Cloud Security Wire
AWS Azure GCP RSS
Featured
AWS Misconfiguration critical

AWS IAM Privilege Escalation: PassRole and CreatePolicyVersion Attack Paths

A deep-dive into two of the most dangerous AWS IAM misconfigurations — iam:PassRole abuse and iam:CreatePolicyVersion — with exploitation chains, detection opportunities, and remediation guidance.

By Cloud Security Wire · Read analysis →
Coverage
AWS 4
Azure 4
GCP 3
Total 8

Latest Analysis

View all →
Azure Misconfiguration critical

Azure Entra ID Attack Paths — From Guest User to Global Admin

Microsoft Entra ID (formerly Azure AD) is the identity backbone of most enterprise cloud deployments. This analysis maps the most exploited privilege escalation paths — from consent phishing to app role abuse — and the detective controls to catch them.

Cloud Security Wire ·
Read →
AWSAzure CVE Analysis critical

SSRF to Cloud Metadata: IMDSv1 vs IMDSv2 and Real-World Exploitation

A technical deep-dive into Server-Side Request Forgery attacks targeting cloud metadata services — how IMDSv1 enables credential theft with a single HTTP request, what IMDSv2 actually protects against, and documented real-world exploitation chains.

Cloud Security Wire ·
Read →
Topics
#Terraform#IaC#Checkov#Trivy#infrastructure-as-code#shift-left#CI/CD#AWS#misconfiguration#state file#azure#entra-id#azure-ad#identity#privilege-escalation#consent-phishing
Stay informed

Cloud security analysis to your RSS reader.

Subscribe via RSS