Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Remediation the hardest problem in Non-Human Identity Security (token.security)
3 points by mooreds 42 days ago | past
Azure API vulnerability and roles misconfiguration compromise corporate networks (token.security)
102 points by ArielSimon 85 days ago | past | 99 comments
AWS Built a Security Tool. It Introduced a Security Risk (token.security)
209 points by simplesort 4 months ago | past | 81 comments
AWS Built a Security Tool. It Introduced a Security Risk (token.security)
2 points by EliavLivneh 5 months ago | past
IAM Role Trust Policies: Misconfigurations Hiding in Plain Sight (token.security)
1 point by simplesort 5 months ago | past | 1 comment
Secure Cross-Account Access Is Tricky. Four Common Dangerous Misconceptions (token.security)
4 points by EliavLivneh 5 months ago | past
Determining IaC ownership – a tag-based approach (token.security)
5 points by marsh_mellow 5 months ago | past | 6 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: