Cloud Security Research releases written by the Rhino Security Labs team. These articles provide in-depth analysis and insights on various cloud security topics, including AWS, Azure, and Google Cloud Platform. The articles cover a wide range of topics, from security best practices to vulnerability assessments and penetration testing. The goal of these articles is to educate and inform cloud security professionals on the latest threats and mitigation strategies. The articles are written by experienced security professionals with a deep understanding of cloud security. The articles are available for free on the Rhino Security Labs website.
A project exploring minimal set of restrictions for running untrusted code using Linux containers in a concise codebase.
A security tool that monitors AWS objects for ownership attribution, detects domain hijacking, and verifies security services.
A command-line tool to get valuable information out of AWS CloudTrail and a general purpose toolbox for working with IAM policies
Export Kubernetes events for observability and alerting purposes with flexible routing options.
A small project for continuous auditing of internet-facing AWS services
Cloudmarker is a cloud monitoring tool and framework that audits Azure and GCP cloud environments.
A tool for pillaging Docker registries to extract image manifests and configurations.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.