Discovered Vulnerabilities
s1ngularity Supply Chain Attack: What It Means for Cloud and AI Security
On August 26, 2025, the open-source ecosystem was shaken by a new supply chain attack that targeted Nx, a popular...
On August 26, 2025, the open-source ecosystem was shaken by a new supply chain attack that targeted Nx, a popular...
We found that your Amazon Machine Image (AMI) {AwsEc2Image} is public. A public AMI is available for use by all...
Ensure that your S3 buckets content cannot be publicly listed in order to protect against unauthorized access. An S3 bucket...
AWS IAM users can access AWS resources using different types of credentials, such as passwords or access keys. It is...
Ensure that Amazon IAM roles used to establish a trusted relationship between your AWS account and a third-party entity (also...