resource sets from aembit

Announcing Role-Based Resource Sets for Aembit Workload IAM

3 min read https://www.youtube.com/watch?v=QSnJz7X-qLo Today we are pleased to announce Resource Sets, a new capability that allows administrators to group related resources and policies into isolated sets, each with specific role-based access ...
🔨

Optimizing CI/CD Security: Best Practices for a Robust Software Delivery Pipeline

5 min read Modern software development accelerates progress but introduces security risks that must be managed to protect organizational integrity and reputation. The post Optimizing CI/CD Security: Best Practices for a Robust ...
An Introduction to Aembit and Workload IAM

Aembit Launches Terraform Provider to Enable Infrastructure as Code

3 min read This will enable DevOps teams to better streamline workload access controls, ensuring consistent, secure deployments across environments. The post Aembit Launches Terraform Provider to Enable Infrastructure as Code appeared ...
Introducing Aembit Access Management for CI/CD Platforms

Introducing Aembit Access Management for CI/CD Platforms

4 min read Our identity federation capability better secures and streamlines CI/CD workflows, like in GitHub Actions and GitLab, with short-lived, secretless credentials. The post Introducing Aembit Access Management for CI/CD Platforms ...
Case Study: How Lightspeed ensures full security compliance with Escape

Case Study: How Lightspeed ensures full security compliance with Escape

Discover how Lightspeed, the unified point of sale and payments platform, maintains security compliance, and explore its API security challenges ...

The Secure Java Developer’s Toolkit

Java remains one of the most popular and widely-used programming languages. It’s not just about writing and running Java programs, though. A typical Java developer working in Linux has an entire ecosystem ...
Case Study: How Escape enhanced Shine's application security

Case Study: How Escape enhanced Shine’s application security

Discover how Shine, an online banking for professionals, enhanced API security. Explore their challenges and the transformative impact of Escape ...
Long Live the Pwn Request: Hacking Microsoft GitHub Repositories and More

Long Live the Pwn Request: Hacking Microsoft GitHub Repositories and More

Software supply chain attacks have been increasing both in frequency and severity in recent months. In response to these attacks, the CISA has even released a cybersecurity information sheet (CSI) on how ...
Announcing Gato Version 1.5!

Announcing Gato Version 1.5!

On January 21, 2023 at ShmooCon 2023, Praetorian open-sourced Gato (Github Attack Toolkit), a first of its kind tool that focuses on abusing offensive TTPs targeting self-hosted GitHub Actions Runners. Since then, ...
Praetorian GitHub Attack Toolkit (GATO) Demo

Phantom of the Pipeline: Abusing Self-Hosted CI/CD Runners

Introduction Throughout numerous Red Teams in 2022, a common theme of Source Control Supply Chain attacks in GitHub repositories has emerged. After many hours manually hunting for and exploiting these attack paths, ...