Logo
Login
Tech Posts 31207
100daysofcode 100daysofdevops 100pay 10mistakes 10yearworkanniversary 11 11labs 11tly 11ty 127001

Dev Blog A constructive and inclusive blog for software developers. With you every step of your journey.

Built with modern PHP and MySQL. Open source software that powers developer blogs and other inclusive communities.

Made with love and PHP. Dev Blog © 2024.

Abuse OpenID Connect and GitLab for AWS Access.

Abuse OpenID Connect and GitLab for AWS Access.
What is an OpenID Connect (OIDC)? This is an authentication protocol built on top of OAuth 2.0 that allows applications to verify a user's identity based on authentication performed by an ide...
09.04.2025 0 Read More

Recent Security Alerts: GitHub Actions Hijack and Kubernetes Ingress-NGINX Vulnerability

Hello friends Recently, two important security issues were brought up by Wiz. These issues affect GitHub Actions and the Kubernetes Ingress-NGINX controller. If you are working in DevOps or m...
13.04.2025 0 Read More

Preventing Exploitable Cloud Misconfigurations Using IAM Access Analyzer

Preventing Exploitable Cloud Misconfigurations Using IAM Access Analyzer
Introduction What is IAM and its importance in cloud security? Identity and Access Management (IAM) is an AWS web service that helps you securely control access to AWS resources. IAM...
13.04.2025 0 Read More

Mastering Infrastructure as Code: My Terraform Journey in Cloud Security

A deep dive into how I use Terraform to automate cloud infrastructure, enforce security, and scale DevSecOps pipelines across AWS and Azure.In the fast-paced world of cloud security, automation isn’...
15.04.2025 0 Read More

No Access, No Automation!: Why Linux User Management remains the Backbone of Cloud Infrastructure Security

No Access, No Automation!: Why Linux User Management remains the Backbone of Cloud Infrastructure Security
Table of Contents Introduction The Stakes in Cloud Environments Linux Users in Cloud Infrastructure User Identification: The Foundation of Access Control Critical System Files in Cloud Secur...
16.04.2025 0 Read More

Top Cloud Security Vulnerabilities in 2025: Threats Exposing Your Data and Assets

Top Cloud Security Vulnerabilities in 2025: Threats Exposing Your Data and Assets
The Cloud Security Wake-Up Call In 2025, cloud adoption is at an all-time high. Organizations are leveraging cloud services for scalability, flexibility, and cost-efficiency. However, this ra...
19.04.2025 0 Read More

Modern Threat Modeling for Cloud Infrastructure Security: Strategies for Security Architects in a Multi-Cloud World

Modern Threat Modeling for Cloud Infrastructure Security: Strategies for Security Architects in a Multi-Cloud World
From Reactive to Proactive: The Role of Threat Modeling in Today’s Cloud Let’s be honest, traditional perimeter-based security no longer works in the age of the cloud. As cloud ecosystems...
19.04.2025 0 Read More

Fort Knox in the Cloud: A Practical Guide to AWS Security & IAM

Hey everyone! 👋 Ever felt that initial rush of excitement firing up your first EC2 instance or S3 bucket on AWS? It feels like limitless power at your fingertips. But then, a tiny voice whispers, "...
22.04.2025 0 Read More

If You Can't Control Access, You Can't Control the Cloud (Part 2)

If You Can't Control Access, You Can't Control the Cloud (Part 2)
Have you had any moment when someone says "I can't see this file" or worse, "Who deleted our project folder?" These aren't glitches, they're permission problems that plague cloud environments daily. A...
22.04.2025 0 Read More

AWS Network Security Showdown: Network ACLs vs. Security Groups Demystified

AWS Network Security Showdown: Network ACLs vs. Security Groups Demystified
** Relatable problem, setting the stage)**Picture this: you've just deployed your shiny new application on an EC2 instance in AWS. It works! But then, that nagging feeling creeps in... is it secure? Y...
25.04.2025 0 Read More
Loading...
#reading
Five ways to use the new Granite 3.2 models
0
Gen AI’s Path to Deeper Learning: A Socratic Approach to Staying Engaged
0
Is Arbitrum Decentralized? An In-Depth Exploration of Its Landscape
0
My Real-World SEO Checklist for New Websites
0
Introductory Collections in Python
0
#popular
Mastering OpenAI’s new Agents SDK & Responses API [Part 1]
0
What is Model Context Protocol (MCP): Explained in detail
0
Beginner's Guide to the Model Context Protocol (MCP)
0
A Step-by-Step Guide to Install DeepSeek-V3-0324 Locally
0
How to Run DeepSeek Locally Using Ollama
0