Author: Tom D'Aquino

November 28, 2018 | Tom D'Aquino

IAM and Common Abuses in AWS

This is the first of a 4 part blog series on security issues and monitoring in AWS.Identity and Access Management (IAM) in AWS is basically a roles and permissions management platform. You can create users and associate policies with those users. And once those users are established you get set of keys (access key and a secret key), which allow…

January 22, 2015 | Tom D'Aquino

0Day Vulnerability in Adobe Flash being exploited by Angler Exploit Kit - What to Do

A few hours ago, a security researcher, Kafeine, spotted an instance of the Angler Exploit Kit which is exploiting an unpatched vulnerability affecting Adobe Flash. It appears that any version of Internet Explorer or Firefox with any version of Windows can be owned if the latest version ( of Adobe Flash is installed and enabled.Victims of this type of attack…

Watch a Demo ›