Date Author Title
2024-03-07Jesse La Grew[Guest Diary] AWS Deployment Risks - Configuration and Credential File Targeting
2023-12-13Guy BruneauT-shooting Terraform for DShield Honeypot in Azure [Guest Diary]
2023-01-12Russ McReeProwler v3: AWS & Azure security assessments
2022-06-15Johannes UllrichTerraforming Honeypots. Installing DShield Sensors in the Cloud
2022-05-03Johannes UllrichSome Honeypot Updates
2021-09-20Johannes Ullrich#OMIGOD Exploits Captured in the Wild. Researchers responsible for half of scans for related ports.
2021-06-18Daniel WesemannNetwork Forensics on Azure VMs (Part #2)
2021-06-17Daniel Wesemann Network Forensics on Azure VMs (Part #1)
2021-05-07Daniel WesemannExposed Azure Storage Containers
2021-02-25Daniel WesemannForensicating Azure VMs
2020-11-12Daniel WesemannExposed Blob Storage in Azure
2020-11-12Daniel WesemannPreventing Exposed Azure Blob Storage
2020-10-01Daniel WesemannMaking sense of Azure AD (AAD) activity logs
2020-05-05Russ McReeCloud Security Features Don't Replace the Need for Personnel Security Capabilities