-
Phishing websites: How do they work?
In this post we’ll discuss the phishing phenomenon, reverse engineer a real phishing website and discuss how you can stay safe from phishing attempts.
-
Securing EC2 Instance Metadata in AWS
In this post we will discuss the security pitfalls of the EC2 Instance Metadata Service (IMDS) version 1, identifying it’s use within your AWS account(s), remediation steps and future predictions.