New phishing scam targets Office 365 users

With more than 100 million monthly active subscribers, Office 365 has attracted the attention of hackers who’ve revamped an age-old trick. This time, they come up with a highly targeted, well-crafted spear-phishing scam that's even more difficult to identify. The post New phishing scam targets Office 365 users appeared first on Health Security Solutions.
Read more

VMworld 2017 Europe Briefing: VMware Enhances Multiple Cloud Management in VRealize Suite 2017

Check out the latest enhancements to VMware vRealize Suite 2017 VMware’s updated vRealize Suite provides enhancements to extend their virtualization management capabilities from on-premise across multiple clouds providing intelligent operations, better automation and support for DevOps-ready IT.
Read more

AWS Penetration Testing Part 2 – S3, IAM, EC2

Penetration Testing AWS Services AWS Penetration Testing Part 2. S3, IAM, EC2 S3 and IAM Policies Unlike ACLs and bucket policies, IAM policies are targeted at IAM users/groups instead of S3 buckets and objects. Using an IAM policy, we can give an IAM user limited access to S3 resources (or any AWS service in general). More posts like this can be found at Virtue Security.
Read more

AWS Penetration Testing Part 1 – S3 Buckets

Penetration Testing AWS Services AWS Penetration Testing Part 1. S3 Buckets Amazon Web Services (AWS) provides some of the most powerful and robust infrastructure for modern web applications. As with all new functionality on the web, new security considerations inevitably arise. For penetration testers, a number of AWS services can pose obscure challenges at times. More posts like this can be found at Virtue Security.
Read more
Page 1 of 912345...Last »