![F5 Exploit the Exact Opposite of Refreshing - podcast episode cover](https://img.transistor.fm/EabliDD10VRWbSWBlM5pAEeS4Y1LXLd_39i2VvGuHhc/rs:fill:3000:3000:1/q:60/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzI1MTMvMTU4Mzk1/NTM1OS1hcnR3b3Jr/LmpwZw.jpg)
Episode description
Links:
- "Hacking the Cloud" is a community-built encyclopedia
- npm dependency confusion attack.
- Windows Event Logs
- F5 appliance (software or hardware) full remote code execution with privileged access
- Wiz has a blog post up about securing AWS Lambda function URLs
- Build a strong identity foundation that uses your existing on-premises Active Directory
- How to use new Amazon GuardDuty EKS Protection findings
- Poro (an open source project) scans for publicly accessible assets in your AWS environment