😎At Iterasec, we love discovering and sharing insightful resources from around the cybersecurity community. We recently stumbled upon a useful AWS exploitation playbook that walks through various misconfigurations attackers can leverage. Check out these highlights: 🔸S3 Buckets Misconfigurations: Public read/write settings allowing bucket snooping and file manipulation. 🔸AMIs & EBS Snapshots: Using nifty tools like CloudShovel and coldsnap to uncover secrets from public images. 🔸RDS & IAM Exploits: Restoring publicly available database snapshots or exploiting trust policies in IAM roles. 🔸Other AWS Services: Turning private API gateways, Lambda functions, SNS topics, SQS queues, and ECR repositories into inadvertent data jackpots. 👇And read the full article for more, don’t let attackers beat you to the punch! Need help reviewing your AWS environment or bolstering your cloud security stance? Contact Iterasec today! 💪Stay sharp, stay informed, and keep those buckets locked down! #cloudsecurity #AWS #cybersecurity #DevSecOps #infosec
Iterasec
Bezpieczeństwo komputerowe i bezpieczeństwo w sieci
Iterasec – your pragmatic cybersecurity partner
Informacje
Founded in 2019, Iterasec is a cybersecurity service company providing penetration testing, security audits, application and cloud security, DevSecOps and security compliance services for tech and software engineering companies. With a team of 20+ brilliant cybersecurity specialists, we are laser-focused on improving the security of various software and cloud products as well as helping development teams build more secure software. Our clients range from small startups to global multinational companies, such as well-known automotive companies, cloud providers, Fortune 500 companies, etc.
- Witryna
-
https://iterasec.com
Link zewnętrzny organizacji Iterasec
- Branża
- Bezpieczeństwo komputerowe i bezpieczeństwo w sieci
- Wielkość firmy
- 11–50 pracowników
- Siedziba główna
- Rzeszów
- Rodzaj
- Spółka prywatna
- Data założenia
- 2019
- Specjalizacje
- cybersecurity, penetration testing, secure software engineering, compliance, cybersecurity consulting i cloud security
Lokalizacje
-
Główna
al. Tadeusza Rejtana 53a
Office 203
35-326 Rzeszów, PL
Pracownicy Iterasec
Aktualizacje
-
😎 Sharing useful insights in-between the holidays. At Iterasec, we’re always scanning the horizon for crucial insights, and MITRE’s newly updated 2024 CWE Top 25 just hit the stage spotlighting some all-too-familiar cyber troublemakers. Here’s their top 10 lineup: 🔸 XSS (Cross-Site Scripting) 🔸 Out-of-Bounds Write 🔸 SQL Injection 🔸 CSRF (Cross-Site Request Forgery) 🔸 Path Traversal 🔸 Out-of-Bounds Read 🔸 OS Command Injection 🔸 Use After Free 🔸 Missing Authorization 🔸 Unrestricted File Upload of Dangerous Types Check out the full list following the link 👇 Be on the lookout for these vulnerabilities and get in touch with Iterasec to help prevent the trouble. 🛡️ Let’s make sure your defenses are ready to take on the most notorious threats! #ApplicationSecurity #CyberThreats #VulnerabilityManagement #InfoSec #ITSecurity
Common Weakness Enumeration
cwe.mitre.org
-
✨As the year comes to a close, we at Iterasec would like to extend our heartfelt greetings! 🎄May this holiday season bring you joy, relaxation, and cherished moments with loved ones. We hope the coming year is filled with success, growth, and new opportunities. 🌟Wishing you a wonderful holiday season and a prosperous New Year!
-
🤔 Have you ever considered how attackers might exploit the data plane in your Kubernetes clusters? A recent exploration sheds light on how vulnerabilities in applications, container images, and execution-as-a-service workloads can become gateways for unauthorized access. Here are highlights from Part 2 of Wiz.io Kubernetes series we think are worth sharing: 🔸 Application Vulnerabilities: Attackers can leverage Remote Code Execution (RCE) flaws in workloads to gain initial access. It's crucial to implement strong security boundaries within your cluster to contain potential breaches. 🔹 Risks with Container Images: Malicious or untrusted images can pose significant threats, potentially allowing attackers to escalate privileges. Ensuring image integrity through verification and using trusted registries is essential. 🔸 Execution-as-a-Service Challenges: Services that run external code, like AI models, can introduce cross-tenant vulnerabilities if not properly isolated. Strengthening isolation and sandboxing measures can mitigate these risks. 🛡️ At Iterasec, we advocate for a layered security approach to protect your Kubernetes environments. By combining strict policies, regular vulnerability assessments, and the latest security practices, you can fortify your clusters against emerging threats. 🚀 Looking to enhance your Kubernetes security posture? Our team is ready to assist. Contact us to find out how we can support your cybersecurity initiatives. #Kubernetes #Security #DataPlane #CloudSecurity #DevSecOps
Kubernetes Initial Access Vectors Part 2: Data Plane | Wiz Blog
wiz.io
-
❗ Ransomware attacks are increasingly targeting cloud environments by encrypting data with keys controlled by attackers. A recent analysis highlights the importance of managing AWS IAM permissions related to encryption updates to protect your data. 🔑 Key Takeaways: ▪️ Hidden IAM Actions: 75% of encryption update methods don't mention encryption keywords, making them easy to overlook in IAM policies. ▪️ Inconsistent Permissions: Only 8.33% of methods are classified as "Permissions Management," while the rest are "Write," complicating permission strategies. ▪️ Naming Complexities: Multiple action verbs like Update, Set, Modify, and Put add to the confusion in managing IAM actions. ✅ Recommendations: ▪️ Practice Least Privilege Access: Limit data resource and encryption key access to essential personnel. ▪️ Monitor Encryption Changes: Regularly audit AWS KMS and encryption updates to detect any unauthorized activities. ▪️ Implement Strong IAM Policies: Use Service Control Policies (SCPs) and Permission Boundaries to prevent unauthorized encryption changes. For more insights, we recommend to read the full article following the link 👇 🚀 Looking to enhance your cloud security? Contact us to see how we can support your cybersecurity initiatives. #CloudSecurity #AWS #Ransomware #DataProtection #IAM
Protecting Data and Preventing Ransomware: The IAM Guide to Managing and Updating Encryption for AWS Resources
fogsecurity.io
-
😎 Navigating Amazon S3 buckets just got easier with Stu, a text-based terminal UI created by Kyosuke Fujimoto and team. This tool allows you to browse and manage your S3 buckets directly from the terminal, enhancing efficiency and productivity for developers and security professionals alike. 🙌 Stu offers: 🔸 Intuitive Navigation: Easily browse through your S3 buckets and objects. 🔸 Command-Line Efficiency: Perform actions quickly without leaving the terminal. 🔸 Open Source: Available on GitHub for the community to contribute and improve. 🚀 For those who spend a lot of time in the terminal, Stu can streamline your workflow and provide a seamless experience when working with AWS S3. Check it out on GitHub! ⚙️ At Iterasec, we're always keen to highlight tools that enhance cloud security and efficiency. Give Stu a try and let us know what you think! #CloudSecurity #AWS #S3 #OpenSource #cybersecurity
GitHub - lusingander/stu: TUI explorer application for Amazon S3 (AWS S3) 🪣
github.com
-
🛡️ Want to keep your mobile app one step ahead of evolving threats? We’ve got you covered! ⚙️ Our latest guide walks you through the ins and outs of mobile application penetration testing — from spotting hidden vulnerabilities to securing your APIs and user data. This isn’t just another technical rundown; it’s your roadmap to confidently safeguarding what matters most. Inside you'll find: 🔸 Key methodologies and best practices 🔸 Common vulnerabilities and how to address them 🔸 Practical tips for safeguarding APIs, data storage, and more 🔸 Actionable strategies to enhance compliance and earn user trust 🚀 Ready to fortify your mobile app security? Check out our full guide following the link and drop us a line for a professional guidance! #MobileSecurity #AppSec #PenTesting #Cybersecurity #DataProtection
Mobile Application Penetration Testing: Complete Guide & Best Practices
https://iterasec.com
-
📊 A recent analysis has revealed a novel ransomware method that exploits AWS Key Management Service (KMS) to encrypt data and hold it hostage. Attackers leverage the "Bring Your Own Key Material" (BYOKM) feature to encrypt a victim's data with their own encryption keys and then delete the key material, making the data inaccessible until a ransom is paid. Key Takeaways from Chris Farris’ article on the topic: 🔐 Exploiting AWS KMS BYOKM: Attackers import their own encryption keys into KMS, encrypt your data, and then remove the keys. ⚠️ Data Inaccessibility: Deleting the key material means even AWS can't recover your data without the original keys. 🛡️ Mitigation Strategies: ▪️ Implement Strict IAM Policies: Restrict actions like importing and deleting key material using Identity and Access Management (IAM) policies. ▪️ Monitor KMS Activities: Set up alerts for unusual KMS activities, such as creation or deletion of key material. ▪️ Stay Informed: Awareness of such tactics is crucial to enhance your cloud security posture. ❗ At Iterasec, we emphasize the importance of proactive security measures to protect your AWS environments from evolving threats. 🚀 Looking to strengthen your cloud security? Contact us to discover how we can support your cybersecurity initiatives. #AWS #CloudSecurity #Ransomware #DataProtection #IAM #Cybersecurity
Effective Techniques for AWS Ransomware - Chris Farris
chrisfarris.com
-
🛡️ Securing your Kubernetes clusters is more crucial than ever. A recent deep dive sheds light on how attackers exploit the Kubernetes control plane to gain initial access and offers strategies to defend against these threats. Highlights: 🔹 Why It Matters: Kubernetes' complexity and popularity make it a target for attacks that rely on gaining initial access to your cluster. 🔹 New Taxonomy Introduced: A comprehensive matrix categorizes initial access vectors into control plane, data plane, cloud access, and CI/CD pipelines. 🔹 Control Plane Focus: The article explores how misconfigurations in areas like unauthenticated API access, exposed Kubeconfig files, misuse of kubectl proxy, and unsecured Kubelet APIs can lead to breaches. 🔹 Risks with Management Interfaces: Misconfigured dashboards like Kubernetes Dashboard, Kubeflow, and Argo Workflows can open doors for unauthorized access. 🔹 Security Strategies: Recommendations include enforcing strict RBAC policies, safeguarding Kubeconfig files, limiting Kubelet API exposure, and securing management interfaces. 😎 At Iterasec, we're experts in fortifying Kubernetes environments. Our team can help you assess vulnerabilities and implement robust security measures to protect your clusters. 🚀 Ready to strengthen your Kubernetes security? Contact us to discover how we can support your cybersecurity initiatives. Stay tuned for Part 2 highlights from this article, we’ll explore more of the data plane access vectors. #Kubernetes #Cybersecurity #CloudSecurity #DevSecOps #RBAC
Making Sense of Kubernetes Initial Access Vectors Part 1 – Control Plane | Wiz Blog
wiz.io
-
🔴🔵 In the world of cybersecurity, collaboration between Red and Blue teams is key to robust protection. Our latest blog post dives into the distinct roles of these teams and how their synergy can elevate your cybersecurity. What You’ll Learn: 🔍 Red Team Insights: How simulated attacks uncover hidden vulnerabilities. 🛡️ Blue Team Strategies: Effective defense mechanisms to thwart real threats. 🤝 Collaborative Benefits: Enhancing security through teamwork and continuous improvement. 🙌 Whether you're looking to understand the fundamentals or optimize your existing security framework, this guide has you covered. 🚀 Ready to bolster your cybersecurity strategy? Read the full article in our blog and drop us a line! #Cybersecurity #RedTeam #BlueTeam #InfoSec #Cyberdefense #SecurityCollaboration #ITSecurity
Red Team vs. Blue Team: How They Help Each Other
https://iterasec.com