- Exploiting weak configurations in Amazon Cognito in AWS https://blog.appsecco.com/exploiting-weak-configurations-in-amazon-cognito-in-aws-471ce761963 3 comments aws
- Exploiting weak configurations in Amazon Cognito https://blog.appsecco.com/exploiting-weak-configurations-in-amazon-cognito-in-aws-471ce761963 3 comments netsec
Linking pages
Linked pages
- GitHub - nccgroup/ScoutSuite: Multi-Cloud Security Auditing Tool https://github.com/nccgroup/ScoutSuite 31 comments
- Medium https://medium.com/m/signin?isDraft=1&operation=login&redirect=https%3A%2F%2Fmedium.com%2F%40jamie_34747%2F79d382edf22b%3Fsource%3D 19 comments
- GitHub - prowler-cloud/prowler: Prowler is an Open Source Security tool to perform Cloud Security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains hundreds of controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks. https://github.com/toniblyx/prowler 0 comments
Would you like to stay up to date with DevOps? Checkout DevOps
Weekly.
Related searches:
Search whole site: site:blog.appsecco.com
Search title: Exploiting weak configurations in Amazon Cognito | by Pankaj Mouriya | Appsecco
See how to search.