Spencer Gietzen (@spengietz) 's Twitter Profile
Spencer Gietzen

@spengietz

Cloud Security Researcher | views/opinions are my own

ID: 849248700044005376

calendar_today04-04-2017 13:14:03

949 Tweet

2,2K Takipçi

379 Takip Edilen

CrowdStrike (@crowdstrike) 's Twitter Profile Photo

Our new Adversary Universe website aims to provide customers and researchers with a detailed view of the threats they face everyday. Read about it in the CrowdStrike blog: bit.ly/37DSbd2 via adam_cyber #CSAdversaryUniverse

Our new Adversary Universe website aims to provide customers and researchers with a detailed view of the threats they face everyday. Read about it in the <a href="/CrowdStrike/">CrowdStrike</a> blog: bit.ly/37DSbd2 via <a href="/Adam_Cyber/">adam_cyber</a> #CSAdversaryUniverse
Ian Mckay (@iann0036) 's Twitter Profile Photo

📢 Major update to iamlive today with the addition of a new (experimental) proxy mode which will generate AWS IAM policies that include the "Resource" property. This includes a full mapping of every resource in the SAR. Looking for initial feedback! github.com/iann0036/iamli…

fwd:cloudsec (@fwdcloudsec) 's Twitter Profile Photo

fwd:cloudsec 2021 will be in Salt Lake City, Utah on September 13 and 14! (2 days! 🤯) We'll be at the Marriott City Center. It'll be hybrid (in-person and streamed). CFP will open May 16; remote speakers who can't make it will be streamed in.

AWS Support (@awssupport) 's Twitter Profile Photo

Ben Kehoe Hi Ben! Although I can't turn back time on any frustration caused, we heard your feedback and have good news to share! 🗞 All new and existing accounts created using AWS Organizations are now no longer automatically subscribed to marketing emails. Thanks for raising this.🤝 ^KB

Ben Bridts‏ (@benbridts) 's Twitter Profile Photo

Have you ever wondered which AWS Account an S3 bucket belongs to? Did you think that with 10^12 possible account ids it would be impossible to guess? Here is one way to do it: cloudar.be/awsblog/findin…

Scott Piper (@0xdabbad00) 's Twitter Profile Photo

AWS has started adding an inline policy to deny s3:* on compromised access keys in addition to their quarantine policy which is more focused on stopping bitcoin miners. This has the potential for greater customer impact but exfil is what companies tend to be more concerned about.

Victor Grenu (@zoph) 's Twitter Profile Photo

Following the release of s3-account-search to find AWS account id of public s3 object/bucket, here an example in a GIF 🎥. It took 48s to find the AccountID. - github.com/WeAreCloudar/s… cc Ben Bridts‏ Cloudar

Scott Piper (@0xdabbad00) 's Twitter Profile Photo

It is possible to identify the account IDs of the owners of S3 buckets. What can one now do with this? What does this change? If this were applied to our resource types beyond S3 buckets, would that change things?