing-resistant MFA.
https://securitylabs.datadoghq.com/articles/investigating-an-aitm-phishing-campaign-m365-okta/
#azure
🔶 Amazon CloudWatch introduces unified data management and analytics for operations, security, and compliance
CloudWatch can automatically normalize and process data to offer consistency across sources with built-in support for Open Cybersecurity Schema Framework (OCSF) and Open Telemetry (OTel) formats, so you can focus on analytics and insights.
https://aws.amazon.com/ru/blogs/aws/amazon-cloudwatch-introduces-unified-data-management-and-analytics-for-operations-security-and-compliance/
(Use VPN to open from Russia)
#aws
🔶 Amazon CloudFront mTLS with open-source serverless CA
A step-by-step guide on implementing mTLS for Amazon CloudFront using our open-source cloud CA.
paulschwarzenberger/amazon-cloudfront-mtls-with-open-source-serverless-ca-f49ce2bc9874" rel="nofollow">https://medium.com/@paulschwarzenberger/amazon-cloudfront-mtls-with-open-source-serverless-ca-f49ce2bc9874
(Use VPN to open from Russia)
#aws
🔶 Introducing VPC encryption controls: Enforce encryption in transit within and across VPCs in a Region
AWS announces VPC encryption controls, a new capability that helps organizations audit and enforce encryption in transit for all traffic within and across VPCs in a Region, simplifying compliance with regulatory frameworks like HIPAA, PCI DSS, and FedRAMP through automated monitoring and enforcement modes.
https://aws.amazon.com/ru/blogs/aws/introducing-vpc-encryption-controls-enforce-encryption-in-transit-within-and-across-vpcs-in-a-region/
(Use VPN to open from Russia)
#aws
⚙ Kubernetes v1.35: Restricting executables invoked by kubeconfigs via exec plugin allowList added to kuberc
Kubernetes v1.35 introduces beta support for restricting credential plugin executables via kuberc configuration. Users can set "credentialPluginPolicy" to AllowAll, DenyAll, or Allowlist, with an optional "credentialPluginAllowlist" to specify permitted binaries, enhancing security against supply-chain attacks.
https://kubernetes.io/blog/2026/01/09/kubernetes-v1-35-kuberc-credential-plugin-allowlist/
#kubernetes
🔶 Unauthenticated Cluster Takeover in AWS ROSA
A critical vulnerability in AWS ROSA Classic allowed unauthenticated attackers to discover clusters via Certificate Transparency logs, extract cluster UUIDs and owner emails from unauthenticated endpoints, initiate unauthorized cluster transfers, and escalate to AWS account access through ROSA's IAM roles.
https://blog.ryanjarv.sh/2026/01/05/unauth-aws-rosa-cluster-takeover.html
(Use VPN to open from Russia)
#aws
🔶 BadPods Series: Everything Allowed on AWS EKS
How to exploit misconfigured Kubernetes pods on AWS EKS using BishopFox's BadPods "everything-allowed" manifest. Shows container escape via chroot, lateral movement using nsenter, and cloud credential theft via IMDS.
https://cybersecnerds.com/badpods-series-everything-allowed-on-aws-eks/
#aws
👩💻 nOAuth Abuse Update: Potential Pivot into Microsoft 365
Vulnerable SaaS apps could enable attackers to pivot back into Microsoft 365, endangering your entire Microsoft 365 estate.
https://www.semperis.com/blog/noauth-abuse-update-pivot-into-microsoft-365/
#azure
🔶🔷🔴 Dear, cloud family!
Wishing you a New Year filled with innovative solutions, seamless deployments, and sky‑high success! May your cloud infrastructure be always resilient and your downtime — zero. Happy New Year 2026!
We'll be taking a short break and returning in a few days to bring you new, professional content.
#HappyNewYear
👩💻 ATEAM
A Python reconnaissance tool designed to discover Azure services and attribute tenant ownership information based on their responses.
https://github.com/NetSPI/ATEAM
#azure
🔶 aws-extend-switch-roles
Extend your AWS IAM switching roles by Chrome extension, Firefox add-on, or Edge add-on.
https://github.com/tilfinltd/aws-extend-switch-roles
#aws
🔶 IAMhounddog
A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS accounts.
https://github.com/VirtueSecurity/IAMhounddog
#aws
🔶 aws-finops-dashboard
A terminal-based AWS cost and resource dashboard which provides an overview of AWS spend by account, service-level breakdowns, budget tracking, and EC2 instance summaries.
https://github.com/ravikiranvm/aws-finops-dashboard
#aws
🔶 AWS Lambda Managed Instances: A Security Overview
An initial security overview of AWS Lambda Managed Instances, exploring the Bottlerocket-based architecture, the 'Elevator' components, and security insights for this new compute model.
https://www.offensai.com/blog/aws-lambda-managed-instances-security-overview
(Use VPN to open from Russia)
#aws
🔶 Exploiting AWS IAM Eventual Consistency for Persistence
AWS IAM eventual consistency creates a 4-second window where deleted AWS access keys can still work. Learn how attackers exploit this and how to mitigate it.
https://www.offensai.com/blog/aws-iam-eventual-consistency-persistence
(Use VPN to open from Russia)
#aws
🔴 VPC Flow Logs for Cross-Cloud Network
With VPC Flow Logs, now you can monitor critical network traffic moving between your on-prem infrastructure, cross-cloud resources, and Google Cloud.
https://cloud.google.com/blog/products/networking/vpc-flow-logs-for-cross-cloud-network/
#gcp
🔶 Introducing AWS Lambda Managed Instances: Serverless simplicity with EC2 flexibility
Run Lambda functions on EC2 compute while maintaining serverless simplicity—enabling access to specialized hardware and cost optimizations through EC2 pricing models, with AWS handling all infrastructure management.
https://aws.amazon.com/ru/blogs/aws/introducing-aws-lambda-managed-instances-serverless-simplicity-with-ec2-flexibility/
(Use VPN to open from Russia)
#aws
👩💻 Backdooring Managed Identities via Azure API Management
Azure API Management exposes managed identity certificates with private keys in plaintext through an undocumented configuration API used by self-hosted gateways. Attackers with gateway keys can extract these certificates for persistent backdoor access.
https://dazesecurity.io/blog/apimMIVuln
(Use VPN to open from Russia)
#azure
🔶 AWS Secrets Manager launches Managed External Secrets for Third-Party Credentials
AWS Secrets Manager introduces managed external secrets for third-party credentials like Salesforce, Snowflake, and BigID.
https://aws.amazon.com/ru/blogs/security/aws-secrets-manager-launches-managed-external-secrets-for-third-party-credentials/
(Use VPN to open from Russia)
#aws