dcsimg

Hacking with AWS: incorporating leaky buckets into your OSINT workflow

Penetration testing is often conducted by security researchers to help organizations identify holes in their security and fix them, before cybercriminals have the chance. While there’s no malicious intent for the researcher, part of his job is to think and act like a cybercriminal would when hacking, or attempting to breach, an enterprise network. Therefore, in this article, I will review … [Read more...]

Capital One breach exposes over 100 million credit card applications

Just as we were wrapping up the aftermath of the Equifax breach—how was that already two years ago?—we are confronted with yet another breach of about the same order of magnitude. Capital One was affected by a data breach in March. The hacker gained access to information related to credit card applications from 2005 to early 2019 for consumers and small businesses. According to the bank the … [Read more...]

How to Create and Configure an AWS VPC with Python

Amazon Web Services enables you to create a custom defined virtual network also know as Amazon VPC or Amazon Virtual Private Cloud, which, just like any traditional network in a data center, is highly scalable and easily configurable using programming languages like Python. In this article we will demonstrate how to automate creating an AWS VPC and configure a custom virtual network. … [Read more...]

How to Automate AWS S3 Static Websites Using Python

Amazon Web Services offers a very popular object storage service known as Amazon S3 (Simple Storage Service) that enables you to store data, files, images and even videos in highly available containers called ‘buckets’ which are also easy to access endpoints using any popular programming language. In combination of AWS S3 and with other AWS services developers can build scalable and durable … [Read more...]

VMware at re:Invent 2018 | The future of VMware is on AWS?

VMware and Amazon announced some important news regarding their future collaboration at re:Invent 2018 but what does it mean for the future of VMware? Read the post here: VMware at re:Invent 2018 | The future of VMware is on AWS? … [Read more...]

Perimeter 81 is an Advanced Technology Partner in the Amazon Web Services Partner Network

Reading Time: 2 minutesPerimeter 81 receives Advanced AWS Technical Validation Perimeter 81, a leading provider of Cloud VPN and Software Defined Perimeter technology, has been recognized as an Advanced Technology Partner in the Amazon Web Services (AWS) Partner Network (APN). About APN Technology Partners The APN is a global program, designed to help APN Partners build successful AWS-based … [Read more...]

Import Machine Images Into AWS with Packer

Amazon Web Services (AWS) is still the most popular cloud platform and Packer provides great integration that enables users to import builds into AWS and convert them to Amazon Machine Images (AMI). … [Read more...]

Podcast: Monitoring Security in AWS

How do you ensure the security of a third of America’s web traffic? By comprehensively understanding the different attack vectors related to your cloud services, specifically AWS (Amazon web services). And being prepared to react fast. … [Read more...]

How to Manage AWS IAM Users with Python

Amazon Web Services (AWS) offers a service known as Identity and Access Management (IAM) that lets AWS Administrators provision and manage users and permissions in AWS cloud.  AWS IAM can prove very useful for System Administrators looking to centrally manage users, permissions and credentials; in order to authorize user access on AWS services like EC2, S3, CloudWatch etc. … [Read more...]

How to Manage AWS EC2 Infrastructure with Python

In this article, we'll take a look at how system administrators can use Python to manage their Amazon Web Services (AWS)  Elastic Compute Cloud (EC2) infrastructure. You’ll learn to query existing EC2 instances, change the state of the virtual machines and their configurations, or terminate any instances that are no longer required. … [Read more...]