
Astrix Security
@astrixsecurity
Access management for third-party integrations
ID: 1488219570783412226
31-01-2022 18:36:58
99 Tweet
148 Followers
69 Following

Astrix Security discovers 0-Day Vulnerability in Google Cloud Platform. The flaw, dubbed “GhostToken,” enables hidden and unremovable access to a victim’s Google account via third-party applications. astrix.security/astrix-discove…



According to the Cloud Security Alliance report, insufficient identity, credentials, access, and key management is one of the top threats to cloud computing. #CSA sheds light on what these risks mean and shares its recommendations for mitigation. cloudsecurityalliance.org/artifacts/top-…



🔓 Non-human Identity Threats - The Top Three🔓Check out our CTO's new article in SECURITY Magazine, revealing the three main techniques attackers leverage to exploit unmonitored and improperly secured API keys, OAuth tokens, and service accounts. securitymagazine.com/articles/99303…








👻 Beware of ghosts at this year's #DefCon31 👻 We're excited to announce that the Ghost Token 0-day vulnerability has made it to DefCon! On August 11, our Research Team Lead Tal Skverer will take the stage to share the ins and outs of the #GhostToken vulnerability.



Reflection on the past months brought up a crazy highlight - the RSAConference Innovation Sandbox contest. 🏆 Last April, Astrix CEO Alon Jackson took the stage to tell the story of Astrix in front of over 2000 people, and what a wild ride it was. 👇 shorturl.at/ghiT1