Articles tagged with: #aws Clear filter
New AWS whitepaper: Security Overview of Amazon EKS Auto Mode

New AWS whitepaper: Security Overview of Amazon EKS Auto Mode

AWS Security Blog aws.amazon.com

Amazon Web Services (AWS) has released a new whitepaper: Security Overview of Amazon EKS Auto Mode, providing customers with an in-depth look at the architecture, built-in security features, and capabilities of Amazon Elastic Kubernetes Service (Amazon EKS) Auto Mode. The whitepaper covers the core security principles of Amazon EKS Auto Mode, highlighting its unique approach

Introducing new compute-optimized Amazon EC2 C8i and C8i-flex instances

Introducing new compute-optimized Amazon EC2 C8i and C8i-flex instances

AWS News Blog aws.amazon.com

AWS launched compute-optimized C8i and C8i-flex EC2 instances powered by custom Intel Xeon 6 processors available only on AWS to offer up to 15% better price performance, 20% higher performance, and 2.5 times more memory throughput compared to previous generations.

AWS Weekly Roundup:  Amazon Bedrock, AWS Outposts, Amazon ECS Managed Instances, AWS Builder ID, and more (October 6, 2025)

AWS Weekly Roundup: Amazon Bedrock, AWS Outposts, Amazon ECS Managed Instances, AWS Builder ID, and more (October 6, 2025)

AWS News Blog aws.amazon.com

Last week, Anthropic's Claude Sonnet 4.5 - the world's best coding model according to SWE-Bench - became available in Amazon Q command line interface (CLI) and Kiro. I'm excited about this for two reasons: First, a few weeks ago I spent 4 intensive days with a global customer delivering an AI-assisted development workshop, where I experienced firsthand

Hackers Weaponize AWS X-Ray Service to Work as Covert Command & Control Server

Hackers Weaponize AWS X-Ray Service to Work as Covert Command & Control Server

Cyber Security News cybersecuritynews.com

A sophisticated technique uncovered where threat actors abuse Amazon Web Services' X-Ray distributed tracing service to establish covert command and control (C2) communications, demonstrating how legitimate cloud infrastructure can be weaponized for malicious purposes. AWS X-Ray, designed to help developers analyze application performance through distributed tracing, has been repurposed by red team researchers into a

Cybersecurity Career Path

Cybersecurity Career Path

cybersecurity www.reddit.com

Hi everyone, I'm trying to pivot my career toward cybersecurity, and I'm looking for some guidance from people who are currently active in the field. I currently work in IT, with a background in infrastructure and support. I have some hands-on experience with AWS (Solution Architect associate level), basic networking, and a bit of scripting (python, bash, and a bit of shell). Right now, I'm taking a budget-friendly approach by learning through TryHackMe.com and the free IBM Cybersecurity...

AWS or Microsoft London

AWS or Microsoft London

cybersecurity www.reddit.com

How do you get into big tech, especially AWS or Microsoft? 2 years security experience in IBM and really working my ass off to get in one of these companies. I'd love to hear from you! I'd do system administration, security engineering, Soc work etc. Just to get in the door at my age would be magnificent! submitted by /u/Honest-Exam7756 [link] [comments]

CrowdStrike Cloud Security trigger test detection

CrowdStrike Cloud Security trigger test detection

CrowdStrike www.reddit.com

We've recently ingested AWS data into our Cloud Security Module. I want to ask if anyone know of any way to trigger a test detection in Cloud Security? I haven't found a method yet - aside from simulating an actual attack. Also, if you have any suggestions for cool queries - especially the ones you run daily - that would be great. submitted by /u/CyberHaki [link] [comments]

Need Advice - Interview Prep for Cloud Security Analyst/Engineer Role

Need Advice - Interview Prep for Cloud Security Analyst/Engineer Role

cybersecurity www.reddit.com

Hey Everyone, I have an interview coming up next week for a cloud security engineer role that sounds more analytical. It involves investigating alerts and incidents within the cloud infrastructure for the financial company. Also, the engineering aspect seems to come in for implementing and deploying security measures in the production environments. Another thing I would like to add is that I am very familiar with AWS, but they rely on GCP, which I am not as familiar with. I was wondering, for...

Anyone here with experience in implementing DAM tool in cloud heavy setup?

Anyone here with experience in implementing DAM tool in cloud heavy setup?

cybersecurity www.reddit.com

We're in the middle of evaluating options for HIPAA compliance. Insider risk and a related incident are the main drivers. We moved to multi-cloud Azure/AWS/GCP and some on-prem Nutanix. We were heavy Imperva users on our datacenters, but it's not working well on cloud and we are evaluating alternates. The logs are delayed, and there's no user identity attribution that caused us issues while understanding the incident. Team is under pressure from management because we paid up high 6 figures to...

Defending LLM applications against Unicode character smuggling

Defending LLM applications against Unicode character smuggling

AWS Security Blog aws.amazon.com

When interacting with AI applications, even seemingly innocent elements - such as Unicode characters - can have significant implications for security and data integrity. At Amazon Web Services (AWS), we continuously evaluate and address emerging threats across aspects of AI systems. In this blog post, we explore Unicode tag blocks, a specific range of characters spanning from U+E0000 to

Build secure network architectures for generative AI applications using AWS services

Build secure network architectures for generative AI applications using AWS services

AWS Security Blog aws.amazon.com

As generative AI becomes foundational across industries - powering everything from conversational agents to real-time media synthesis - it simultaneously creates new opportunities for bad actors to exploit. The complex architectures behind generative AI applications expose a large surface area including public-facing APIs, inference services, custom web applications, and integrations with cloud infrastructure. These systems are not immune to